From MAILER-DAEMON at toad.com Sun Mar 1 01:01:01 1998 From: MAILER-DAEMON at toad.com (MAILER-DAEMON at toad.com) Date: Sun, 1 Mar 1998 01:01:01 -0800 (PST) Subject: Now You CAN Accept Credit Cards - Guaranteed Approval Message-ID: <199802270818.CAA11762@mail.t-1net.com> Businesses that don't offer online shoppers a credit card payment option LOSE OVER 80% of their impulse sales for that inconvenience alone! Now, for only $39.95 a month, buying your products CAN be EFFORTLESS! GUARANTEED APPROVAL! Total Merchant Services has provided low-cost merchant accounts to hundreds of businesses of all sizes, all ages, all credit ratings, for 4 over years. For just $39.95, you can lease your own professional Merchant Account Equipment or Software (of course, you can also outright purchase). Either way, you'll begin processing credit card transactions immediately! � Super Low 2.25% Discount Rate � No Bank Account Set-Up Fees � No Monthly Minimum Billing Fee � No Statement Fee If No Transactions Processed That Month Plus, we'll include a Shopping Cart System for your web site ~ FREE! Take Charge of Your Success Today! Call Total Merchant Services Now At 1-800-374-6477 pin 2420 to receive additional information via email or call back (We'll even pay for the call), or call us directly during normal business hours EST at 1-912-236-6676 to speak us immediately. ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| If you wish to be removed from our mailing list, please call 1-800-374-6477, pin 2420, 24 hours a day, and you will be manually removed. ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| From 3yy1zc at ix.netcom.com Sun Mar 1 01:10:25 1998 From: 3yy1zc at ix.netcom.com (3yy1zc) Date: Sun, 1 Mar 1998 01:10:25 -0800 (PST) Subject: No Subject Message-ID: <19943672.886214@relay.comanche.denmark.eu> Authenticated sender is <3yy1zc at ix.netcom.com> Subject: 3-1 Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit EMAIL MARKETING WORKS!! Bull's Eye Gold is the PREMIER email address collection tool. This program allows you to develop TARGETED lists of email addresses. Doctors, florists, MLM, biz opp,...you can collect anything...you are only limited by your imagination! You can even collect email addresses for specific states, cities, and even countries! All you need is your web browser and this program. Our software utilizes the latest in search technology called "spidering". By simply feeding the spider program a starting website it will collect for hours. The spider will go from website to targeted website providing you with thousands upon thousands of fresh TARGETED email addresses. When you are done collecting, the spider removes duplicates and saves the email list in a ready to send format. No longer is it necessary to send millions of ads to get a handful of responses...SEND LESS...EARN MORE!!! A terrific aspect of the Bull's Eye software is that there is no difficult set up involved and no special technical mumbo-jumbo to learn. All you need to know is how to search for your targeted market in one of the many search engines and let the spider do the rest! Not familiar with the search engines? No problem, we provide you with a list of all the top search engines. Just surf to the location of a search engine on your browser then search for the market you wish to reach...it's that easy! For instance if you were looking for email addresses of Doctors in New York all you would do is: 1) Do a search using your favorite search engine by typing in the words doctor(s) and New York 2) Copy the URL (one or more)...that's the stuff after the http://... for instance it might look like http://www.yahoo.com/?doctor(s)/?New+York 3) Press the START button THAT's IT!!! The Bull's Eye spider will go to all the websites that are linked, automatically extracting the email addresses you want. The spider is passive too! That means you can let it run all day or all night while you are working on important things or just having fun on your computer. There is no need to keep a constant watch on it, just feed it your target market and give it praise when it delivers thousands of email addresses at the end of the day! Features of the Bull's Eye Software: * Does TARGETED searches of websites collecting the email addresses you want! * Collects Email addresses by City, State, even specific Countries * Runs Automatically...simply enter the Starting information, press The Start Button, and it does the rest * Filters out duplicates * Keeps track of URLs already visited * Can run 24 hours per day, 7 days per week * Fast and Easy List Management * Also has built in filtering options...you can put in words that it "Must" have while searching,...you can even put in criteria that it "Must NOT Have"...giving you added flexibility * Also imports email addresses from any kind of files (text files, binary files, database files) * List editor handles Multiple files to work on many lists simultaneously * Has a Black-Book feature... avoid sending emails to people who do not want to receive it * Built-in Mail program...send email directly on the internet with just a click of your mouse * Personalized Emails...if the email address has the user's name when it is collected,..you can send Personalized emails!!! * Sort by Location, Server, User Name, Contact Name * Advanced Operations: � Email address lists export in many different formats (HTML, Comma delimited, text file) � Advanced editing...Transfer, Copy, Addition, Delete, Crop, Move to Top/Bottom � Operations between lists...Union, Subtraction, Comparison * Program is Passive,...meaning you can run other programs at the same time CALL FOR MORE INFORMATION 213-980-7850 CALL FOR MORE INFORMATION 213-980-7850 ORDERING INFORMATION Customer Name Company Name Address City State Zip Phone Fax Email Address ______ BULL'S EYE SOFTWARE $259.00 Includes Software, Instructions, Technical Support ______ Shipping & Handling (2-3 Day Fedex) $10.00 (Fedex Overnite) $20.00 ______ TOTAL (CA Residents add applicable sales tax) *All orders are for Win 95 and Win NT *****CREDIT CARDS ACCEPTED***** MASTERCARD VISA AMEX PLEASE CALL 213-980-7850 to process your order 9am-5pm Pacific Time Checks or Money Orders send to: WorldTouch Network Inc. 5670 Wilshire Blvd. Suite 2170 Los Angeles, CA 90036 Please note: Allow 5 business days for all checks to clear before order is shipped. From MAILER-DAEMON at toad.com Sun Mar 1 03:34:41 1998 From: MAILER-DAEMON at toad.com (MAILER-DAEMON at toad.com) Date: Sun, 1 Mar 1998 03:34:41 -0800 (PST) Subject: Slick Willie Joke Book Collectible! Message-ID: <199803010654.AAA06271@mail.t-1net.com> If you want to know the answers to these questions: -> What's the difference between Slick Willie and the Titanic? -> What do Monica Lewinsky and Bob Dole have in common? -> What do Slick Willie and Ken Starr have in common? -> How did Slick Willie and Hillary meet? -> What does Teddy Kennedy have that Slick Willie wishes he did? -> What's the difference between Hillary and a pit bull? >>>>> Then You Have To Get <<<<< ** THE COMPLETE But Tacky SLICK WILLIE JOKE & ACTIVITY BOOK** Over 90 pages of jokes and activities lampooning the entire Bubba Gang. Order now for only $4.99 (plus $1.50 for shipping and handling) A great gift idea too! ================================================================ To receive your joke & activity book, fill out this form and fax it to: 516-424-6519 Name:____________________________________________________ ShipAddress: ____________________________________________ City: ___________________________________________________ State: ____ Zip: __________ Daytime Phone: (____)___________ CREDIT CARD ORDERS: CC#:____________________________________ (VISA/Mastercard/American Express ONLY) Exp. Date:____/____ Total Amount: $6.49 Appear on statement under JERBIL,INC.) "CHECKS BY FAX" ORDERS: Please fax your check ($6.49) with the shipping information above attached to: 912-236-6676 Allow 3-6 weeks for delivery. Bulk rates of 100, 1000, and 10,000 are available --------------------------------------------------------------------- If you wish to be removed from our mailing list, please call 1-800-374-6477 ext. 2420. From mixmaster at remail.obscura.com Sun Mar 1 04:29:34 1998 From: mixmaster at remail.obscura.com (Mixmaster) Date: Sun, 1 Mar 1998 04:29:34 -0800 (PST) Subject: HP Crypto Hardware Message-ID: <199803011211.EAA24273@sirius.infonex.com> With regard to: > Hewlett-Packard Granted License For Encryption System > > The Commerce Department has granted Hewlett-Packard an > export license for its VerSecure encryption architecture... > The catch is that the products must take their orders > from a central computer...will dictate how...products > will behave in each country. No fucking way! > The company hopes that the solution would break the > deadlock between the Clinton Administration...and the > computer industry... "The company hopes that its solution of a gun that will shoot forward in jurisdictions that allow possession of firearms and backward in jurisdictions that prohibit same will break the deadlock between overweening, self-inflated, scum-sucking, dog-fucking, shit-brained totalitarians and those seeking nothing more than to be LEFT THE FUCK ALONE." Whores! Two-dollar whores! 25-cent whores! HP can stick its encryption card and everything else it makes straight up its mercenary ass. HP just created a powerful incentive for a lot of very capable and creative people to see to it that HP products don't exactly shine in the marketplace, if you get my drift. > The new solution effectively disconnects the problem > of distributing encryption technology from the process > of determining the policy for government access to > information. Wonderful! That's like selling nerve gas that calls Washington to ask permission before it deploys. Stupid, stupid, STUPID fucking assholes! > The heart is a new class of trusted hardware cards and > chips that take their orders from a central company > known as a Security Domain Authority or SDA. In countries > like France that require people to keep a record of keys > for unlocking data, the SDA would only allow the computers > to encrypt information if it complied with the laws. The communists were right on one point. Capitalists will sell them the rope that will be used to hang them. And hang their children. Stupid, stupid, STUPID! > In countries with no laws about encryption usage like > the United States, Germany and Great Britain, the SDA > would allow users to encrypt in whatever manner they > choose. Yeah, _today_. And what about _tomorrow_, you astronomical fuckwits? What about when the USG decides that with this neat mechanism in place they will just advise Slavery Central that citizen-units in the US may no longer encrypt things "in whatever manner they choose?" Names. We need names publicized. Who thought of this monstrous product? Who approved it? Who developed it? Who signed off on it, saying, "Yeah, this will really make our stockholders proud! Who gives a shit if their kids and grandchildren live under the iron fist of a U.S. technocratic dictatorship? We're gonna score a few points here, make a little extra bonus this year, lock it in with a couple of patents... Who cares if we all end up with brainchip implants?" > Hewlett-Packard sees the solution as a win for the > industry, which will be able to build one set of > hardware and software that can be shipped throughout > the world. The SDA's will set the local rules because > the computers will not encrypt information without > first getting permission from the SDA. This is too abominable for words. It's the ultimate sell-out. I know now that there is no hope, not even a spark of the flame of freedom to illuminate the gloom into which we are headed. What's the use of being a well-behaved citizen-unit when this kind of utter shit is afoot or underfoot? It's war. It's always been war, we just haven't understood that it was war. The other side has understood it from the start. > Doug McGowan, one of the director of Hewlett-Packard's > efforts, said in a telephone interview, "Never before > has a general purpose cryptography tool been exportable > from the United States, with or without key recovery. > We're opening a huge market for American industry to > enable commerce on a worldwide basis." !!! Some justification, eh Doug? Hey Doug! When they ask for cerebral implants that explode on command, will you offer a similar product that checks with Citizen Control Central before detonating, to make sure the target is in a country that authorizes it? "Hey, no problem!" says Doug. "Our new CerebSecure will only explode heads in countries like Iran, Iraq, Cuba, and North Korea when people attempt to make unauthorized purchases with its electronic purse feature. In countries with no laws about political or religious transactions like the United States, Germany^H^H^H^H^H^H^H^H^H and Great Britain, the SDA would allow users to purchase in whatever manner they choose." > The price for this flexibility is the need for > specialized hardware that treats the SDA as its > master. In an ordinary computer, the owner can > control all aspects of what the computer does. > This extra hardware will raise the price of machines > and is bound to be more expensive than software which > can be distributed at minimal cost. Yeah, this is just the kind of thing that Americans, even with their severly dulled sense of freedom, will run right out to buy! Sure. First we can expect to see the feds mandate this for all government purchases, then at some point mandate the chipset for all computers, then outlaw encryption that doesn't use the chipset. And I don't even own a crystal ball anymore! > Feisal Mosleh [said], "...It...gives us a lot of > strength in terms of tamper resistance." OK, I give up. Where is the tamper resistance for the Constitution? Is anybody working on that? HEL-lo???? FuckWithMeMongerII From business at checkfax.net Sun Mar 1 07:03:43 1998 From: business at checkfax.net (business at checkfax.net) Date: Sun, 1 Mar 1998 07:03:43 -0800 (PST) Subject: AD: Complete Checks by Fax Software Message-ID: <199803011503.HAA05521@toad.com> Did you know that over 125 Million people in the U.S. have checking accounts? Out of those people over 70 Million DO NOT have a credit card.. Now, YOU can tap into this huge customer base by using Checker. Checker, a revolutionary new way to accept payment via fax, phone, or even e-mail is now available through TDN Publishing, Inc. for only $14.95 if you order before March 1. Checker is a complete check management system designed to speed up the ordering process by enabling customers to fax or email payments rather than send via postal service (snail mail). By expanding payment options, businesses can appeal to a larger array of customers, possibly resulting in increased sales. Checker is a full featured check printing software package that will allow you to take your customers information and immediately print out a check that you can deposit the very same day! IS CHECK-BY-FAX LEGAL? Accepting a Check-by-Fax is not only cost effective and very simple, it IS PERFECTLY LEGAL! Although the Internet offers "Secure Servers" for credit card purchases, questions of safe electronic commerce remain. many large companies who sell products or services on the Internet offer Check-by-Fax as a payment option. No more waiting to get paid. No more waiting for that "check in the mail". Checker will work with any inkjet or laser printer. You can use inexpensive check paper available at any print shop or simply use the paper you use every day. Checker maintains a database of every check that you've printed and it will even print your own blank checks. No more ordering expensive refills from the bank! Checker is extremely user friendly and comes complete with a comprehensive support help file. It runs on any Windows 3.x or Windows 95 computer. Checker is shipped on a standard 3.5" diskette or can be sent as a file attachment to your E-mail address. Or you can download it from our private site, Your Choice! Checker is now available to you through TDN Publishing for only *** $14.95 ***.Similar check management systems can cost as much as $200.00!!! Checker is ideal for individuals and businesses looking to save money. Thats right! Only $14.95 !!!! This is the full registered version of Checker, not a crippled demo. You'll be accepting checks and depositing them into your account immediately! To Order by Mail please send your check or money order to: If ordering outside the United States we can only accept International Bank Drafts or International Money Orders as payment. TDN Publishing, Inc. Box 642 Destin, Florida 32540-0642 Fax: (850)-837-0367 Please include your Name, phone number, E-mail, and postal address. Please check how you would like to receive your Checker Software: Send to my E-Mail address as a file attachment ( ) Send by U.S. Mail to my postal address ( ) Or you can of course order using CHECK-BY-FAX ******* CHECK-BY-FAX ******* ***** PAYMENT SYSTEM ***** This is the preferred payment method at TDN Publishing! If you are ordering outside the United States we can only accept payment by International Bank Draft or International Money Order. Your order can be received 24 hours a day and will be shipped immediately! cut here______________________________________________________________> ********** CHECK-BY-FAX ORDER FORM ********** You must complete the entire form or your order can not be processed. You will need to tape or paste a check in the blank space below. Fill out and sign the authorization section below, and fax the ENTIRE FORM to (850) 837-0367. PRODUCT/SERVICE You are ordering: Checker software. Please check how you would like to receive your Checker Software: Send to my E-mail address as a file attachment ( ) Send via U.S. Mail to my postal address ( ) I would like to DownLoad the Software on my own time, please send me the address. ( ) First Name: __________________________________________________________ Last Name: ___________________________________________________________ Street Address: ______________________________________________________ ____________________________________________________________________ __ City: ________________________________________________________________ State: _____________________ Zip: _________________________ Phone Number: _______________________________________________________ EMail Address: _______________________________________________________ * * * * * * * * * * Authorization * * * * * * * * * * I, ______________________________________ hereby authorize TDN Publishing, Inc. to withdraw $_____________________________ from my checking account, account information enclosed, one time only, for the purchase of Checker check printing software. I have read and I understand the terms and conditions as stated above. The signature below is the authorized signature of the holder of the checking account. Authorized Signature _________________________________________________ Date: __________________ Attach Voided Check Here! ******* TO BE REMOVED FROM OUR MAILING LISTS SEND EMAIL TO MAILTO:REMOVE at DEAA.ORG with your email address as the subject ******* From 40264587 at usa.net Sun Mar 1 08:18:47 1998 From: 40264587 at usa.net (40264587 at usa.net) Date: Sun, 1 Mar 1998 08:18:47 -0800 (PST) Subject: STOP SMOKING ...SECRET! Message-ID: <> IF YOU SMOKE , PLEASE READ THIS CAREFULLY! YOU TOO CAN STOP SMOKING EASILY WITH A NEW CHINESE SMOKER'S HERBAL AROMA THAT IS NOW AVAILABLE IN THE UNITED STATES. This amazing new product has successfully helped at least 90% of those who use it consistently. "I lost the desire for smoking almost immediately. When I occasionally would smoke, the cigarette had no taste and was not fun to smoke. After three days, whenever I wanted to smoke I would smell the bottle and lose the desire." Robert F.- Newmanstown, PA. "I smoked for 15 years. This product completely took away my desire to smoke. two days, I cut my smoking in half. Then I stopped completely! I have never used a product with such power . I recommend it to any smoker who wants to quit." Michele G., Fairfield, Iowa The majority of people who smoke cigarettes would like to quit. Are you one of these people, or are you too disheartened by the cost of other failures? The patch and the nicotine gums are of a certain time limit and can be very costly. They also add to the nicotine in your bloodstream. This new product is a one time purchase for the majority of people. Think of what it costs to use the other alternatives. This purely natural product acts like nicotine in the bloodstream. The small bottle fits easily in your pocket and your purse. After merely inhaling the fragrance 4-10 times a day for about one minute, the effect builds day by day. Usually after 3 or 4 days, your body feels like it already has consumed 15 cigarettes. It is a simple process and can be used in all situations where you are forbidden to smoke! This, for many people relieves much stress in the work and social world. "I was going crazy in meetings, in airplanes, and fancy restaurants. Now I carry my small bottle wherever I go and can use it everywhere. It has helped immensely. " John M., Boulder, Co. "I was not ready to quit. I started to use the product several times a day and loved the minty aroma. I felt better immediately. I cut back from almost a pack a day to about 6. " Sandra J. Denver, Co. In each study done in China, over 90% of the people who used the product consistently, were able to either stop entirely or cut back to only 2-3 cigarettes a day in 2 weeks. After 2 months, 80% had quit entirely and the rest were smoking only 5 a day. You too can quit easily with this new product. It is so simple and easy to use. THIS UNIQUE PRODUCT IS NOT AVAILABLE IN STORES. SMOKER'S HERBAL AROMA IS AVAILABLE FOR ONLY $35.00 You can order this amazing product by calling (303)494-8455 or by fax (303)499-7398, or email delray4 at juno.com, or by mail to Delray Co., 4335 Butler Circle, Boulder, Co. 80303. Please include the following information: NAME:_________________________________________________________ ADDRESS:_____________________________________________________ CITY;_______________________________________________________ STATE;-____________ ZIP:____________ PHONE:_______________________ PAYMENT BY____VISA ____MASTERCARD ____CHECK CARD NUMBER_____________________________________ EXP. DATE______________________________ QTY.____@ $35.00 SUB-TOTAL_______________ SHIPPING $3.50 (add $1.00 for each additional bottle)______________ TAX (for Colorado residents only add $2.10 per bottle)____________ TOTAL :_________________ ORDERS ARE SHIPPED WITHIN 3 DAYS BY PRIORITY MAIL From 40264587 at usa.net Sun Mar 1 08:18:47 1998 From: 40264587 at usa.net (40264587 at usa.net) Date: Sun, 1 Mar 1998 08:18:47 -0800 (PST) Subject: STOP SMOKING ...SECRET! Message-ID: <> IF YOU SMOKE , PLEASE READ THIS CAREFULLY! YOU TOO CAN STOP SMOKING EASILY WITH A NEW CHINESE SMOKER'S HERBAL AROMA THAT IS NOW AVAILABLE IN THE UNITED STATES. This amazing new product has successfully helped at least 90% of those who use it consistently. "I lost the desire for smoking almost immediately. When I occasionally would smoke, the cigarette had no taste and was not fun to smoke. After three days, whenever I wanted to smoke I would smell the bottle and lose the desire." Robert F.- Newmanstown, PA. "I smoked for 15 years. This product completely took away my desire to smoke. two days, I cut my smoking in half. Then I stopped completely! I have never used a product with such power . I recommend it to any smoker who wants to quit." Michele G., Fairfield, Iowa The majority of people who smoke cigarettes would like to quit. Are you one of these people, or are you too disheartened by the cost of other failures? The patch and the nicotine gums are of a certain time limit and can be very costly. They also add to the nicotine in your bloodstream. This new product is a one time purchase for the majority of people. Think of what it costs to use the other alternatives. This purely natural product acts like nicotine in the bloodstream. The small bottle fits easily in your pocket and your purse. After merely inhaling the fragrance 4-10 times a day for about one minute, the effect builds day by day. Usually after 3 or 4 days, your body feels like it already has consumed 15 cigarettes. It is a simple process and can be used in all situations where you are forbidden to smoke! This, for many people relieves much stress in the work and social world. "I was going crazy in meetings, in airplanes, and fancy restaurants. Now I carry my small bottle wherever I go and can use it everywhere. It has helped immensely. " John M., Boulder, Co. "I was not ready to quit. I started to use the product several times a day and loved the minty aroma. I felt better immediately. I cut back from almost a pack a day to about 6. " Sandra J. Denver, Co. In each study done in China, over 90% of the people who used the product consistently, were able to either stop entirely or cut back to only 2-3 cigarettes a day in 2 weeks. After 2 months, 80% had quit entirely and the rest were smoking only 5 a day. You too can quit easily with this new product. It is so simple and easy to use. THIS UNIQUE PRODUCT IS NOT AVAILABLE IN STORES. SMOKER'S HERBAL AROMA IS AVAILABLE FOR ONLY $35.00 You can order this amazing product by calling (303)494-8455 or by fax (303)499-7398, or email delray4 at juno.com, or by mail to Delray Co., 4335 Butler Circle, Boulder, Co. 80303. Please include the following information: NAME:_________________________________________________________ ADDRESS:_____________________________________________________ CITY;_______________________________________________________ STATE;-____________ ZIP:____________ PHONE:_______________________ PAYMENT BY____VISA ____MASTERCARD ____CHECK CARD NUMBER_____________________________________ EXP. DATE______________________________ QTY.____@ $35.00 SUB-TOTAL_______________ SHIPPING $3.50 (add $1.00 for each additional bottle)______________ TAX (for Colorado residents only add $2.10 per bottle)____________ TOTAL :_________________ ORDERS ARE SHIPPED WITHIN 3 DAYS BY PRIORITY MAIL From bill.stewart at pobox.com Sun Mar 1 12:51:43 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Sun, 1 Mar 1998 12:51:43 -0800 (PST) Subject: Killing the Unabomber Message-ID: <3.0.5.32.19980301125005.007e1c20@popd.ix.netcom.com> > > : Didn't the government finally back down on their > > : attempt to legally kill the Unabomber? > > This point strikes me as pretty funny. Kinda like a nurse rooting > > for Charles Starkweather. >Or trying to be consistent. >Raygun: abortion is killing, but pro-death penalty. >If killing is wrong, killing again is wrong. No consistency involved - many of them would like to kill him. But they've Got Their Man, and he's made it clear that a trial will be difficult, long, expensive, involve lots of firing lawyers and arguing about mental competency, and generally be trouble, and he's offered to plead guilty if they won't kill him. Even though he's a highly intelligent cold-blooded killer, he's also close enough to crazy that the public will have enough sympathy for him that killing him won't be highly popular, especially because his brother wouldn't have turned him in if he'd expected him to be killed. Also, while his killings have been somewhat scary and weird, they haven't generated the kind of public outrage that the OKCity bombing did, with dead babies on the front page of the papers. The defendents there are going to get killed, and the public is going to enjoy it, and the Neilsen Ratings will be high. >Next time, the killer might not be caught because >the person who recognized (yea traffic analysis) >his talktalk might not want them killed as a result. >i.e. in the long run it will save lives. I think you're right here. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From owner-cypherpunks Sun Mar 1 13:39:31 1998 From: owner-cypherpunks (owner-cypherpunks) Date: Sun, 1 Mar 1998 13:39:31 -0800 (PST) Subject: 68 Million Email Addresses - 99.00 Message-ID: <199803012139.NAA17234@cygint.cygnus.com> 68 MILLION EMAIL ADDRESSES FOR ONLY $99 You want to make some money? I can put you in touch with over 60 million people at virtualy no cost. Can you make one cent from each of theses names? If you can you have a profit of over $600,000.00 This offer is not for everyone. If you can not see the just how excellent the risk / reward ratio in this offer is then there is nothing I can do for you. To make money you must stop dreaming and TAKE ACTION. **************************************** PACKAGE A 68,000,000 email addresses on CD These name are all in text files ready to mail!!! $99.00 **************************************** PACKAGE B 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. $ 139.00 **************************************** PACKAGE C THE WORKS 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. AND Over 500 diferent Business Reports now being sold on the internet for up to $100 each. You get full rights to resell these reports. With this package you get the email addresses, the software to mail them AND ready to sell information products. AND ...... . a collection of the 100 best money making adds currently floating around on the internet. $ 189 **************************************** SEVERAL WAYS TO ORDER !!! IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!! 1) WE ACCEPT: AMERICAN EXPRESS OR VISA <> MASTERCARD TYPE OF CARD AMX / VISA / MC??_______________ EXPIRATION DATE ___________________________ NAME ON CREDIT CARD________________________ CREDIT CARD #________________________________ BILLING ADDRESS ____________________________ CITY_________________________________________ STATE________________ZIP_____________________ PHONE INCLUDE AREA CODE___________________ EMAIL ADDRESS______________________________ WE WILL BILL selected amount to your account plus the following shipping costs SHIPPING COST OF 3.85 FIRST CLASS MAIL SHIPPING COST OF 15.00 24 HOUR EXPRESS MAIL / FEDERAL EXPRESS SALES TAX (7.25%) added to CA residents >>> Send correct amount in cash, check or money order to: >>> ELECTRIC EMAIL >>> 702 Mangrove Avenue, Suite 151 >>> Chico, CA 95926 2) Send the same above requested credit card information to above address. 3) Fax the same above credit card information to 530-895- 8470 4) Call phone # 530-876-4291. This is a 24 hour phone number to place a CREDIT CARD order. 5) FAX A COPY of your signed check to 530-895-8470. This is an EXCELLENT way to order without a credit card! Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider. Copyright 1998 All rights reserved Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. Amendment I, The US Constitution :-) From stevehall at csi.com Sun Mar 1 16:38:07 1998 From: stevehall at csi.com (Michael Hall) Date: Sun, 1 Mar 1998 16:38:07 -0800 (PST) Subject: I'd like to join your mailing list... Message-ID: <01bd4573$52367c60$b1aaaccf@p2> ��� I read about your mailing list in The Happy Mutant Handbook, and I am inclined to get on the list.� Address is stevehall at csi.com . From paladin at lvcablemodem.com Sun Mar 1 17:42:23 1998 From: paladin at lvcablemodem.com (Eric Tune) Date: Sun, 1 Mar 1998 17:42:23 -0800 (PST) Subject: Fw: Missing the Big Picture Message-ID: <001b01bd457c$5e918be0$2a06ea18@paladin.lvcablemodem.com> William H. Geiger III said: > I have noticed that many members of the list are missing the "big >picture" when it comes to fighting censorship. > >While I support the various efforts to combat the numerous attacks on >personal liberties world wide it is all for nought unless we push for >fundamental changes in government. > >There is an old saying: "Power corrupts, absolute power corrupts >absolutely". > >So long as we have Statist governments (fascists, communist, socialist, >they are all the same) we will suffer a never ending infringement of our >basic civil liberties. You can not give a government overwhelming powers >to control every minute aspect of our lives and not expect them to use it >AS THEY SEE FIT. > >We go on wining little battles over this law or that law only to be losing >the war. Every year governments become more powerful, more repressive, >and are freedoms are curtailed even more. We need to strike into the belly >of the beast, and rip out it's hart. We must remove it's power to tax, to >regulate, to control only then will we be free. > >Not only must we castrate this beast leaving it a shell of it's former >self but we must stop being children and act like free men. We must be >willing to stand on our own and take our destinies into our own hands. We >must resist running to Big Brother every time we have a problem like a >small school boy running to mommy when he scrapes his knees. > >It is far better to try and fail as a free man than to have never tried at >all living the life of the slave. > >-- Well said William, very well said. Free men must cooperate in their own defeat, refuse to cooperate, refuse to give in, and you will not lose. In the end, tyranny will fall. In the history of our civilizations, all governments have eventually failed, regardless that they may have had noble intent in their beginnings, and they have fallen. So have each succeeding government after them. They fail because when times passes, decades or centuries (doesn't matter) the average citizenry becomes accepting and complacent while said government becomes more and more abusive, excessive, impulsive, and corrupt. Finally, those people who can no longer tolerate this from those who would call themselves their rulers, rise to the occasion and the now festering, malignant government is torn down. Unfortunately, the cycle repeats itself. The U.S. government has lasted this long only due to the freedoms guaranteed by our Constitution, but it still has been following in the tracks as all the previous governments before it. In lasting longer than any other constitutional form of government, it is now so corrupt that at this point only 1 of 2 things can really happen: a 2nd American Revolution, and hopefully a new start and (for the time being) a change for the better, or total Fascism, and the last remaining freedoms people have will be quickly extinguished. I don't want to live in a socialist environment. I don't want somebody telling me how to raise my children, and I don't want someone telling me I'm a criminal because I don't want to let the government read what I have to say. It doesn't "Take a Village" and it doesn't take Big Brother.... it takes freedom, ingenuity, drive, determination, self-worth, cooperation, and dedication to build something better. Scream to your Senators and Representatives, as loud as you can, we all must do what we can, or we will be lost, and as William said, in perpetual, permanent slavery, with no privacy, no rights, and no hope for a self-determined future. To hell with that. Eric J. Tune -------------- next part -------------- A non-text attachment was scrubbed... Name: pgp00000.pgp Type: application/octet-stream Size: 339 bytes Desc: "PGP signature" URL: From blazer at mail.nevalink.ru Sun Mar 1 18:02:32 1998 From: blazer at mail.nevalink.ru (Mike) Date: Sun, 1 Mar 1998 18:02:32 -0800 (PST) Subject: Newbie pgp question Message-ID: <34FA122A.74E4@mail.nevalink.ru> Hi guys, I've got a question - may be it is FAQ, the please point me. I need - well, it sounds funny - to crack PGP-encrypted text ;) I have secring.pgp but not the keyphrase - does it make things easier or not? I also have pgpcrack99.zip (DOS-version, zip means that I unzipped it for the 1st time :) But I guess it will take megahours with big dictionary - and it will cover only single words, not sentences. Please, can somebody introduce me a little? TIA PS. I also know few words in that file, may be even phrases. -- ******************************************* Mike Blazer blazer at mail.nevalink.ru ******************************************* From billp at nmol.com Sun Mar 1 18:18:56 1998 From: billp at nmol.com (bill payne) Date: Sun, 1 Mar 1998 18:18:56 -0800 (PST) Subject: sick feeling Message-ID: <34FA16FB.3668@nmol.com> Subject: Halabja, Iraq and what you wrote Date: Sun, 01 Mar 1998 18:58:39 -0700 From: bill payne To: L E Banderet Sunday 3/1/98 6:33 PM Lou Got your stuff on Saturday. Patty and I both commented on the picture of your lovely new wife. And I was pleased that you had authored or co-authored 85 publications. This is what I was supposed to train you for. Patty and I watched 60 Minutes tonight and what happened in Halabja, Iraq. The IMMEDIATE and LONG TERM effects of a combination mustard and sarin gas attack on genetics. Last night I transcribed some of your and you co-authors' words. Volume 9, Number 4, 1997 MILITARY PSYCHOLOGY The Official Journal of the Division of Military Psychology American Psychological Association Special Issue: Effects of Chemical Protective Clothing of Military Performance Guest Editors: Gerald P. Krueger and Louis E. Banderet Psychological Aspects of Chemical Defense and Warfare James W. Stokes U.S. Army Medical Department Center and School Fort Sam Houston, Texas Louis E. Banderet U.S. Army Research Institute of Environmental Medicine Natick, Massachusetts Concerns about chemical, biological, or radiation (CBR) weapons and their potential for warfare can be very stressful. Such concerns subject people to unfamiliar threats in highly ambiguous situations, in which people feel they may be wronged or they are helpless. Maladaptive psychological overreactions or underreactions may result. Such reactions to chemical warfare are illustrated with the experience from World War I, the 1991 Persian Gulf War, and the 1995 terrorist attack in the Tokyo subway. General principles of psychology suggest strategies and tactics for training and materiel development that should enhance military performance and reduce maladaptive stress in CBR threat situations. Some of these practices may be relevant to nonmilitary law enforcement and relief agencies that manage CBR threats. page 395. Now I transcribe some of the more relevant stuff. Effects of Chemical Protective Clothing on Military Performance: A Review of the Issues Gerald P. Krueger Star Mountain, Inc. Alexandria, Virginia Lous E. Banderet U.S. Army Research Institute of Environmental Medicine Natick, Massachusetts This review in this special issue of Military Psychology on the effects of chemical protective clothing (CPC) on military performance provide a historical perspective on continued anxieties over likely use of battlefield chemical-biological weapons and summarizes significant concerns of military personnel weaning CPC in training and combat. This review describes pschophysiological stresses such protective ensembles have on personnel and how these affect military performance, and it summarizes major military psychological research program on the effect of wearing CPC. This article reviews what is known about wearing CPC, describes future CPC developments, and identifies domains for improved military training with CPC. MEDICAL AND PSYCHOLOGICAL EFFECT OF C-B WEAPONS There are many medical, physiological and psychological reactions from exposure to chemical-biological (C-B) weapons. Many bio-warfare agents and most chemical weapons are designed to interfere with function of the nervous system and to disrupt normal control of vital organ systems that sustain life. For example, the more common chemical war nerve agents involve organophosphate compounds, similar to insecticides, that inhibit cholinesterase enzymes throughout the body. Because cholinesterase hydrolyzes acetylcholine where ever liberated, this inhibition results in excessive concentrations of acetylcholine at various sites - from the ending of the parasympathetic nerves to smooth muscles of the iris, ciliary body, bronchi, gastrointestinal trace, bladder, and blood vessels; to secretary gland of the respiratory tract' and to endings of the sympathetic nerves to sweat glands (Newhouse, 1987; Simmons et at 1989). Exposure to large amounts of nerve agent may lead to loss of muscle control, twitching, paralysis, unconsciousness, convulsions, coma, and even death. The most common cause of death after acute exposure is respiratory arrest. Death may occur within minutes or take several hours. In terms of psychological functioning, moderate but nonlethal exposure to nerve agent produces severe impairment in cognition, vigilance, memory and language. Acute intoxication produces confusion, drowsiness, and difficulty in concentration (Newhouse, 1987). These impairment make it difficult to continue to perform may soldier tasks. Effects on cognition may persist after only a slight exposure. Performance improvement appears to correlate with the body's regeneration of acetycholinesterase, usually requiring several months. Neurophysychological testing (Newhouse, 1987) reveals that chronic exposure to organophosphates significantly impairs higher mental function requiring use of the frontal lobes, particularly the left lobe. Organophosphate poisoning selectively impairs memory of recently learned information, and this impairment is likely related to cholinergic involvement in the memory processes. The effects include defects in long-term memory, visual searching, and response alteration - effects similar to those caused by a frontal lobotomy. In chronically exposed individuals, speed of task performance and overall cognitive efficiency also declines. Persistent visual impairments are reported in workers poisoned with anticholinesterase insecticides, and acute poisoning impair oculomotor function. Poisoning with nerve agents may also cause psychiatric disturbances such as depression. Use of C-B weapons results not only in large number of physical casualties on the battlefield by in may psychological casualties as well. Concern over the mere threat that C-B weapons might be used raises battlefield anxiety of combatants and can produce a level of fear disproportionate to that evoked by countless alternative conventional battlefield means of killing or maiming, such a with guns, artillery, and bombs. Such anxieties can create large numbers of psychological stress casualties contribution to unit ineffectiveness on the battlefield and combat losses. Such adverse emotions may also cause posttraumatic stress disorders after combat ceases. DEVELOPMENT OF COUNTERMEASURES FOR THE COMBAT THEATER Modern military forces recognize the C-B weapons can be the attention-getting equivalent of a poor country's nuclear weapons. Such weapons can be counter-acted, however, and concerned nations prepare their forces to preserve their health and safety against C-B warfare. ... THE THREAT OF C-B WARFARE Although biological warfare was used centuries ago by the Romans and was used in the 14th century by the Tartars, who catapulted plague-infected bodies into cities under siege (Hewish, 1997), military forces have made scant use of biological warfare in modern times. The more recent innovation of chemical warfare dates to 1914 when the French used tear gas against unprotected German forces, who in turn introduced chlorine and phosgene in 1915 and mustard gas in 1917 against the British, who sustained 14,000 casualties in 3 months (Hewish, 1997). May World Ware I soldiers were grotesquely injured or died in gas war trenches in France and Russia; Russia's gas casualties exceed a half million, including 50,000 fatalities (Westerhoff, 1980). In 1925, many countries signed a Geneva Protocol prohibiting first use of chemical and bacteriological weapons. However, during the 1930s, several countries, notably Germany, encouraged chemists to develop chemical weapons as a by-product of insecticide research production. By World War II, Germany and powers stockpiled huge caches of chemical, but probably due to fear of in-kind retaliation, chemical weapons were not used in World War II. After the war, Germany's organophoshporous arsenal fell into Russian hands, and for the next 50 years, military forces relegated C-B warfare efforts to relatively quiet development programs for future battlefields. Since World War II, C-B weapons have been employed several times on a relatively small scale. In the 1970s, the Vietnamese used chemical and "yellow rain" biological agents in Cambodian jungles, the Soviets used chemical in Afghanistan (U.S. Department of State, 1980), Iraq used sulfur mustard and other chemical in the Iran-Iraq conflict (1979-1980), and Iraq used chemical in 1980 - this time against its own people, the northern Kurds (Stuteville, 1997). There have been periodic threats to use chemical weapons on a grand scale. In the 1970s, the Warsaw Pact possessed huge stockpiles of chemical weapons ( mostly soman, cyanide, and mustard gas), and Soviet chemical warfare teams openly conducted extensive training in gas warfare tactics. Such readiness for large scale C-B warfare was underscored in the Persian Gulf War of 1991, as Iraq threatened to use chemical (sarin) and biologicals (anthrax spores) against coalition forces and possibly against neighboring cities in Saudi Arabia and Israel (Begley, Barry, & Hager, 1991). By January 1991, Saudi Arabia had predug 50,000 graves planned for burying civilian (noncombat) casualties expected to succumb to Iraqi chemical poisoning from anticipated rocket attacks on Saudi cities oraerosols drifting from the battlefields (Kaplan, 1991). Although Iraq did not unleash such chemical, and the battles were ultimately short, many U.S. military personnel may been exposed to chemical during the March 1991 destruction of Iraqi weapon stockpiled (mostly sarin) near Khamisiyah, Iraq (Stuteville, 1997). The U. S. government continue to investigate whether exposures to chemical agents may have contributed to the so-called Gulf War illnesses experienced by many U.S. military veterans of that encounter. Exposure of soldiers to multiple chemical and and environmental stressors may be linked to psychophysiological illnesses that manifest in symptomatology such as disabling fatigue, insomnia, malaise, joint and muscle pains, skin sores, hair loss, and gastrointestinal and respiratory difficulties (Brown & Priest, 1996). Others asset that U.S. military personnel were exposed to Iraq chemical warfare from Scud missiles, artillery and aircraft (Stuteville, 1997) PUBLIC CONCERN Open, frank, public news of existent military chemical stockpiles, proliferation of chemical or biological weaponry, and periodic 'saber-ratting' threats to use such weapons amplify world public concerns over the enormity of what someday could be a horrific chemical or biological calamity. Unprotected civilian populations fear they may be deliberately attacked by chemical and biological weapons or inadvertently by aerosol warfare agents drifting into populated areas of a battlefield. Disastrous incident like the one in 1984 at a chemical actory in Bhopal, India, which killed over 2,000 people and sickened countless others, sensitized citizenry to the lethal potential of such chemical compounds. In 1995, terrorist attacks on the Tokyo subway, and news media discussion of possible use of nerve agents in terrorist disruption of public gathering like the 1992 and 1996 Olympics, heightened Public fears over such chemical incidents have become almost visceral. News of recent advances in genetic technologies (Dando, 1997) suggest use of future biological weapons with unprecedented insidiousness and specificity is possible. Moreover, the mass media and media expert sources remind the public that the United States may not be adequately prepared or trained to defend itself against chemical or biological warfare (Beal, 1997). ... I got a sick feeling when Hans Buehler phoned from Zurich on why he was jailed in the Evin prison in Tehran. You failed to mention the long-term effects of mustard-sarin. Or how the suits were to protect against biological weapons. I have an even more sick feeling now. bill Title: Untitled Document Viewing this page requires a browser capable of displaying frames. From owner-cypherpunks Sun Mar 1 18:20:49 1998 From: owner-cypherpunks (owner-cypherpunks) Date: Sun, 1 Mar 1998 18:20:49 -0800 (PST) Subject: Accept this FREE gift-FREE 1 HOUR LD CALLING CARD Message-ID: <199803020220.SAA09288@toad.com> FAST EARTH CASH AND A FREE 1 HOUR LD CALLING CARD TO THE FIRST 300 EMAIL FRIENDS WHO RESPOND TO THIS OFFER! A new revolution is coming to America. One simple fact. . . . . . . . . There is a new way to wash clothes without soaps or detergents and earn a KINGS RANSOM from working at home!!! A new study links skin, liver and kidney cancer to most soaps and detergents in use now!!! Our plan is the fastest and easiest in the U.S.A. $30,000, $70,000, $100,000 per month is possible within 6 months. Our unit saves soap, water, energy and time. We would love to show you how we did it. Please 717-288-0400 with your name, address, phone and fax number so we can speed you this fun, educational and futuristic info pack! We need your fax number to fax you the calling card. Accept this FREE gift for reviewing our info pack. We have the lowest LD rates in the nation. . . 7.9 cent LD, 5 cent local! We can help you save and make thousands per year!!! Let's help SAVE the PLANET. phone # 717-288-0400 From WhatsMetaU at aol.com Sun Mar 1 18:31:27 1998 From: WhatsMetaU at aol.com (WhatsMetaU) Date: Sun, 1 Mar 1998 18:31:27 -0800 (PST) Subject: Fw: Missing the Big Picture Message-ID: <549d66e3.34fa19be@aol.com> In a message dated 98-03-01 21:16:04 EST, paladin at lvcablemodem.com writes: << > I have noticed that many members of the list are missing the "big >picture" when it comes to fighting censorship. > >> You want to see the big picture? See my front page - http://members.aol.com/StanSquncr/ And if there are any " ... heads" on this list, you ain't got one. Stanley Rosenthal, saver of lists 'Methods of Moder(atio)n Censorship' http://members.aol.com/WhatsMetaU/ofir.html From cypherpunks at yahoo.com Sun Mar 1 20:24:45 1998 From: cypherpunks at yahoo.com (cyper punks) Date: Sun, 1 Mar 1998 20:24:45 -0800 (PST) Subject: cypherpunks@yahoo.com Message-ID: <19980302042425.8339.rocketmail@send1b.yahoomail.com> Hi cypherpunks, cypherpunks at yahoo.com is running! whom created cypherpunks at yahoo.com _________________________________________________________ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com From 54689590 at hotmail.com Sun Mar 1 21:22:47 1998 From: 54689590 at hotmail.com (54689590 at hotmail.com) Date: Sun, 1 Mar 1998 21:22:47 -0800 (PST) Subject: FREE SOFTWARE !!! Message-ID: <> FREE SOFTWARE! BULK EMAIL TOOLS! ALL YOU NEED FOR SENDING BULK E-MAIL & PROMOTING: Hi my name is Jennifer, I have been searching for promotional tips for all my down line members. Mostly, this centered around ways to promote using bulk email responsibly. I have finally come upon a site and service that provides all we need: http://www.ezine-info.com USE ID# 1363 Keep trying if sites are busy-it's worth it. Check it out for yourself: Bulk e-mail software: E-MAIL BLASTER PLATINUM FREE E-MAIL addresses to download-lots of 'em-FRESH 100,000's All sorts of other tips and Free software Learn how to bulk e-mail responsibly If you sign-up, please use my ID# 1363 It is the best I have found. Thank you for your time. If you wish to be removed from *this* mailing list, please hit reply and type "REMOVE" in the SUBJECT field ( not the body ). Our servers will automatically remove you from our list within 24hrs! THANKYOU From 54689590 at hotmail.com Sun Mar 1 21:22:47 1998 From: 54689590 at hotmail.com (54689590 at hotmail.com) Date: Sun, 1 Mar 1998 21:22:47 -0800 (PST) Subject: FREE SOFTWARE !!! Message-ID: <> FREE SOFTWARE! BULK EMAIL TOOLS! ALL YOU NEED FOR SENDING BULK E-MAIL & PROMOTING: Hi my name is Jennifer, I have been searching for promotional tips for all my down line members. Mostly, this centered around ways to promote using bulk email responsibly. I have finally come upon a site and service that provides all we need: http://www.ezine-info.com USE ID# 1363 Keep trying if sites are busy-it's worth it. Check it out for yourself: Bulk e-mail software: E-MAIL BLASTER PLATINUM FREE E-MAIL addresses to download-lots of 'em-FRESH 100,000's All sorts of other tips and Free software Learn how to bulk e-mail responsibly If you sign-up, please use my ID# 1363 It is the best I have found. Thank you for your time. If you wish to be removed from *this* mailing list, please hit reply and type "REMOVE" in the SUBJECT field ( not the body ). Our servers will automatically remove you from our list within 24hrs! THANKYOU From declan at well.com Sun Mar 1 22:30:58 1998 From: declan at well.com (Declan McCullagh) Date: Sun, 1 Mar 1998 22:30:58 -0800 (PST) Subject: HP Crypto Export In-Reply-To: Message-ID: At 17:58 -0500 2/28/98, Declan McCullagh wrote: >Now, the FBI wants to ban U.S. software without such peepholes. Doesn't >crypto-crippleware make it much easier for the government to issue only >key recovery tokens when everyone's existing ones expire? >"Whatever the law is in the U.S., we will comply," says CEO Lewis Platt. Had dinner with some local cypherpunks this evening. Talked about the HP issue (likely to have one of their reps at the next mtg, maybe in four weeks). An analogy: a gun that stops firing after a year and requires government permission to be reactivated. If the manufacturer isn't out of business by then... Sure hope this doesn't become the trend,for software in general or cryptoware in particular. Put another way, this arguably is more disturbing than Clipper. At least you know what you're getting then. You may not know 'xactly what your PAT does. -Declan From gwb at gwb.com.au Sun Mar 1 23:24:10 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Sun, 1 Mar 1998 23:24:10 -0800 (PST) Subject: One Nation update from GWB Message-ID: <1.5.4.32.19980302060415.006edeb4@mail.pronet.net.au> ---------------------------------------------------------------------------- PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the mailing list please say "REMOVE" in the subject line and return this message in the body. ---------------------------------------------------------------------------- Dear supporter in NSW, Birthday raffle: ================ The response to the Birthday Raffle has been tremendous... but get in quick before we run out of tickets (max 100,000 on offer)! Here again are the details for participating: The first prize is a QANTAS Global Explorer Holiday for two valued at $12,000 - a 23 day trip visiting Paris, London, New York, Los Angeles, Anaheim and Honolulu. The second prize is a 7 day holiday to Hawaii at the Outrigger Reef Hotel for two - value $5,000. The third prize is a 7 nights stay at the Novotel Palm Cove at Cairns - value $3,000. You can order a book of 5 tickets (minimum) at $10 per book (or $2 per ticket) by credit card by phoning 1800 620088. Winner's names being drawn at One Nation's Birthday Party at 7pm on April 11th 1998. Winners will be notified by phone and mail with the results being published in the Sydney Morning Herald on Friday 17th April 1998. It's Blair: =========== Pauline Hanson has confirmed that she will be running for the lower house seat of Blair in the next Federal election. Full press release details can be seen at: http://www.gwb.com.au/onenation/press/270298.html Some Internet addresses to keep an eye on: ========================================== "I'm so, so sorry Pauline" While everybody else is getting in on the "Sorry" act the treatment being meted out to Pauline Hanson by the media deserves an apology to our favourite lady. Here you can send an email to a moderated web page on which messages of apology and comfort are posted to show support for the valuable work that Pauline Hanson is doing to take Australia back from the brink. http://www.gwb.com.au/sorry.html ------------------------------------------------ The Australian National News of the Day: A daily on-line paper which follows the history of One Nation. With an extensive archive dating back over two years (archive available to subscribers) http://www.gwb.com.au/head.html ------------------------------------------------ The four corners of Australia's Trojan Horse: See how the Australian media are misrepresenting the news and distorting the truth to discredit Pauline Hanson with their willing partners the ALP and the Liberal party. References are taken from press articles that have run in the mainstream media. Let us remember it was the ALP and the Coalition who allowed Rupert Murdoch (an American) and Kerry Packer to gain the hold that they have today on our media. See what they get in return for these favours. http://www.gwb.com.au/gwb/news/onenation/news.html -------------------------------------------------- Pauline Hanson's One Nation: http://www.gwb.com.au/onenation -------------------------------------------------- Finally, as we approach the federal election we will be calling on volunteers to assist in mail drops etc... please get your friends and family to subscribe to this news letter so that we can keep them informed on how they can help Pauline and her team turn Australia around. REMEMBER only PEOPLE POWER is going to keep Australia **One Nation**. That means ALL OFF YOU!! D O I T N O W !!!! GWB Scott Balson Web master Pauline Hanson's One Nation web site From bill.stewart at pobox.com Mon Mar 2 00:26:08 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Mon, 2 Mar 1998 00:26:08 -0800 (PST) Subject: Newbie pgp question In-Reply-To: <34FA122A.74E4@mail.nevalink.ru> Message-ID: <3.0.5.32.19980302002230.0092c210@popd.ix.netcom.com> At 04:58 AM 3/2/98 +0300, Mike wrote: >I need - well, it sounds funny - to crack PGP-encrypted text ;) >I have secring.pgp but not the keyphrase - does it make things easier or not? >I also have pgpcrack99.zip (DOS-version, zip means that I unzipped it >for the 1st time :) But I guess it will take megahours with big >dictionary - and it will cover only single words, not sentences. >Please, can somebody introduce me a little? Remember how PGP works: PGP picks a random session key, and encrypts it with the public key of the recipient (using RSA or a Diffie-Hellman version), and encrypts the message with the session key. The recipient's private key is encrypted with the passphrase for the private key and stored in secring.pgp. When the recipient wants to decrypt the message, they type their passphrase into PGP, which decrypts the private key from the secring and uses it to decrypt the session key from the message, and uses the session key to decrypt the message body. The session key is long, and you won't crack it. RSA depends on factoring big numbers, and if the user has a 512-bit public key or a longer public key _you_ won't be able to crack it. (The KGB might*, and a distributed internet crack might, but you won't.) But the passphrase for decrypting the private key from the secring file is picked by the user - some users use short stupid keys, and other users use long difficult keys, and short stupid keys can be cracked. The user needs to protect their secring file, to prevent this attack, but if you have their secring, you can try to crack it. If this is your _own_ secring, and you can't remember your passphrase, it's easier, because you probably know what words you use in passphrases, so your dictionary can be short and the crack can be fast. If you stole somebody else's secring, or somebody else store yours, then you have to guess what kind of dictionary to use. This only works for the recipient's secring - if you steal the sender's secring, even if you crack their passphrase, it doesn't help, because that's only used when somebody sends them messages, or when they sign messages (and now you can forge them.) *I assume you're not the KGB or Mafia, because then you would just beat up the guy until he gives you the passphrase. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From wombat at mcfeely.bsfs.org Sun Mar 1 11:33:29 1998 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Mon, 2 Mar 1998 03:33:29 +0800 Subject: AnyWho puts a reverse phone book on the Net In-Reply-To: <199802260451.UAA01651@rigel.cyberpass.net> Message-ID: I tried one of these when tracking down some dial-in system abuse being perpetrated by an ex-employee. It occurred to me that with the right hardware, a simple perl script could launch a cruise-missle strike in response to a dial-in to a phone number ... ;) (for a good time, call 1-555-2nukeme) food for thought for the paranoids and/or x-files fans. On Wed, 25 Feb 1998, Ross Wright wrote: > From: > > T a s t y B i t s f r o m t h e T e c h n o l o g y F r o n t > This issue: < http://www.tbtf.com/archive/02-23-98.html > > ________________________________________________________________________ > > ..AnyWho puts a reverse phone book on the Net > > And personal privacy slips a bit more > > If you live in the US and your phone number is listed, visit this > site [25] and type in your number. AT&T's AnyWho will return your > name and address. Is your street name linked? If so, click to see > names and numbers for all of your neighbors. Want a map to your > house? It's one click away. (Like most such maps, however, the > correspondence of street address with map location can be wildly > wrong.) The street proximity search will not show unlisted numbers, > 800- or 888- numbers, or "distinctive ring" alternate numbers. > > AnyWho is not the first reverse phone book on the Net -- 555-1212 > has that distinction [26] -- but it is the most feature-rich. It > has a "sounds like" match for last name lookups. It lets you edit > or delete your entry, and requires confirmation by a telephone call > from the phone number in question. And it combines white and yellow > pages -- 90M and 10M listings respectively -- though their output > remains separate. When you ask for a street proximity listing for a > business listing, you see only other businesses. > > [25] http://www.anywho.com:81/telq.html > [26] http://www.555-1212.com/whte_us.htm > > =-=-=-=-=-=- > Ross Wright > King Media: Bulk Sales of Software Media and Duplication Services > http://ross.adnetsol.com > Voice: (408) 259-2795 > > From frosetti at hotmail.com Mon Mar 2 06:13:40 1998 From: frosetti at hotmail.com (Fabio Rosetti) Date: Mon, 2 Mar 1998 06:13:40 -0800 (PST) Subject: No Subject Message-ID: <19980302141306.3464.qmail@hotmail.com> ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From MAILER-DAEMON at mail4.uts.ohio-state.edu Mon Mar 2 11:07:52 1998 From: MAILER-DAEMON at mail4.uts.ohio-state.edu (Mail Delivery Subsystem) Date: Mon, 2 Mar 1998 11:07:52 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803021907.OAA29904@mail4.uts.ohio-state.edu> The original message was received at Mon, 2 Mar 1998 14:07:36 -0500 (EST) from ts35-10.homenet.ohio-state.edu [140.254.114.193] ----- The following addresses had permanent fatal errors ----- <54689590 at hotmail.com> ----- Transcript of session follows ----- ... while talking to mail.hotmail.com.: >>> RCPT To:<54689590 at hotmail.com> <<< 550 Unknown user <54689590> 550 <54689590 at hotmail.com>... User unknown Reporting-MTA: dns; mail4.uts.ohio-state.edu Received-From-MTA: DNS; ts35-10.homenet.ohio-state.edu Arrival-Date: Mon, 2 Mar 1998 14:07:36 -0500 (EST) Final-Recipient: RFC822; 54689590 at hotmail.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mail.hotmail.com Diagnostic-Code: SMTP; 550 Unknown user <54689590> Last-Attempt-Date: Mon, 2 Mar 1998 14:07:44 -0500 (EST) To: 54689590 at hotmail.com Subject: REMOVE From: cypherpunks at toad.com Date: Wed, 02 Jan 1980 01:41:00 -0500 Reply-To: cypherpunks at toad.com From mixmaster at remail.obscura.com Mon Mar 2 13:40:33 1998 From: mixmaster at remail.obscura.com (Mixmaster) Date: Mon, 2 Mar 1998 13:40:33 -0800 (PST) Subject: FW: Business Week on encryption controls Message-ID: <199803022130.NAA26747@sirius.infonex.com> -----Original Message----- From: Anonymous To: cypherpunks at cyberpass.net Date: Monday, March 02, 1998 10:47 Subject: Business Week on encryption controls >From > >http://www.businessweek.com/premium/10/b3568070.htm > >THE GREAT ENCRYPTION DEBATE > >>Is all this firepower necessary? Many veterans of the decade-long >>encryption battle believe Freeh's plan is too extreme to even take >>seriously. ''Proposals like this are a tremendous stalking horse, but >>are dead on arrival,'' says Kawika Daguio, encryption-policy expert at >>the American Bankers Assn. > >Many cypherpunks seem to believe it is only a matter of time before >crypto is made illegal in the U.S. But sophisticated observers think >otherwise. > >Frankly, the resolution is obvious: crypto-in-a-crime will be controlled. >If you use crypto in planning a crime, and you're convicted of the >crime (or conspiracy), then some years will be added to the sentencing >guidelines. Some cypherpunks will proclaim this the end of individual >freedom in our time. > >>Also, a compromise may be at hand. Senators John McCain (R-Ariz.) and >>J. Robert Kerrey (D-Neb.) are currently working on a bill, sources say, >>that would release exports from controls when similar encryption products >>are already available overseas. They could also add a ban on domestic >>controls. ''It appears McCain and Kerrey are searching for some way >>out of what appears to be legislative gridlock,'' says Commerce Under >>Secretary William A. Reinsch, who oversees the Administration's policy. > >Again, the results are clear to those with vision. Export controls >will be lifted, no domestic controls will be imposed on general use of >encryption. The only new limits will be in the sentencing guidelines, >which already consider dozens of factors in a complex formula. >Whether crypto was used will be a small change there, and won't effect >anyone's life. > >Remember, you read it here first. > This guy is living his elitist life looking through rose colored glasses, with blinders on, in a vacuum, with his head buried in sand, with his neck snugly supported by his sphincter muscles. "vision"?.... "sophisticated"?.... what is this? If people disagree or are more cynical about what the government may or may not do concerning cryptography we are less sophisticated and/or lack vision? What an idiot!! Wake up and smell the bullshit you and others like you are shoveling. McCain is a serious control freak (former AZ resident who has seen him in action) and will never, regardless of his vomitous, pendulous rhetoric, support a domestic "free encryption" standard without government controls, there will always be a catch. The glass is not even half empty, it's shattered. From way at utz.com Mon Mar 2 13:42:21 1998 From: way at utz.com (way at utz.com) Date: Mon, 2 Mar 1998 13:42:21 -0800 (PST) Subject: Accept Checks By Phone Message-ID: <19980301524IAA55651@post.ac.uk> Accept Checks By Fax or Telephone Accept checks by telephone, fax or e-mail just like credit cards. The customers signature is not necessary. Verbal authorization over the telephone is all that is needed. Increase your sales and collection results by 200% and more. Don't lose that all important impulse sale because your customer doesn't have credit card or has no available credit to make a purchase. Eliminate credit card chargebacks that can cause you to lose your credit card merchant status! Collect on that problem customer in advance to save you time and money. Do away with the check is in the mail syndrome. It is fast and simple to accept checks over the phone. Donations Collections Sales Monthly Payments Post Dated Checks Here's How It Works! Your telephone sales or collections people simply collect the check information right there over the phone, Telephone Check Systems supplies all the necessary forms. This information can either be faxed into the National Headquarters 24 hours per day, or called in to them between 9 am and 10 PM EST on any business day. As soon as National Headquarters receives the information they will immediately prepare a check against the customers bank account. The checks can be shipped overnight express so that you have them in your hands ready to deposit into your bank account within 24 hours. You can still withhold shipment for bank clearance just as you might normally do with checks received in the mail or you can telephone your customers bank to see if funds are currently available to cover the check if that is your normal procedure. Your Cost...As Low as $1 Per Check Now...enjoy increased sales, payments, collections and donations at a very economical cost. Telephone Check Payment Systems' rates are only 1 3/4% of the amount of the check, with a $1 minimum. That means that a check for $57 cost you only $1. A check for $100 cost you only $1.75...less than a credit card order and less than the charges of any of our competitors that we know of. The one-time set up fee is $295 and you can use the service as much or as little with no monthly penalties, dues or statement fees like there is with credit card merchant accounts. There are over 65 million consumers who have checking accounts but do not have credit cards...plus millions of credit card holders with little or no usable credit currently available on their cards. You can dramatically increase your sales by tapping into this huge market with your ability to take check payments over the telephone. To order your check by phone system complete the order form below and fax to (405) 942-6553 along with your check for $295 or credit card information. CHECK BY PHONE ORDER FORM (Print and fax to (405) 942-6553) Company Name: Shipping Address: City/State/Zip: Telephone Number: Fax Number: Your Name: Title: Home Phone: TAPE YOUR CHECK HERE or Complete Credit Card Information Below Circle One: Visa MasterCard Amex Discover Card holders Name: Card holders Address: City/State/Zip: Card Number: Expiration Date: ____________________________ Signature  From Friend at public.com Mon Mar 2 14:17:22 1998 From: Friend at public.com (Friend at public.com) Date: Mon, 2 Mar 1998 14:17:22 -0800 (PST) Subject: Just Released! 16 Million!!! Message-ID: <011297055501222@g_fantasm.com> IT WAS JUST RELEASED!! INTRODUCING...MILLIONS VOL. 1A We took a total of over 92 million email addresses from many of the touted CD's that are out there (bought them all - some were $300+)! We added the millions we had in storage to those. When we combined them all, we had in excess of 100+ million addresses in one huge file. We then ran a super "sort/de-dupe" program against this huge list. It cut the file down to less than 25 million!!! Can you believe that? It seems that most people that are selling CD's are duping the public by putting numerous files of addresses in the CD over and over. This created many duplicate addresses. They also had many program "generated" email addresses like Compuserve, MCI, ANON's, etc. This causes a tremendous amount of undeliverables, and for those that use Stealth programs, clogs up servers quickly with trash, etc. We then ran a program that contained 1800+ keywords to remove addresses with vulgarity, profanity, sex-related names, postmaster, webmaster, flamer, abuse, spam, etc., etc. Also eliminated all .edu, .mil, .org, .gov, etc. After that list was run against the remaining list, it reduced it down to near 10 million addresses! So, you see, our list will save people hundreds of dollars buying all others that are out there on CD and otherwise. Using ours will be like using the 100+ million that we started with, but a lot less money and alot less time!! We also purchased Cyber-Promos ($995.00) CD. We received it just prior to finishing production work on the new CD. We had our people take a random sample of 300,000 addresses from the touted 2.9 that they advertised. We used a program that allows us to take a random sample of addresses from any list. We were able to have the program take every 9th address, thus giving us a 300,000 list of Cyber's email addresses from top to bottom. We cleaned these, and came up with about 100,000 addresses. These are also mixed in. We also included a 6+ million "Remove/Flamer" file broke into seperate files for ease of extracting and adding to your own database of removes. "You can buy from the REST or you can buy from the BEST. Your choice. _____________________________ What others are saying: "I received the CD on Friday evening. Like a kid with a new toy, I immediately started bulking out using the new email addresses. Over the course of the weekend, I emailed out over 500,000 emails and I received less than TWENTY undeliverables!! I am totally satisfied with my purchase!! Thanks Premier!!" Dave Buckley Houston, TX "This list is worth it's weight in gold!! I sent out 100,000 emails for my product and received over 55 orders! Ann Colby New Orleans, LA **************************************** HERE'S THE BOTTOM LINE Here is what you get when you order today! >> 10 Million Email Addresses... 1 per line in simple text format on a CD. Files are in lots of 5,000 (no codes needed to open files). All files are separated by domain name for your convenience. PLUS you receive a tremendous REMOVE list! 6 Million+ >>> NOW ONLY $149.00! This price is effective for the next seven days, thereafter the price will be $199.00 so ORDER NOW! All lists are completely free of any Duplicates. We also on a continual basis, add New Names and Remove Undeliverables and Remove Requests. The result is the Cleanest Email Addresses Available Anywhere to use over and over again, for a FRACTION of the cost that other companies charge. Typical rates for acquiring email lists are from 1 cent to as high as 3 cents per email address - that's "INFORMATION HIGHWAY" ROBBERY!. ***ADDED BONUS*** All our customers will have access to our updates on the CD volume they purchase. That's right, we continually work on our CD. Who knows when those other CDs were made. We're constantly adding and deleting addresses, removes. Etc. It all comes back to quality. No one else offers that! Don't even hesitate on this one or you will miss out on the most effective way to market anywhere...PERIOD! If you have any further questions or to place an order by phone, please do not hesitate to call us at: 908-245-1143 To order our email package, simply print out the EZ ORDER FORM below and fax or mail it to our office today. We accept Visa, Mastercard, AMEX, Checks by Fax and Mail. _________________ EZ Order Form _____Yes! I would like to order MILLIONS Vol. 1A email addresses for only $149.00. *Please select one of the following for shipping.. ____I would like to receive my package OVERNIGHT. I'm including $15 for shipping. (outside US add an additional $25 for shipping) ____I would like to receive my package 2 DAY delivery. I'm including $10 for shipping. (outside US add an additional $25 for shipping) DATE_____________________________________________________ NAME____________________________________________________ COMPANY NAME___________________________________________ ADDRESS_________________________________________________ CITY, STATE, ZIP___________________________________________ PHONE NUMBERS__________________________________________ FAX NUMBERS_____________________________________________ EMAIL ADDRESS___________________________________________ TYPE OF CREDIT CARD: ______VISA _____MASTERCARD CREDIT CARD# __________________________________________ EXPIRATION DATE________________________________________ NAME ON CARD___________________________________________ AMOUNT $____________________ (Required) SIGNATURE:x________________________ DATE:x__________________ You may fax your order to us at: 1-908-245-3119 CHECK BY FAX SERVICES! If you would like to fax a check, paste your check below and fax it to our office along with all forms to: 1-908-245-3119 ****************************************************** ***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR CHECK HERE AND FAX IT TO US AT 1-908-245-3119 ******************************************************* If You fax a check, there is no need for you to send the original check. We will draft up a new check, with the exact information from your original check. All checks will be held for bank clearance. If you feel more comfortable sending payment through the mail, please send all forms and Check or Money Order to: JKP Enterprises 700 Boulevard Suite 102 Kenilworth, NJ 07033 From support at cim.accessatlanta.com Mon Mar 2 14:48:41 1998 From: support at cim.accessatlanta.com (Support) Date: Mon, 2 Mar 1998 14:48:41 -0800 (PST) Subject: Win95 Dialer? In-Reply-To: <12D08148.7272@toad.com> Message-ID: <34FB36B8.3204A931@cim.accessatlanta.com> If you're asking if our internet connection service is available in the Win '95 version, the answer is yes. Otherwise, I suggest you call our help desk at 1-888-229-4733 (option #1) for a more complete answer. If you want the Win '95 software, they can send it to you. cypherpunks at toad.com wrote: > Can you use Windows95 Dialup Networking with Access Atlanta? > > -Jim From afabbro at umich.edu Mon Mar 2 15:57:29 1998 From: afabbro at umich.edu (andrew fabbro) Date: Mon, 2 Mar 1998 15:57:29 -0800 (PST) Subject: Cryptobook: '98 update Message-ID: Joel McNamara (author Private Idaho) has updated his Cryptobook page, which now has information on newer software. The configuration works much better under Windows 95 now. Check out: http://www.eskimo.com/~joelm/cryptbk.html I have a text file full of notes comparing different hard drive encryption software, if anyone would like a copy. I settled on Best Crypt, which uses BLOWFISH (or GOST, or DES if you're insane). So far it works well...except I haven't found a way to have Windows' swap file encrypted. Have fun... -- Andrew Fabbro [afabbro at umich.edu] [andrewf at jesuswept.com] http://www-personal.umich.edu/~afabbro/ 313.647.2713 From MAILER-DAEMON at chemistry.ohio-state.edu Mon Mar 2 16:02:20 1998 From: MAILER-DAEMON at chemistry.ohio-state.edu (Mail Delivery Subsystem) Date: Mon, 2 Mar 1998 16:02:20 -0800 (PST) Subject: Warning: could not send message for past 4 hours Message-ID: <199803030002.TAA14183@chemistry.mps.ohio-state.edu> ********************************************** ** THIS IS A WARNING MESSAGE ONLY ** ** YOU DO NOT NEED TO RESEND YOUR MESSAGE ** ********************************************** The original message was received at Mon, 2 Mar 1998 14:14:28 -0500 (EST) from ts35-10.homenet.ohio-state.edu [140.254.114.193] ----- The following addresses had transient non-fatal errors ----- ----- Transcript of session follows ----- 451 ... rmjent.com: Name server timeout Warning: message still undelivered after 4 hours Will keep trying until message is 5 days old Reporting-MTA: dns; chemistry.mps.ohio-state.edu Arrival-Date: Mon, 2 Mar 1998 14:14:28 -0500 (EST) Final-Recipient: RFC822; Remove at rmjent.com Action: delayed Status: 4.4.3 Last-Attempt-Date: Mon, 2 Mar 1998 19:02:17 -0500 (EST) Will-Retry-Until: Sat, 7 Mar 1998 14:14:28 -0500 (EST) To: Remove at rmjent.com From: cypherpunks at toad.com Date: Wed, 02 Jan 1980 01:47:53 -0500 Reply-To: cypherpunks at toad.com From 87469789 at 15512.com Mon Mar 2 16:30:30 1998 From: 87469789 at 15512.com (Luckey Promotions) Date: Mon, 2 Mar 1998 16:30:30 -0800 (PST) Subject: No Subject Message-ID:

Mothers day, Mothers day. 
-----------------------------------------------------------------------------------------------------------------------------------
NOW IS YOUR CHANCE TO
      WIN
THE PRIZE BELOW
---------------------------------------------------------------------------------------------------------------------------------------
  
Prize,  A 9ct Gold diamond set heart shaped pendant with 18inch chain. 
Also a luxury bouquet of flowers along with a box of Belgium chocolates.

Make your mums day special.

To enter answer the question below.
On which day of the week is Mothers Day?

Now Simply Call The Number
Below
0991 118801

The winner will be the first correct entry drawn at random by 11am on Friday 20th March 1998.

This competition is promoted by Luckey Promotions. 333a Licoln Road Peterborough Cambs PE1 2PF.
The closing date for the competition will be Friday 20th March 1998 at 10am. There will be one winner who will be
 the first correct entry drawn from the sack. The winner will be notified by phone on the 20th March 1998 between 
11am-5pm. 
Please ask permission from the person who pays the telephone bill before calling. Calls cost �1.00 per minute
Maximum cost of call �3:00
Minimum age to enter competition 18 years of age .
Open to U.K residents only.
The winners information can be obtained by calling 0181 2364221
To delete your e mail address from our database please
 inform via mail to the address above.  
  










From bill.stewart at pobox.com  Mon Mar  2 17:28:15 1998
From: bill.stewart at pobox.com (bill.stewart at pobox.com)
Date: Mon, 2 Mar 1998 17:28:15 -0800 (PST)
Subject: Radio Frequency Warfare Hearing
In-Reply-To: <1.5.4.32.19980228131755.00718780@pop.pipeline.com>
Message-ID: <3.0.5.32.19980302125612.007e55f0@popd.ix.netcom.com>


At 08:17 AM 2/28/98 -0500, John Young wrote:
>We offer the lengthy prepared testimony at the Joint 
>Economic Committee hearing February 25 on "Radio Frequency 
>Weapons and Proliferation: Potential Impact on the Economy."
>  http://jya.com/rfw-jec.htm  (112K)

John!  You can't do that!  That's putting bomb-making information
on the Internet!  It's safe to have it in government hearing documents,
where only technically incompetent Congresscritters will read it,
but by letting the public know, you're facilitating right-wing 
conspiracies and anarchists and terrorists and teenage kids
and all those other dangerous people getting access to weapons
of low-mass destruction!

On a slightly more serious note, I'm surprised from the
excerpts of the description that the $500 of parts would
generate enough joules of electrical energy induced into
sensitive parts of computer equipment in some reasonable range
to do a lot of damage.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From bill.stewart at pobox.com  Mon Mar  2 17:28:30 1998
From: bill.stewart at pobox.com (bill.stewart at pobox.com)
Date: Mon, 2 Mar 1998 17:28:30 -0800 (PST)
Subject: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <3.0.5.32.19980220184839.008d4b50@popd.ix.netcom.com>
Message-ID: <3.0.5.32.19980302124517.008b7260@popd.ix.netcom.com>


At 09:02 AM 2/21/98 -0500, William H. Geiger III wrote:
> > > 1. HTML in mail: There is just no place for this crap in e-mail. 
> > HTML is a fine format for email.  It's ASCII readable, and supports
>Yes but who needs all this crap in e-mail??
>E-Mail is a messaging protocol not a protocol for large documents 

Nonsense.  E-Mail is an interface for mailing stuff to people,
and an email system that can't handle large documents is broken.
In particular, the MickeysoftMail view that the contents of a message
belong in attachments rather than message body is broken
(it's partly due to myopia, and partly because some of the popular
Windows GUI programming widgets can't handle more than 32KB.)

>I must admit that atleast MS Outlook follows the RFC's and makes use of
>multipart/alternative when sending out HTML formated messages so others
>are not forced to use a webbrowser to read their mail (unlike Net$cape or
>Eudora).  There is no place for HTML in e-mail plain and simple.
>I do not wan't to have to load a huge bloated bugfilled webbrowser 
>just to process my e-mail messages.

First of all, you don't need a web browser to read HTML.
Eudora doesn't use one - it displays it natively.
(If you attach an HTML attachment rather than putting HTML in the body,
then you need an HTML viewer (which may or may not be a web browser), 
but that's the same as needing a text viewer to view text attachments.)
	(Netscape _is_ a huge bloated buggy web browser, and you could
	argue about whether it needs to have a mailreader hung off the side,
	but it's helped them with their market share, and if you
	don't like it, use Eudora.)

Furthermore, HTML is written in ASCII, and designed to be human-readable,
and designed so the user can choose how to display it -
HTML viewers are supposed to display documents in the user's preferred
formats given the limitations of the display device.
If you like Netscape or IE 4.x browsers to view HTML, use them, 
but if you'd prefer Lynx for a lean, mean browser, 
or MSWord or another viewer like HoTMetaL, go ahead.

Some people like to send rich-text attachments.  HTML is a much better
standard for doing that than some MS proprietary format.
Most of the rich text mail I get at work is in proprietary MS formats,
(most of it that I get at home is SPAM :-), which means I need to use
a buggy bloated word processor to read it, except when Exchange
feels like using its Outlook Evil Twin to display the stuff,
but it's somewhat pleasant to have colors and fonts available.


>>Netscape mail is adequate for many people, just as Eudora is. 
>>Newer versions are pretty bloated, but including 
>>S/MIME mail encryption for everybody is a Good Thing.
>Now this is really scary. You consider pushing weak 40bit S/MIME on the
>internet users a GoodThing(TM)?  I think you need to sit down and rethink

40 bit?  Not good, but domestic versions are supposed to support 128;
maybe they don't in practice.  (NS 3.x was bloated enough that I haven't
upgraded to 4.x)   And getting people in the habit of using
crypto is a good thing.  

				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From onlineca at verisign.com  Mon Mar  2 17:30:21 1998
From: onlineca at verisign.com (VeriSign Digital ID Center)
Date: Mon, 2 Mar 1998 17:30:21 -0800 (PST)
Subject: Trial Class 1 VeriSign Digital ID
Message-ID: <199803030129.RAA27861@maguro-cm2.verisign.net>


QUICK INSTALLATION INSTRUCTIONS
-------------------------------

To assure that someone else cannot obtain a Digital ID that contains your 
name and e-mail address, you must retrieve your Digital ID from
VeriSign's secure web site using a unique Personal Identification
Number (PIN). 

Be sure to follow these steps using the same computer you used to
begin the process.

Step 1: Copy your Digital ID PIN number. 
Your Digital ID PIN is: 7278ce06ea0aedffb942b1b7468471a3

Step 2: Go to VeriSign's secure Digital ID Center at
https://digitalid.verisign.com/getid.htm

Step 3: Paste (or enter) your Digital ID personal identification
number (PIN), then select the SUBMIT button to install
your Digital ID.

That's all there is to it!

WELCOME TO THE CLUB
-------------------

Congratulations on obtaining a Trial Class 1 Digital ID(sm) from VeriSign!  
As a Trial Digital ID holder, you join millions of users who can send 
and receive secure e-mail using the built-in features of the latest 
versions of Netscape, Microsoft, and other popular e-mail packages.  
You also gain easy access to popular websites using your Digital ID 
instead of passwords and one-step registration at websites requesting Digital IDs.



Your Digital ID contains the following information:
Name or Alias: RANDOM Q. HACKER
E-mail Address: cypherpunks at toad.com

To find out more about where and how to use your Digital ID, please visit 
us at http://www.verisign.com/ or visit our Help Desk at 
http://www.verisign.com/help/index.html. 

And don't forget that you can enjoy the benefits of a Full Service Class 1 
Digital ID-including $1000 protection under the Netsuresm Protection Plan, 
directory services, and free replacement, renewal, and revocation of your 
ID 24 hours a day, 7 days a week --for only $9.95 (U.S.) a year.  
To upgrade, please visit our Digital ID Center at http://digitalid.verisign.com. 

Thank you for choosing VeriSign! We look forward to serving your future 
electronic commerce and communications needs.







From 10510344 at 30330.com  Mon Mar  2 17:47:16 1998
From: 10510344 at 30330.com (10510344 at 30330.com)
Date: Mon, 2 Mar 1998 17:47:16 -0800 (PST)
Subject: New Customers for your Neighborhood Business, Church, Practice...
Message-ID: <199702170025.GAA08056@mail.com>


You know that new customers are the lifeblood of any local
business; and WE CAN HELP YOU FIND MORE! 
 
That's because we know WHO'S NEW - those who recently
came to live in your market or service area. We can tell you
each month who and where they are, so that you can advertise
to them (eg by mail) before they have time to get established
with your rivals. 
 
Whether you own or manage a retail store, a clinic (medical,
dental, veterinary...), a church, club, a private school, beauty
salon, restaurant, professional office or bank - this is a prime
opportunity to gain MORE new clients and so to increase growth.  
 
What we can help you do is MORE THAN to replace customers  
who move away; to get more than your "share" of new arrivals
to Town, by putting YOUR name and special offer before them
at the very time they are making decisions about whom to
patronize.  
 
If you don't own or manage such an establishment, please pass  
this along to a friend who does. But if you do, find out more
details now from our Web site, which you can reach at 
 
http://www.famailcrt.com/c-am.com
 
Sincerely, 
 
Jim Davies 
 







From nobody at REPLAY.COM  Mon Mar  2 19:26:28 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Mon, 2 Mar 1998 19:26:28 -0800 (PST)
Subject: Is CDMF secure?
Message-ID: <199803030324.EAA18619@basement.replay.com>



Is CDMF secure? and,
What sort of algorithm is it?
Thanks.

        






From jya at pipeline.com  Mon Mar  2 19:31:16 1998
From: jya at pipeline.com (John Young)
Date: Mon, 2 Mar 1998 19:31:16 -0800 (PST)
Subject: The Bioweaponeers
Message-ID: <1.5.4.32.19980303033445.010a4ea0@pop.pipeline.com>


The New Yorker magazine of March 9 has a long shattering
essay on Ken Alibek, the former Soviet bioweapons expert,
William Patrick, the US's counterpart, the state of Russian 
secret bioweapons development, and prospects for the spread
and use of this WMD.

It's far more disturbingly detailed than the New York Times 
and ABC PrimeTime reports, and presents a horrific spectrum of 
gruesome details of nearly unimaginable catastrophe fermenting 
in secret laboratories and deepest black storage tanks.

If you thought nuclear weapons were terrifying, read this for a
shocking introduction to evil which will give even thermonuclear
warriors nightmares of helplessness.

Where Strangelovian physicists once ruled, now reign Mad
microbiologists.

Richard Preston is the writer, featured on PrimeTime and
author of The Hot Zone, on the Ebola virus.

For those without easy access to the magazine we offer a
copy:

   http://jya.com/bioweap.htm  (62K)







From blazer at mail.nevalink.ru  Mon Mar  2 21:13:37 1998
From: blazer at mail.nevalink.ru (Mike)
Date: Mon, 2 Mar 1998 21:13:37 -0800 (PST)
Subject: Newbie pgp question
In-Reply-To: <3.0.5.32.19980302002230.0092c210@popd.ix.netcom.com>
Message-ID: <34FB90E2.F5F@mail.nevalink.ru>


Bill Stewart wrote:
Thanks Bill for very good explanation.

> *I assume you're not the KGB or Mafia, because then you would just
> beat up the guy until he gives you the passphrase.

O-o! You are well informed in what is going on! The "guy" is in fact
pretty girl - one man's secretary, so those methods are not for this
case. But may be I'd better brute force her instead of her secring? :)
-- 

*******************************************
Mike Blazer
blazer at mail.nevalink.ru
*******************************************





From pleontks at hotmail.com  Mon Mar  2 21:18:47 1998
From: pleontks at hotmail.com (Perrin .)
Date: Mon, 2 Mar 1998 21:18:47 -0800 (PST)
Subject: Shave Slaughter '98
Message-ID: <19980303051804.28157.qmail@hotmail.com>


I have shut down all paint factories in the area.  Shaving cream war!!  
Pshhhhhh... splat!  Ha ha!  Who's laughing now?!  I own all of the 
shaving cream companies!  I own all of their stocks!  Shave Slaughter 
'98 has started.  Prepare to die.

Hairface

-------------------
I'm assuming it's the same rules as Paint War - Perrin
------------------
fixed by Perrin
pleontks at hotmail.com
http://members.tripod.com/~pleontks
http://www.angelfire.com/az/69frank69

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From sandfort at crl.com  Mon Mar  2 23:11:04 1998
From: sandfort at crl.com (Sandy Sandfort)
Date: Mon, 2 Mar 1998 23:11:04 -0800 (PST)
Subject: COSTUME BALL
Message-ID: 


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                          SANDY SANDFORT
 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Cypherpunks,

It's that time again.  My next gala costume ball is March 14th.
You are invited.  The full invitation is at:

		http://www.c2.net/~sandy/98mar.htm

Please read the invitation carefully.  The devil is always in the
details.

This notice is being sent via the Cypherpunks Announce List.  If
you don't want to be on the list, DON'T e-mail me.  I can't get
you off the list.  To get off the list, send e-mail to:

		majordomo at toad.com

As the first line of the message, write:

		unsubscribe cypherpunks-announce

Hope to see you on the 14th.

Regards,


 S a n d y

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From bill.stewart at pobox.com  Mon Mar  2 23:57:10 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Mon, 2 Mar 1998 23:57:10 -0800 (PST)
Subject: Is CDMF secure?
In-Reply-To: <199803030324.EAA18619@basement.replay.com>
Message-ID: <3.0.5.32.19980302235528.008dc220@popd.ix.netcom.com>


>Is CDMF secure?  and, What sort of algorithm is it?  Thanks.

CMDF is a version of DES watered down to 40-bit key strength.
I think IBM was to blame; it was designed for exportability.

It makes Louis Freeh feel secure, I guess, but it's not
useful for data that needs to be secure.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From 67471470 at 30410.com  Tue Mar  3 00:33:26 1998
From: 67471470 at 30410.com (67471470 at 30410.com)
Date: Tue, 3 Mar 1998 00:33:26 -0800 (PST)
Subject: LOWER YOUR CHILD SUPPORT!!!
Message-ID: <>



LOWER YOUR CHILD SUPPORT!!!

Don't be a DEADBEAT DAD!!!

Join the FATHERS' RIGHTS COALITION and learn how to legally reduce
your court-ordered child support WITHOUT AN ATTORNEY.Millions of FATHERS 
have been unjustly labeled as DEADBEAT DADS because they cannot afford 
to pay their child support due to factors beyond their control such as unemployment,
under employment, and unforeseen or unexpected expenses.

Most fathers are treated unfairly by the courts because they cannot afford the expense
of an attorney.  Even worse, fathers that employ an attorney to assist them in trying to 
obtain a child support reduction end up having to explain to the court why they can
pay an attorney and not pay child support. 

Failure to fully pay your child support can cause you to lose your drivers, business or
professional license.  As well, owing child support can ruin your credit rating and 
prevent you from obtaining employment.  Your failure to pay all of your child support 
can cause you to be jailed or imprisoned. Ignorance or inaction could totally ruin your life!

For only $49.90 you can join the FATHERS' RIGHTS COALITION and receive with
your membership the publication entitled REDUCE YOUR CHILD SUPPORT
WITHOUT AN ATTORNEY.

REDUCE YOUR CHILD SUPPORT WITHOUT AN ATTORNEY is an easy-to-read publication
which could instruct you as to the law and procedure required to obtain your right to a reduction 
from your present child support order.  As well, this publication will inform you on how to dispute 
and/or reduce past child support arrearages, interest and penalties.

As a member, you can also receive information on low-cost paralegal services which can assist 
you in preparation of the court forms necessary to reduce your child support..  

As a member, you will receive the FATHERS' RIGHTS COALITION NEWSLETTER.  
This newsletter contains information about recent changes in the child support laws and tips 
on presenting your case in court.As a member, you will be making a statement to the politicians 
that you're tired of being abused by the law and the courts.

Most importantly, as a member you can educate yourself in the court process and 
obtain your rights to due process and a fair child support order.

One of our members (who had only a high school education) was able to obtain a child support
order of $.00 dollars (zero) for over eighteen (18) months. (Superior Court of the State of California,
County of Siskiyou, Coonrod v. Coonrod, Case No. 35594)

TO JOIN fill in the application and mail to the address
with your one-time membership fee of $49.90.  
(Allow 2-4 weeks for delivery of REDUCE YOUR CHILD SUPPORT WITHOUT AN ATTORNEY)


Send the completed application with $49.90, one-time membership fee ,to:


				FATHERS RIGHTS COALITION
				702 Mangrove Ave.,  Suite 134
				Chico,  CA 95926


----------------------------------------------------------------------------------------------------- 

YES, I want to join the  FATHERS' RIGHTS COALITION.  I have enclosed $49.90 for the lifetime membership.  
Upon receipt of my application and membership, send me REDUCE YOUR CHILD SUPPORT WITHOUT AN ATTORNEY..
                               
                               E-Mail Address _________________
                                                                                                                                 002
		
                                Name______________________________________

 		Address______________________________________

		City__________________ State ________  Zip 	_________











From 67471470 at 30410.com  Tue Mar  3 00:33:26 1998
From: 67471470 at 30410.com (67471470 at 30410.com)
Date: Tue, 3 Mar 1998 00:33:26 -0800 (PST)
Subject: LOWER YOUR CHILD SUPPORT!!!
Message-ID: <>



LOWER YOUR CHILD SUPPORT!!!

Don't be a DEADBEAT DAD!!!

Join the FATHERS' RIGHTS COALITION and learn how to legally reduce
your court-ordered child support WITHOUT AN ATTORNEY.Millions of FATHERS 
have been unjustly labeled as DEADBEAT DADS because they cannot afford 
to pay their child support due to factors beyond their control such as unemployment,
under employment, and unforeseen or unexpected expenses.

Most fathers are treated unfairly by the courts because they cannot afford the expense
of an attorney.  Even worse, fathers that employ an attorney to assist them in trying to 
obtain a child support reduction end up having to explain to the court why they can
pay an attorney and not pay child support. 

Failure to fully pay your child support can cause you to lose your drivers, business or
professional license.  As well, owing child support can ruin your credit rating and 
prevent you from obtaining employment.  Your failure to pay all of your child support 
can cause you to be jailed or imprisoned. Ignorance or inaction could totally ruin your life!

For only $49.90 you can join the FATHERS' RIGHTS COALITION and receive with
your membership the publication entitled REDUCE YOUR CHILD SUPPORT
WITHOUT AN ATTORNEY.

REDUCE YOUR CHILD SUPPORT WITHOUT AN ATTORNEY is an easy-to-read publication
which could instruct you as to the law and procedure required to obtain your right to a reduction 
from your present child support order.  As well, this publication will inform you on how to dispute 
and/or reduce past child support arrearages, interest and penalties.

As a member, you can also receive information on low-cost paralegal services which can assist 
you in preparation of the court forms necessary to reduce your child support..  

As a member, you will receive the FATHERS' RIGHTS COALITION NEWSLETTER.  
This newsletter contains information about recent changes in the child support laws and tips 
on presenting your case in court.As a member, you will be making a statement to the politicians 
that you're tired of being abused by the law and the courts.

Most importantly, as a member you can educate yourself in the court process and 
obtain your rights to due process and a fair child support order.

One of our members (who had only a high school education) was able to obtain a child support
order of $.00 dollars (zero) for over eighteen (18) months. (Superior Court of the State of California,
County of Siskiyou, Coonrod v. Coonrod, Case No. 35594)

TO JOIN fill in the application and mail to the address
with your one-time membership fee of $49.90.  
(Allow 2-4 weeks for delivery of REDUCE YOUR CHILD SUPPORT WITHOUT AN ATTORNEY)


Send the completed application with $49.90, one-time membership fee ,to:


				FATHERS RIGHTS COALITION
				702 Mangrove Ave.,  Suite 134
				Chico,  CA 95926


----------------------------------------------------------------------------------------------------- 

YES, I want to join the  FATHERS' RIGHTS COALITION.  I have enclosed $49.90 for the lifetime membership.  
Upon receipt of my application and membership, send me REDUCE YOUR CHILD SUPPORT WITHOUT AN ATTORNEY..
                               
                               E-Mail Address _________________
                                                                                                                                 002
		
                                Name______________________________________

 		Address______________________________________

		City__________________ State ________  Zip 	_________











From afabbro at umich.edu  Tue Mar  3 01:12:07 1998
From: afabbro at umich.edu (andrew fabbro)
Date: Tue, 3 Mar 1998 01:12:07 -0800 (PST)
Subject: Hard Drive Encryption Packages Comparison (Win 95)
Message-ID: 



	Windows 95 Hard Drive Encryption Packages Comparison
        ----------------------------------------------------

  by Andrew Fabbro  
  3 March 1997

I've had several requests to post this to the cypherpunks list, and I'm
also posting it in the newsgroups where I originally asked for software
suggestions.  This list only compares FEATURES -- I have not done any
independent analysis of these products' claims and have not even tried
the evaluation copies of all of them.  This was originally just for my
own reference -- I've cleaned it up a bit but it isn't exhaustive, or
necessarily fair.

I'm sure there are other packages-- if you think I've left something
significant out, please let me know.  I'd also appreciate any
corrections or giggles at obvious errors in thought.

After getting some feedback/corrections, this will eventually be put on
the Web.

----------
DISCLAIMER
==========

I am just a Doc-Martens-and-earrings cypherpunk, not a security
consultant!  I am not a professional cryptologist, nor a Windows 95
expert.  You should NOT take my opinions at face value -- you should
evaluate these products yourself.  This list is just designed to give
you some starting points and save you some leg work.  Of course, I take
no responsibility, make nor warranties, blah blah...

----------------------------------------
INTRO: EXPLANATION OF LISTINGS AND TERMS
========================================

These packages all provide interface functionality beyond the simple
file-by-file encryption available with, say, PGP.  Either they provide
a drive interface or they allow you to designate a list of files which
are then transparently or automatically de/encrypted in some fashion.
If you have only a few files or anticipate only temporary or infrequent
de/encryption, then PGP or something similar would probably suffice.

I've separated this list into two categories using my own made-up
terms: Virtual Volume programs and File List programs.  VV programs
make a large file on your hard drive which is transparently available
to Win95 as a drive (similar to the way DriveSpace/DoubleSpace works).
Once you authenticate and mount the drive, everything else is
transparent.

With File List programs, you designate a list of files or folders that
you want encrypted.  The encryption package then en/decrypts these
either on-the-fly as you access them, or in bulk at boot-time/
shutdown-time.  Most offer individual file/folder manual operation as
well.  Unlike Virtual Volume programs, which pretty much all operate
the same way, there is a greater variation in interface with File List
programs, so evaluate closely before purchase.

In practice, the difference between Virtual Volume and File List
programs is not that great: you type your password once at login and
everything else is handled by the software.  The only difference is
that with File List programs, you have to designate files or folders,
which might be a more frequent task than designating a single drive.
On the other hand, all of your sensitive files may live in only a few
directories anyway, and File List programs let you place these
files/folders anywhere on your system, mingled in with non-encrypted
files.

There were a few packages which appear to operate in a truly manual
mode -- you decrypt before opening and then encrypt when you're
finished with the file (assuming you don't forget, or become lazy).  If
you're going to do this, just use PGP, which is likely already on your
system already, you little cypherpunk, you, and offers CAST, IDEA, and
Triple-DES.  Packages with manual-mode operation are under
"Manual-Operation Packages" at the end.  Norton is so vague about the
operation of "Your Eyes Only" on their web page that it is listed in
this section.

"Preview" refers to an evaluation copy-- if one is available for
download (be it crippleware or whatever), this field is marked Yes.

----------------
MY PERSONAL PICK
================

I'm still evaluating, but will likely settle on Kremlin.  Even though
virtual volumes seem easier to me, Kremlin has one must-have feature I
haven't found elsewhere: it addresses the Windows swapfile issue.
Windows' swapfile has raw hunks of memory swapped out to disk, which
which could contain anything from any open file.  These swapfiles are
not reliably deleted at shutdown-time, or in the event of a system
crash, and in any event Windows certainly doesn't securely (DoD-style)
delete them.  Some snooper with a boot disk, file recovery utility, and
hex editor could stop by and read previous memory images...talk about
data leakage.

None of these packages allow you to encrypt the swapfile while Windows
is running, but Kremlin's Sentry does the next best thing.  At
shutdown-time, it securely deletes the swapfile and other temp files,
wiping the drive DoD-style.  The fact that Kremlin's design was
obviously thought out from the perspective of an integrated platform
and took this issue into account gives me a warm fuzzy feeling.  Also,
Kremlin offers the most diverse array of algorithms and has some nice
extras, such as a secure Recycle Bin, which is easier to use than
having to remember to run a special secure delete command from the
context menu.  And it's only $35!

If I were administering a site-wide encryption program, I might choose
something that was designed for that environment and offered more
administrative options.  I've made notes on packages which address this
situation and its issues.

----------
SIDE NOTES
==========

BLOWFISH was specifically designed to be fast in software
implementations on 32-bit processors and would likely be the fastest
algorithm you can pick.  I've not noticed any lag when using
BLOWFISH-based systems on a 486-66 w/32MB RAM (hardly a fast machine).

Some publishers only specified a "Genuine RSA Encryption Engine,"
displaying a RSA-licensed logo.  This isn't snake oil, but I'd sure
like to know more about the crypto.

-----------------------
VIRTUAL VOLUME PACKAGES
=======================

Product      : BestCrypt
Manufacturer : Jetico, Inc.
Type         : Virtual Volume
Crypto       : BLOWFISH, GOST, DES
Features     : timeout close, hotkey close, secure delete
Cost         : $89.95
Preview?     : Yes - 30 day trial, after expiration, volume becomes read-only
Web          : http://www.jetico.sci.fi/np_new.htm
Notes        : Joel McNamara (Private Idaho's author) picks this for
	       his Cryptobook specification (see
	       http://www.eskimo.com/~joelm/cryptbk.html).  A
	       completely free and very well-designed DoD-spec file
	       deletion utility is available at Jetico web site, too,
	       as a separate freeware package (BCWipe - get it!)


Product      : SafeHouse
Manufacturer : PC Dynamics
Type         : Virtual Volume
Crypto       : BLOWFISH, FAST, DES/Triple DES
Features     : Configurable passwords/expirations, optional key recovery,
               C++ developer's toolkit available.
Cost         : $79.95
Preview?     : Yes - free trial version with 40-bit DES
Web          : http://www.pcdynamics.com/SafeHouse/
Notes        : key recovery is optional- you can choose to "brand" the
	       volume or not.


Product      : Private Disk (in beta)
Manufacturer : Private Data, Inc.
Type         : Virtual Volume
Crypto       : Not specified - "strong" versions for US/Canada
Features     : 
Cost         : not listed
Preview?     : Beta participation program
Web          : http://www.privatedata.com/
Notes        : I mention this only for die-hard cypherpunks who want
	       to try new toys and might be interested in beta
	       participation.


------------------
FILE LIST PACKAGES
==================

Product      : Kremlin
Manufacturer : Mach5
Type         : File List
Crypto       : CAST, IDEA, BLOWFISH, RC4, Safer SK-128, DES, and NewDES
Features     : Automatic Decrypt/Encrypt at Login/out, includes a secure
               text editor/e-mail package, secure Recycle Bin, Sentry
               program to automate swap/temp/other-file wiping.
Cost         : $35
Preview?     : Yes
Web          : http://www.mach5.com/kremlin/
Notes        : This is a very nice package and my personal pick -- see
	       my notes in the intro.


Product      : RSA SecurePC
Manufacturer : Security Dynamics, Inc.
Type         : File List 
Crypto       : RC4
Features     : Trustee threshold key recovery system, boot lock, screen lock,
               network support, password expiration/rule management
Cost         : Not listed, and I was too lazy to make a phone call to find out
Preview?     : Yes
Web          : http://www.securitydynamics.com/solutions/products/securpc.html
Notes        : The key-recovery system is very well-thought out and
	       involves trustee thresh-holds -- i.e., you can decide
	       that three (or seven or whatever) administrators'
	       signatures are necessary to recovery a key...prevents
	       malicious admins' snooping.  The admin support (for
	       site-wide usage) is also nice.  This product was
	       formerly published by RSA, who now licenses it to
	       Security Dynamics.  This looks like a very well-designed
	       package with many extras for group-use situations,
	       though more crypto options would be nice.


Product      : SecureWin
Manufacturer : Cipher Logics 
Type         : File List
Crypto       : RSA Public.  No further details were specified.
Features     : SecureWin is more of an integrated security environment
	       than just a hard drive encryptor -- it also includes
	       secure deletions, e-mail integration, a password keeper,
	       etc.  There is an extensive access-control facility.
	       Operates via a "secure Start menu," a taskbar add-on.
	       Network support.
Cost         : $29.95 
Preview?     : Yes - 30 day evaluation download.
Web          : http://www.securewin.com/ 
Notes        : Very well done from a user interface point of view and
	       has numerous cool add-ons.  I wish more information was
	       given on the crypto and its implementation.


Product      : F-Secure Desktop
Manufacturer : Data Fellows
Type         : File List 
Crypto       : Triple-DES ("168-bit"), BLOWFISH
Features     : 
Cost         : $99
Preview?     : No
Web          : http://www.datafellows.com/f-secure/desktop/
Notes        : Normally, you specify a set of folders/files to be
	       de/encrypted at login/out.  Alternatively, you can list
	       files as "Top Secret," which means you must manually
	       de/encrypt them via context menu.


Product      : DataGuard
Manufacturer : Secure Services Link, Ltd.
Type         : File List
Crypto       : IDEA, SEAL
Features     : extensive class-based access control, trustee-threshold
               key recovery system
Cost         : $69
Preview?     : No
Web          : http://www.sls.net/dataguard_v2.html
Notes        : The class-based access control lists appear to offer
	       highly configurable access control: classes of data
	       (e.g., workgroup or by sensitivity or whatever), with
	       access rights offered by right to select users.  You can
	       also set "minimum eyes" thresholds for groups-- e.g.,
	       all members or certain members must be present for
	       access to be given.  Encryption or decryption rights can
	       be separated.  This would be very nice for site-wide
	       situations, except...the basic package does not offer
	       network support.  "Pro" and "Net" packages which do are
	       slated for April '98 release.


-------------------------
MANUAL-OPERATION PACKAGES
=========================

Product      : SAFE Folder
Manufacturer : GlobeTech Catana
Type         : File List, Semi-Manual
Crypto       : BLOWFISH
Features     : 
Cost         : $58.75
Preview?     : Yes - password fixed to "DEMO"
Web          : http://www.globetech.se/safe/
Notes        : From the web page, I infer that you have to manually
	       de/encrypt files.  It can operate at a folder level,
	       which is at least some improvement over file-by-file
	       operation.  I didn't see any reason why this product
	       would be better than any of those listed above.


Product      : Your Eyes Only
Manufacturer : Norton (Symantec)
Type         : File List, Manual?
Crypto       : It uses a "Genuine RSA Encryption Engine".
Features     : boot-time lock, screen lock, uses context menu,
               network support
Cost         : $89.95
Preview?     : No
Web          : http://www.symantec.com/yeo/index_product.html	
Notes        : I couldn't tell if this operated in some sort of
	       transparent or automatic fashion like other file list
	       programs, or if you had to encrypt/decrypt each folder
	       manually.  A screen shot shows a user using a context
	       meny that has "Enable SmartLock Folder" and "Disable
	       SmartLock Folder," which implies some non-manual mode of
	       operation.  E-mail to Symantec asking for more
	       information (and details on their crypto) went
	       unanswered.  There is also an administrator's version of
	       this program.


Product      : Stealth Encryptor
Manufacturer : Tropical Software, Inc.
Type         : File List
Crypto       : BLOWFISH, DES ("64-bit")
Features     : installable crypto modules (via .DLL, development kit 
               available), secure delete, e-mail integration
Cost         : $34.95
Preview?     : Yes
Web          : http://www.tropsoft.com/stealth/
Notes        : This package's unique feature is its support for
	       drop-in crypto modules.  Theoretically you could write
	       your own .DLL with another crypto system of your choice
	       and Stealth Encryptor would integrate it.  If you have a
	       burning desire to do this, you might look into this.  SE
	       also features "Stealth Media Encryption" which is "super
	       speed" for image files, executables, etc...presumably
	       with weaker crypto.


Product      : SecureStore 
Manufacturer : Selom Ofori
Type         : Manual
Crypto       : BLOWFISH, DES/Triple-DES, CAST, RC4, Diamond2 
Features     : 
Cost         : $30
Preview?     : Yes
Web          : http://www.freeyellow.com/members/renegade/
Notes        : SecureStore creates archives into which you can
	       place files.  From what I saw on their web site, to
	       access aid files, you have to pull them out of the
	       archive again.  While the screen shots show some nice
	       displays (e.g., which crypto used, compression ratio,
	       etc.), this mode of operation does not appeal to me.


Product      : Pretty Good Privacy (PGP)
Manufacturer : PGP, Inc. (well, Network Associates now, I guess)
Type         : Manual
Crypto       : CAST, IDEA, Triple-DES
Features     : Too many to list.
Cost         : Free
Preview?     : Yes
Web          : http://www.pgp.com/
Notes        : Listed just for the sake of completeness.  And it's
	       not at all bad for manual encrypt/decrypt -- version 5.5
	       has a nice toolbar and tray interface.  But you'll want
	       it for all the other messaging features anyway...








From E.J.Koops at kub.nl  Tue Mar  3 02:18:28 1998
From: E.J.Koops at kub.nl (Bert-Jaap Koops)
Date: Tue, 3 Mar 1998 02:18:28 -0800 (PST)
Subject: Crypto Law Survey updated
Message-ID: <62D6BE0479@frw3.kub.nl>


I have just updated my survey of existing and envisaged cryptography
laws and regulations. See the Crypto Law Survey at
http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm

This update includes:
-update on European Union (ETSI on TTP; Eckhert statement; 
     COM (97) 503 "not important"; Birmingham conference), 
     Council of Europe (PC-CY), Belgium (law amended),
     Canada (crypto policy discussion paper), France (Lorentz report),
     Gemany (Sandl statement; no backdoor in Pluto), Israel (export
     revision), Netherlands (proposals to extend decryption command;
     TTP project; encrypt to "seize"; use remains free), Scandinavia
     (PSS no longer Nordic), United Kingdom (policy announcement
     delayed; SfL resolution), United States (interim export rule;
     California resolution; czar travels; Compsec Enhancement Act;
     Kerrey McCain revised; AES conference) 
-corrections on Estonia (controls were reported), Switzerland (telecom > radio)
-clarification on Wassenaar Arrangement (General Software Note),
     Germany (export), Israel (case-by-case decisions), Sweden
     (Internet export), US (SAFE versions) 
-URL added to Canada (gov PKI), Hong Kong (export)

Kind regards,
Bert-Jaap

---------------------------------------------------------------------
Bert-Jaap Koops                         tel     +31 13 466 8101
Center for Law, Administration and      facs    +31 13 466 8149
Informatization, Tilburg University     e-mail  E.J.Koops at kub.nl
                  --------------------------------------------------
Postbus 90153    |  This world's just mad enough to have been made  |
5000 LE Tilburg  |    by the Being his beings into being prayed.    |
The Netherlands  |                (Howard Nemerov)                  |
---------------------------------------------------------------------
         http://cwis.kub.nl/~frw/people/koops/bertjaap.htm
---------------------------------------------------------------------





From JWRCLUM at aol.com  Tue Mar  3 06:24:12 1998
From: JWRCLUM at aol.com (JWRCLUM)
Date: Tue, 3 Mar 1998 06:24:12 -0800 (PST)
Subject: Medical Privacy Alert
Message-ID: 


AMERICAN CIVIL LIBERTIES UNION OF MASSACHUSETTS
99 Chauncy Street, Suite 310, Boston, MA 02111
(617) 482-3170  Fax (617) 451-000


CONTACT:	John Roberts
(617) 482-3170     http://users.aol.com/mcluf/home.html

BENNETT-JEFFORDS BILL PLACES MEDICAL RECORD PRIVACY AT RISK

	The confidentiality of the doctor-patient relationship will be totally
undermined as medical records become widely available without patient
knowledge or consent.	

	BOSTON - February 27, 1998.   On Thursday 2/26/98 the United State Senate's
Labor and Human Resources Committee heard testimony concerning a bill proposed
by Senators Bennett and Jeffords that, if passed, would license the widespread
disclosure of personal medical information contained in files held by doctors,
hospitals, employers, educational institutions, and others.
	The bill which purports to be a privacy bill is, in fact, just the opposite.
It places virtually no restrictions on the disclosure of personal medical
records within health care entities (no matter how large and geographically
widespread) or to a long list of other entities and agencies including the
following:  
	-  any agents or contractors of the health care entities 
	-  Public Health Agencies, Oversight Agencies
	-  Health Care Accreditation Agencies
	-  State Health Care Databases

There are major loopholes in access provisions for
	-  Health Care Researchers
	-  "Outcome" analysts ("cost/benefit" analysts for hospitals, HMO's,
insurers, etc)
	
	Even law enforcement agencies will have easy access to browse computerized
medical record systems for so-called "legitimate" investigatory purposes.
This will make every American's medical record part of a new massive law
enforcement database.
	The bill will destroy the confidential "doctor-patient relationship" and
replace it with a new "patient-health care industry relationship."
	"This bill serves only the interests of the burgeoning health care industry,"
said John Roberts, Executive Director of the ACLU of Massachusetts.  "It
allows the transfer of your medical records to many entities that stand to
profit from its information.  Gone is doctor-patient confidentiality.  Your
doctor cannot protect your most sensitive medical information from many
entities outside your medical facility.  Even employers who have health plans
are considered 'health care providers' in the Bennett-Jeffords bill.  How many
of us want our employers to have access to any of our medical records without
our knowledge or consent?"  
	The bill will also
	-  Impose requirements that patients sign blanket consent forms for release
of information as a condition of getting treatment, even for self-pay patients
	- Redefine "treatment" to make the patient's record a subject of continuous
research
	- Blur the boundaries between individual patient care and the so-called
"Population Management" and "Disease System Management"
	The bill will pre-empt all state laws which may be more protective of the
confidentiality of medical records.
	The bill will not apply even its own minimal privacy protections to so-called
"non-identifiable" medical records information.  But...interestingly, the bill
also refers to issuing "keys" to re-identify previously purportedly "non-
identified" information.  A formal logical analysis of this reveals that the
bill itself admits that what it calls "nonidentifiable" medical record
information is actually identifiable (i.e. containing patient information).
	The ACLU of Massachusetts believes that what is really needed for medical
privacy protection would be the following:
	-  Federal law should set a foundation or floor of privacy protection
	-  State laws which are more-protective of patient's rights should not be
preempted 
	-  No "Unique Patient Identification Numbers"
	-  No electronic "linkage" of patient records stored in various sites
	-  Computerized patient records must be encrypted with keys provided only to
those directly involved in the individual patient care
	-  The right of the individual patient to contract directly with physicians
and health care providers regarding the privacy of the patient's medical
records.

	-end-







From b093161c at bc.seflin.org  Tue Mar  3 09:08:58 1998
From: b093161c at bc.seflin.org (Michael Camp)
Date: Tue, 3 Mar 1998 09:08:58 -0800 (PST)
Subject: No Subject
Message-ID: 



help b093161c at bc.seflin.org






From honig at otc.net  Tue Mar  3 11:38:51 1998
From: honig at otc.net (David Honig)
Date: Tue, 3 Mar 1998 11:38:51 -0800 (PST)
Subject: Radio Frequency Warfare Hearing
In-Reply-To: <1.5.4.32.19980228131755.00718780@pop.pipeline.com>
Message-ID: <3.0.5.32.19980303110231.007f1270@otc.net>


At 12:56 PM 3/2/98 -0800, bill.stewart at pobox.com wrote:
>At 08:17 AM 2/28/98 -0500, John Young wrote:
>>We offer the lengthy prepared testimony at the Joint 
>>Economic Committee hearing February 25 on "Radio Frequency 
>>Weapons and Proliferation: Potential Impact on the Economy."
>>  http://jya.com/rfw-jec.htm  (112K)
>
>John!  You can't do that!  That's putting bomb-making information
>on the Internet!  

Its not bomb-making, its destructive testing apparatus :-)

>On a slightly more serious note, I'm surprised from the
>excerpts of the description that the $500 of parts would
>generate enough joules of electrical energy induced into
>sensitive parts of computer equipment in some reasonable range
>to do a lot of damage.

Wasn't he talking about EMI, not actual frying of chips (e.g.,
puncturing the 100's-of-nm-thick gate oxides in MOS)?
I read only the excerpt, but isn't a spark gap used for 
generating a broad spectrum, including fairly high
frequencies (think tesla coil)?  

Digital circuits don't like transients in their signals.
High frequency RF is invasive.
Capacitors are cheap.



------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

"Moderation in temper is always a virtue; but moderation in principle is
always a vice." ---Thomas Paine







	
















From jya at pipeline.com  Tue Mar  3 11:58:47 1998
From: jya at pipeline.com (John Young)
Date: Tue, 3 Mar 1998 11:58:47 -0800 (PST)
Subject: Original Sources for Echelon
Message-ID: <1.5.4.32.19980303200229.010ba928@pop.pipeline.com>


Duncan Campbell has posted the message below on Echelon. 
Would anyone happen to have a copy of the 1988 New Statesman
article? If not, I'll dig it out of a library. More importantly, as 
Duncan asks, does anyone know of other original info on Echelon?

----------

Date: Mon, 02 Mar 1998 23:35:59
To: ukcrypto at maillist.ox.ac.uk
From: Duncan Campbell 
Subject: Original sources regarding the ECHELON sigint network

>>The New York times has recently run a story regarding a "telecommunications
>>interception network" operating in Europe.
>>My recollection is that news broke about this some time last year, thanks
>>to revelations in New Zealand. Sorry, I don't have a good reference to
>> hand.


The original and primary source for information on ECHELON is an article I
wrote in New Statesman magazine ten years ago : NS, 12 August 1988 :
"They've got it taped".  

In 1991, a UK World in Action programme added an important new detail about
the network, namely the presence of a DICTIONARY computer (a key part of
the system) at  GCHQ's processing centre in Westminster.  

In 1993, I produced a documentary for Channel 4 - "The Hill" which related
ECHELON to the work of the Menwith Hill NSA field station near Harrogate in
Yorkshire.  

In 1996, Nicky Hager in New Zealand described in his book "Secret Power"
the presence of DICTIONARY computers at two New Zealand sigint stations,
and gave extensive details of the local programming and tasking of the
ECHELON "dictionaries".  

Apart from these sources, so far as I am aware all the reports that are
around are derivative and reprocessed.  The European Parliament STOA
committee report from the "Omega Foundation" is in this category and was in
fact submitted rather more than a year ago.  If anyone is aware of any
other *original* publication on this topic, could they post it. The arrival
in the public domain of original information in this area is a rarity, yet
is the foundation for the only things we "know" about the scale of NSA/GCHQ
surveillance and processing. 

Duncan Campbell 







From pleontks at hotmail.com  Tue Mar  3 17:08:01 1998
From: pleontks at hotmail.com (Perrin .)
Date: Tue, 3 Mar 1998 17:08:01 -0800 (PST)
Subject: Fwd: Thoughts
Message-ID: <19980304010725.7222.qmail@hotmail.com>



Not So Deep Thoughts

Should vegetarians eat animal crackers?
If at first you don't succeed, skydiving is not for you.
The pen is mightier than the sword -- if the sword is very small and the
pen is real sharp.
If  you throw a cat out a car window, does it become kitty litter?
Call me insane one more time and I'll eat your other eye!
I didn't fight my way to the top of the food chain to be a vegetarian.
When it rains, why don't sheep shrink?
The two biggest problems in America are making ends meet and making
meetings end.
Stupidity got us into this mess.  Why can't it get us out?
The trouble with doing nothing is that you never know when you are
finished.
Money isn't everything, but at least it encourages relatives to stay in
touch.
If a stealth bomber crashes in a forest, does it make a sound?
A single fact can spoil a good argument.
Growing old is mandatory, but growing up is optional.
I do whatever my Rice Krispies tell me to.
Why do we sing "Take me out to the ball game" when we're already there?

----------------
fixed by Perrin
pleontks at hotmail.com
http://members.tripod.com/~pleontks
http://www.angelfire.com/az/69frank69

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From pleontks at hotmail.com  Tue Mar  3 17:22:57 1998
From: pleontks at hotmail.com (Perrin .)
Date: Tue, 3 Mar 1998 17:22:57 -0800 (PST)
Subject: Fwd: Taglines
Message-ID: <19980304012223.18225.qmail@hotmail.com>



   ***    Some Funny Taglines    *****

2 rules to success in life. 1. Don't tell people everything you know.
A good pun is its own reword.
A penny for your thoughts; $20 to act them out.
After silence, music comes closest to expressing the inexpressible.
Alcoholic:  Someone you don't like who drinks as much as you do.
All things are possible, except skiing through a revolving door.
Any man who can see through women is sure missing a lot.
Apathy Error:  Don't bother striking any key.
Blessed are the censors; they shall inhibit the earth.
Budget: A method for going broke methodically.
Can you think of another word for "synonym"?
Circle:  A line that meets its other end without ending.
Civilized people need love for full sexual satisfaction.
Cole's Law: Thinly sliced cabbage.
Conscience is what hurts when everything else feels good.
Consider what might be fertilizing the greener grass across the fence.
Death and taxes are inevitable; at least death doesn't get worse every =
year.
Defeat is worse than death because you have to live with defeat.
Despite the high cost of living, it remains popular.
Does Time pass? Yes, it does. How else can you explain Visa bills?
Don't use no double negatives, not never.
Don't sweat the petty things, just pet the sweaty things.
Don't eat the yellow snow.
Down with categorical imperatives.
Either I'm dead or my watch has stopped. =20
Electricity comes from electrons; morality comes from morons.
Everything in moderation, including moderation.
Familiarity breeds children.
Fast, Cheap, Good:  Choose any two.
Fools rush in -- and get the best seats in the house.
Give me chastity and continence, but not just now.  -- St. Augustine
Have an adequate day.
He has the heart of a little child...  it's in a jar on his desk.
He who dies with the most toys is nonetheless dead.
He who laughs last didn't get the joke.
Honesty is the best policy, but insanity is a better defense.
Horse sense is the thing a horse has that keeps it from betting on =
people.
Hospitality:  Making your guests feel at home, even though you wish they 
=
were.
How come wrong numbers are never busy?
I bet you have never seen a plumber bite his nails.
I do a lot of thinking in the john. Says a lot for my thoughts.
I have had a perfectly wonderful evening.  But this wasn't it.  -- =
Groucho Marx
I have seen the future and it is just like the present, only longer.  -- 
=
Albran
I like work; it fascinates me.  I can sit and look at it for hours.
I may not be the world's greatest lover, but number seven's not bad.  -- 
=
Allen
I never forget a face, but in your case I'll make an exception.  -- Marx 
=
I
will meet you at the corner of Walk and Don't Walk.
I never made a mistake in my life.  I thought I did once, but I was =
wrong.
I used to be lost in the shuffle.  Now I just shuffle along with the =
lost.
I want to die in my sleep like my father, not screaming like his =
passengers.
I will always love the false image I had of you.
I would give my right arm to be ambidextrous.
I would like to help you out.  Which way did you come in?
If at first you don't succeed, destroy all evidence that you tried.
If at first you don't succeed, you probably didn't really care anyway.
If at first you do succeed, try to hide your astonishment.
If it wasn't for muscle spasms, I wouldn't get any exercise at all.
If it were truly the thought that counted, more women would be pregnant.
If there is no God, who pops up the next Kleenex?  -- Art Hoppe
If time heals all wounds, how come bellybuttons don't fill in?
If today is the first day of the rest of your life, what was yesterday?
Illiterate?  Write for free help.
In order to get a loan you must first prove you don't need it.
It doesn't matter whether you win or lose -- until you lose.
It is a miracle that curiosity survives formal education.  -- Albert =
Einstein
It is better to have loved and lost than just to have lost.
It is not an optical illusion, it just looks like one.  -- Phil White=20
It was a brave man that ate the first oyster.
I'll procrastinate...tomorrow.
I'll race you to China.  You can have a head start.  Ready, set, GO!
Keep a very firm grasp on reality, so you can strangle it at any time.
Keep stress out of your life.  Give it to others instead.
Knocked; you weren't in.  -- Opportunity=20
Know what I hate most?  Rhetorical questions.  -- Henry Camp=20
Laugh at your problems; everybody else does.
Laugh, and the world ignores you.  Crying doesn't help either.
Lead me not into temptation.  I can find it myself.
Life is like a fountain...  I will tell you how when I figure it out.
Life is like an analogy.
Make a firm decision now...  you can always change it later.
Male zebras have white stripes, but female zebras have black stripes.
May you die in bed at 95, shot by a jealous spouse.
Money DOES talk -- it says good-bye.
Most of us hate to see a poor loser. Rich winners, though, are worse.
Mr. Bullfrog sez:  Time is fun when you're having flies.
My name is Annie Key. Ouch! Why are you hitting me?!
My mother is a travel agent for guilt trips.
My opinions might have changed, but not the fact that I am right.
Never deprive someone of hope; it may be all they have.
Never put off till tomorrow what you can ignore entirely.
Never forget: 2 + 2 =3D 5 for extremely large values of 2.
Never hit a man with glasses.  Use your fist.
Next time you wave at me, use more than one finger, please.
No prizes for predicting rain.  Prizes only awarded for building arks.
Nobody ever goes there, it's too crowded. (I've actually HEARD this!)=20
Nothing cures insomnia like the realization that it is time to get up.
One good turn usually gets most of the blanket.
Our policy is, when in doubt, do the right thing.  -- Roy Ash=20
Out of the mouths of babes does often come cereal.
People who think they know everything greatly annoy those of us who do.
Politics: n. from Greek; "poli" - many; "tics" - ugly, bloodsucking =
parasites.
Quidquid latine dictum sit, altum viditur.  (Anything in Latin sounds =
profound.)
Radioactive cats have 18 half-lives.
Some people would not recognize subtlety if it hit them on the head.
Someday you will get your big chance -- or have you already had it?
Sometimes you're the bug, and sometimes you're the windshield.
Sometimes a cigar is just a cigar.  -- Sigmund Freud=20
Stealing a rhinoceros should not be attempted lightly.
That was Zen; this is Tao.
The generation of random numbers is too important to be left to chance.
The trouble with political jokes is that they get elected.
The secret of success is sincerity.  Once you can fake that, you have it 
=
made.
The death rate on Earth is: .... (computing) .... One per person.
The most enjoyable form of sex education is the Braille method.
The number watching you is proportional to the stupidity of your action.
The trouble with being punctual is that no one is there to appreciate =
it.
There are 3 kinds of people: Those who can count and those who can't.
There must be more to life than sitting wondering if there is more to =
life.
They laughed when I said I'd be a comedian. They aren't laughing now.
This aphorism would be seven words long if it were six words shorter.
This will be a memorable month -- no matter how hard you try to forget =
it.
This is the sort of English up with which I will not put.  -- Winston =
Churchill
This sentence contradicts itself: no, wait, actually it doesn't.
To err is human.  To admit it is a blunder.
To err is human.  To blame someone else for your errors is even more =
human.
Toe:  A part of the foot used to find furniture in the dark.  -- Rilla =
May=20
Two wrongs don't make a right, but three lefts do.
Under capitalism, man exploits man.  Under communism, it is just the =
opposite.
We aren't sure how clouds form.  But they know, that is what counts.
What is mind?  No matter.  What is matter?  Never mind.  -- Thomas 
Key=20
What if there were no hypothetical situations? --Andrew Kohlsmith=20
When you are in it up to your ears, keep your mouth shut.
When professors want your opinion, they'll give it to you.
Where there is a will, there is an Inheritance Tax.
Why don't "minimalists" find a shorter name for themselves?
Why is "abbreviated" such a long word?
Why take life seriously? You're not coming out of it alive anyway!
Why isn't "phonetic" spelled the way it's said?
Winning isn't everything, but losing isn't anything.
You simply *must* stop taking other people's advice.
You can fool some of the people some of the time, and that is =
sufficient.
You have the capacity to learn from mistakes.  You will learn a lot =
today.
Your lucky number is 364958674928.  Watch for it everywhere.

----------
fixed by Perrin
pleontks at hotmail.com
http://members.tripod.com/~pleontks
http://www.angelfire.com/az/69frank69

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From sherman at cs.umbc.edu  Tue Mar  3 20:01:30 1998
From: sherman at cs.umbc.edu (Dr. Alan Sherman)
Date: Tue, 3 Mar 1998 20:01:30 -0800 (PST)
Subject: Barry Smith (FBI) to speak this Friday at 3:30pm
Message-ID: 


   The UMBC Security Technology Research Group presents

     A Law-Enforcement Perspective on Encryption Policy

			Barry Smith
	       Supervisory Special Agent, FBI

	    moderated by journalist Peter Wayner

		      3:30pm - 5:00pm
		   Friday, March 6, 1998
		      Lecture Hall III
	       University of Maryland, Baltimore County
    http://www.cs.umbc.edu/events/spring98/crypto.shtml

The second lecture and discussion in a two-part forum on
encryption policy.  Journalist Peter Wayner will introduce
and moderate the event, which is free and open to the
public.  In Part I, freedom activist John Gilmore and Fritz
Fielding (Ex-Associate General Councel, NSA) gave their
divergent views, focusing on the Burnstein case.

Barry Smith will articulate the needs of law enforcement to
conduct lawful wiretaps; he will advocate the use of
key-recovery techniques to achieve this end as a way that
provides adequate privacy to law-abiding citizens.

Schedule: The event will begin with a brief (10 minute)
introduction by Peter Wayner.  Following Barry Smith's talk,
which will last approximately 45 minutes, there will be an
opportunity to ask questions for approximately 20-30
minutes.

Questions: Attendees are encouraged to ask questions in
advance by sending email to sherman at cs.umbc.edu

Directions: Take Exit #47B off interstate I-95 and follow
signs to UMBC.  LH III is in the Administration Building,
adjacent visitor's parking lot near the I-95 entrance to
UMBC.  

Host: Dr. Alan T. Sherman
      Associate Professor, Computer Science
      sherman at cs.umbc.edu
      http://www.umbc.edu
      (410) 455-2666

     This event is held in cooperation with the UMBC
	       Intellectual Sports Council
		       Honors College
	       Phi Beta Kappa honors society
                   CMSC Council of Majors
		   IFSM Council of Majors
		ACM Student Chapter at UMCP







From frantz at netcom.com  Tue Mar  3 23:32:30 1998
From: frantz at netcom.com (Bill Frantz)
Date: Tue, 3 Mar 1998 23:32:30 -0800 (PST)
Subject: Is CDMF secure?
In-Reply-To: <199803030324.EAA18619@basement.replay.com>
Message-ID: 


At 11:55 PM -0800 3/2/98, Bill Stewart wrote:
>>Is CDMF secure?  and, What sort of algorithm is it?  Thanks.
>
>CMDF is a version of DES watered down to 40-bit key strength.
>I think IBM was to blame; it was designed for exportability.

Well, to IBM's credit, they didn't call it secure.  They called it a Data
Masking Facility.


-------------------------------------------------------------------------
Bill Frantz       | Market research shows the  | Periwinkle -- Consulting
(408)356-8506     | average customer has one   | 16345 Englewood Ave.
frantz at netcom.com | teat and one testicle.     | Los Gatos, CA 95032, USA







From hvdl at sequent.com  Tue Mar  3 23:51:39 1998
From: hvdl at sequent.com (Unicorn)
Date: Tue, 3 Mar 1998 23:51:39 -0800 (PST)
Subject: DDJ Crypto CD has arrived!
In-Reply-To: <34F25310.2A29@ziplink.net>
Message-ID: <19980304083749.53098@sequent.com>


--- On Mar 02, Random User apparently wrote -----------------------------------

> On Mon, 23 Feb 1998, Peter Trei wrote:
> 
> > Well, it's finally here.
> 
> It has also arrive in Canada.

So when will it arrive outside of the US and Canada? ;-)

--- and thus sprach: Random User  ---------------------

Ciao,
Unicorn.
-- 
======= _ __,;;;/ TimeWaster (GSM: +31 653 261 368) =========================
     ,;( )_, )~\| A Truly Wise Man Never Plays   PGP: 64 07 5D 4C 3F 81 22 73
    ;; //  `--;     Leapfrog With A Unicorn...        52 9D 87 08 51 AA 35 F0
==='= ;\ = | ==== Youth is not a time in Life, It is a State of Mind! =======






From bill.stewart at pobox.com  Wed Mar  4 01:48:06 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Wed, 4 Mar 1998 01:48:06 -0800 (PST)
Subject: 
In-Reply-To: 
Message-ID: <3.0.5.32.19980304014614.00874cc0@popd.ix.netcom.com>


At 12:09 PM 3/3/98 -0500, Michael Camp wrote:
>
>help b093161c at bc.seflin.org
>
>
>
cypherpunks-request at algebra.com
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From shamrock at cypherpunks.to  Wed Mar  4 03:08:42 1998
From: shamrock at cypherpunks.to (Lucky Green)
Date: Wed, 4 Mar 1998 03:08:42 -0800 (PST)
Subject: DDJ Crypto CD has arrived!
In-Reply-To: <19980304083749.53098@sequent.com>
Message-ID: 


On Wed, 4 Mar 1998, Unicorn wrote:

> --- On Mar 02, Random User apparently wrote -----------------------------------
> 
> > On Mon, 23 Feb 1998, Peter Trei wrote:
> > 
> > > Well, it's finally here.
> > 
> > It has also arrive in Canada.
> 
> So when will it arrive outside of the US and Canada? ;-)

It hasn't yet? These Cypher Criminals are losing their edge.

-- Lucky Green  PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"






From declan at well.com  Wed Mar  4 13:16:11 1998
From: declan at well.com (Declan McCullagh)
Date: Wed, 4 Mar 1998 13:16:11 -0800 (PST)
Subject: Senator plans to ban .gov porn-parodies; new crypto-campaign
Message-ID: 




---------- Forwarded message ----------
Date: Wed, 4 Mar 1998 13:15:35 -0800 (PST)
From: Declan McCullagh 
To: politech at vorlon.mit.edu
Subject: Senator plans to ban .gov porn-parodies; new crypto-campaign

More on Gates in NYC and the FBI's antihacker crusade is at
the URL below. --Declan

===========

http://cgi.pathfinder.com/netly/afternoon/0,1012,1782,00.html

The Netly News / Afternoon Line
March 4, 1998

Loin-cloth

   One lawmaker who doesn't seem to have much of a sense of humor about
   titillating web sites is Sen. Lauch Faircloth (R-N.C.). When his
   presumably technology-impaired staffer stumbled across whitehouse.com
   and found not Hillary Clinton's child care proposals but a doctored
   photo of Hillary in leather, Faircloth decided to take action. "I plan
   to introduce legislation that would ban the assignment of popular
   government agency names to anyone," he told The Netly News after
   speaking at an Internet child safety seminar this afternoon. "Can you
   imagine how many people have thought they were contacting the White
   House only to see that?" A better question might be which site is the
   more popular one. --By Declan McCullagh/Washington

Might Makes Right

       Congress rarely does the right thing for the right reason.Instead,
   lobbyists vie to make voting the wrong way too politically costly for
   legislators.

       Now a new coalition, called Americans for Computer Privacy, is
   trying out this strategy on encryption legislation. The group of high
   tech firms and nonprofit groups aims to convince lawmakers that
   supporting restrictions on either the domestic use or overseas
   shipment of encryption productions is too politically painful.

       "We would not turn the keys to our front doors over the
   government. Why should we have to turn over the keys to our
   computers?" asked ACP counsel and former White House lawyer Jack
   Quinn.
   
         To convince Americans that ACP's answer is the right one, the
   coalition has gathered together an advisory panel of former spooks and
   law enforcement agents.

       Quinn told the Netly News that his strategy has already won
   results: "Senior officials at the National Security Council and the
   vice president's office" this morning signaled they're willing to sit
   down at the table for a friendly chat about crypto-laws. --By Declan
   McCullagh/Washington









From mkwan at preston.net  Wed Mar  4 15:13:35 1998
From: mkwan at preston.net (Matthew Kwan)
Date: Wed, 4 Mar 1998 15:13:35 -0800 (PST)
Subject: DES bitslice S-boxes
Message-ID: <199803042313.KAA10987@preston-gw.preston.net>


I've been a bit out of touch with the subject for a while, so could
someone please bring me up to speed in the state of the art of DES
bitslice. In particular, what are the best gate counts for the S-boxes?

About a year ago I produced S-boxes with the following counts

        S-box   S1   S2   S3   S4   S5   S6   S7   S8
        Gates   95   84   89   77   96   87   86   88

(You can download them from http://www.cs.mu.oz.au/~mkwan/bitslice)

However, I was recently told that these have now been beaten by a
significant margin. I thought about it for a while, and came up with
some ideas that should improve the count, but I'd like to know what
I'm aiming for.

Any improvements I make will also be made freely available, so you
have an incentive to help me ;-)


mkwan





From nobody at REPLAY.COM  Wed Mar  4 16:29:36 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 4 Mar 1998 16:29:36 -0800 (PST)
Subject: ed yourdon on Y2k armaggedon
In-Reply-To: <199803022316.PAA18159@netcom16.netcom.com>
Message-ID: <199803050029.BAA15356@basement.replay.com>


>That said, I'll bet the first taker a dollar against a doughnut that 90%
>of U.S. nuke plants sail right through into the new millenium and don't
>even trip for any technical reason. (I won't bet against
>*political* reasons.)
>
>Why do I think so?
>
>Nuke plants are much less computerized than you might think.
>
>Many still use electromechanical relays to provide important logic
>functions.  Relays have a lot going for them - for instance you never have
>to worry about introduction of stupid software bugs.


What about real bugs introducing themselves into relays? :)

A few years ago a nuke plant wanted to build a computerized control system
and USNRC absolutely gave them hell, requiring them to document every damn
line of it and prove that it could handle all special cases.  But they did
finally approve it.





From honig at 206.40.207.40  Wed Mar  4 17:10:38 1998
From: honig at 206.40.207.40 (David Honig)
Date: Wed, 4 Mar 1998 17:10:38 -0800 (PST)
Subject: Win95/NT attack in CNN news
Message-ID: <3.0.5.32.19980304171023.0079bd10@206.40.207.40>



http://www.cnn.com/TECH/computing/9803/04/internet.attack.ap/


Hacker attack crashes
                    Windows systems
                    coast-to-coast

                    March 4, 1998
                    Web posted at: 10:05 a.m. EST (1505 GMT) 

                    SAN DIEGO (AP) -- Computer
                    security experts blame hackers for
                    an Internet attack that caused
                    computers running Microsoft's
                    Windows NT software to crash
                    from coast to coast, mostly in
                    government and university offices. 

                    While no real harm was done, it
                    was too early to gauge the full extent of the attack.
Experts said the
                    far-flung glitches could only have been the result of a
deliberate act,
                    The San Diego Union-Tribune reported Wednesday. 

                    The crash Monday night affected computers running
Windows NT
                    -- the operating system for larger computers and
networks -- and
                    Windows 95. 

                    Problems were reported at the Massachusetts Institute of
                    Technology, Northwestern University, the University of
Minnesota
                    and University of California campuses in Berkeley,
Irvine, Los
                    Angeles and San Diego. 

                    Unclassified Navy computers connected to the Internet
also crashed
                    on Point Loma and in Charleston, South Carolina,
Norfolk, Virginia,
                    and elsewhere. 

                    "It happened so fast," said Craig Huckabee, a research
associate in
                    the Computer Systems Laboratory at the University of
Wisconsin.
                    "In our department, I would have to say about 90
percent of the
                    machines were affected." 

                    Despite the coordination of the attack, the computers
that crashed
                    could be restarted without losing information, computer
security
                    experts said. 

                    The attackers used the Internet to broadly distribute a
snippet of
                    deliberately malformed data, said Ron Broersma, a
civilian computer
                    security expert at the Navy labs on Point Loma. 

                    The prank exploits a glitch in the Windows NT program by
                    instructing the computer to devote excessive memory
resources to
                    solve a problem that can't be solved. 

                    Microsoft security manager Ed Muth said the company is
working
                    on a software patch that fixes the vulnerability in
Windows NT
                    programs. 

                    An unidentified Microsoft executive told the
Union-Tribune it was
                    unknown if the attack was related to Microsoft Chairman
Bill Gates'
                    appearance Tuesday at a Senate hearing where he
defended his
                    company against allegations of antitrust violations. 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

"But if we have to use force, 
it is because we are America;
we are the indispensable nation."
---Secretary of State Madeleine K. Albright
http://www.jya.com/see-far.htm







	
















From mclow at owl.csusm.edu  Wed Mar  4 17:49:32 1998
From: mclow at owl.csusm.edu (Marshall Clow)
Date: Wed, 4 Mar 1998 17:49:32 -0800 (PST)
Subject: Win95/NT attack in CNN news
In-Reply-To: <3.0.5.32.19980304171023.0079bd10@206.40.207.40>
Message-ID: 


The best part about it was the quote on the front page of the
San Diego Union-Tribune:

"This is so weird, so widespread, and the press doesn't seem to know about
it," Broersma said. "Maybe it's because people are used to their Windows
software crashing all the time."

-- Marshall

Marshall Clow     Adobe Systems   

Warning: Objects in calendar are closer than they appear.







From billp at nmol.com  Wed Mar  4 18:51:16 1998
From: billp at nmol.com (bill payne)
Date: Wed, 4 Mar 1998 18:51:16 -0800 (PST)
Subject: Brickell and Sandia
Message-ID: <34FE12B4.6021@nmol.com>


Wednesday 3/4/98 6:59 PM

Orlin

While trying to recover from the stomach flu, I am going over your stuff
summarized at 

  http://www.aci.net/kalliste/dcguide.htm

You wrote at [Brickell-Gemmell-Kravitz.]
http://www.aci.net/kalliste/sandia.htm

  Sandia National Laboratories have created the digital cash equivalent
of the Clipper chip: an "anonymous"     
  digital cash system that would give participants privacy from all
viewers, except for the government agencies 
  that would control the secret keys required for backdoor access.

and  

  Why is Sandia interested in digital cash systems? Well, Sandia is
responsible for all non-nuclear components    
  of nuclear weapons.  The security of nuclear weapons depends partly on
cryptology. The code- breaking 
  National Security Agency (NSA), for example,  is responsible for the
communication security of the 
  Minuteman missile, as well as the codes by which the President must
identify himself to authorize a nuclear   
  strike.

Brickell and Simmons were in the COMPUTATIONAL/COMPUTER SCIENCES & MATH
CENTER,
directorate 1400, at Sandia.

I worked in the ELECTRONIC SUBSYSTEMS CENTER, directorate 2300, 
division 2311, when I was project leader of the Missile Secure
Cryptographic Unit, the small missile,  [between about 1982-86].

All of the nuclear bomb crypto implmentation work was done in 2300, not
1400.

The MAIN difference is that the 2300 people were a bunch of PRACTICAL
engineers and REAL-PRACTICAL software types.  NOT theoreticians.

Gus Simmon once tried to get into the implentation business.  

Simmons bought an Intel 320 [?] development system.  The Intel 320 was a
piece of junk and nothing happened with Simmons� implementation work.

Simmons� try, naturally, caught the attention of 2300 management, for
business reasons, of course.

I LOVE reading all of this stuff from a Sandia historical standpoint.

The REAL WORLD of Sandia crypto stuff in pockmarked by some REAL
SCREW-UPS.  Which all
of us implementers shared so as not to commit the same mistakes again.

I asked my department manager, Kent Parsons, how the screw-ups affected
him.  He responded that
it made him sleepy.  These were MULTI- if not HUNDREDS- million dollar
screw-ups.

Later
bill







From bill.stewart at pobox.com  Wed Mar  4 23:50:43 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Wed, 4 Mar 1998 23:50:43 -0800 (PST)
Subject: Digital Bearer Settlement
In-Reply-To: 
Message-ID: <3.0.5.32.19980304152937.007e0c20@popd.ix.netcom.com>


Nice article, and I'll have to see if I can get Ian
to talk about HINDE for this month's Bay Area Cypherpunks.

One thing I noticed while reading it, though, is that you still have
"and then you go to jail" at the end of some transaction failure branches,
though most of the failure branches end with "Nothing happens".
While you're not doing book entry at every step,
bearer instruments still depend on the maker honoring them,
whether it's exchanging the bank note for gold pieces
or trading the digicash bits for Federal Reserve Notes --
"then the banker goes to jail" can still happen,
and a digicash world may not have as many S&L Bailout
political favors as the Reagan Years provided.
Also, there are the transactions where you trade
digicash for goods&services, and there's still the problem
of making sure the goods&services got delivered,
making sure the payment got delivered, and dealing with
poor quality products.  For purely digital products,
like consulting hours, movies, and microcode, there are
protocols that can take care of the exchange,
but for goods&services involving real stuff,
like pizza delivery, there's still an element of
trust required.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From whgiii at invweb.net  Thu Mar  5 00:34:01 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Thu, 5 Mar 1998 00:34:01 -0800 (PST)
Subject: Digital Bearer Settlement
In-Reply-To: <3.0.5.32.19980304152937.007e0c20@popd.ix.netcom.com>
Message-ID: <199803050833.DAA19434@users.invweb.net>


-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980304152937.007e0c20 at popd.ix.netcom.com>, on 03/04/98 
   at 03:29 PM, Bill Stewart  said:

>Nice article, and I'll have to see if I can get Ian
>to talk about HINDE for this month's Bay Area Cypherpunks.

>One thing I noticed while reading it, though, is that you still have "and
>then you go to jail" at the end of some transaction failure branches,
>though most of the failure branches end with "Nothing happens". While
>you're not doing book entry at every step,
>bearer instruments still depend on the maker honoring them,
>whether it's exchanging the bank note for gold pieces
>or trading the digicash bits for Federal Reserve Notes --
>"then the banker goes to jail" can still happen,
>and a digicash world may not have as many S&L Bailout
>political favors as the Reagan Years provided.
>Also, there are the transactions where you trade
>digicash for goods&services, and there's still the problem
>of making sure the goods&services got delivered,
>making sure the payment got delivered, and dealing with
>poor quality products.  For purely digital products,
>like consulting hours, movies, and microcode, there are
>protocols that can take care of the exchange,
>but for goods&services involving real stuff,
>like pizza delivery, there's still an element of
>trust required.

Well there are a couple of different approaches depending on the
environment of the transaction.

If it is what I call a "cash and carry" environment where you, the
merchant, and the product are all physically in the same place then the
transaction can take place as any cash transaction would. the merchant
gives you the product, you give him the e-cash bits and the transaction is
done.

If the environment is a "mailorder" environmet where you and the merchant
are in remote locations then there are two different approaches:

- -- COD:

  You place the order, the merchant delivers it. At the time of delivery
you pay for the product.

- -- Escrow:

   You place the order. After placing the order you transfer your e-cash
bits into an escrow account. When the merchant has verification that the
bits are in escrow he ships the product. Upon recept of the product you
release the funds from the escrow account and the merchant is paid.

    Now with escrow based system you can be more creative with the product
insurance end of things. You an the merchant may agree that there will be
a 30 day trial period where the funds will stay in escrow and during that
period you can judge the quality of the product. If a complaint is filed
with the escrow agent within the 30 day period then you would have X
number of days to return the product and get your money back. Merchants
could set up warranty insurance where x% of sales are kept in an escrow
account to cover returns/warranties. All kinds of fun stuff could be done.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2, Windows/0

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNP5VyY9Co1n+aLhhAQGo+wQAtCHzRWIjR/LsSjn8PRTsXzOijfuplLkB
9JSB5nnb1OHaDUGEepx3K3a00yrXrLTQwO9xfopIu6kO7SEQ+miAMZbPRybLBgH/
6CBqr4/+83C+p3PK2KIPIwZkETp37C0/JSBgfjwn+W6XEREtEQxbUhqT6DaqgkPg
gr58Wb8lGRM=
=eJGN
-----END PGP SIGNATURE-----






From 01088496 at 17733.com  Thu Mar  5 06:36:16 1998
From: 01088496 at 17733.com (01088496 at 17733.com)
Date: Thu, 5 Mar 1998 06:36:16 -0800 (PST)
Subject: Your Trade Posting
Message-ID: <19943672.886214@relay.connect.com.au >


Dear Trader,

We saw your posting and would like more information... We are 
open to discovering a new product and true opportunity.

We would like to take this opprotunity to introduce ourselves 
as manufacturers and exporters for Hot-Selling products in 
these categories: Health Care, Personal Electronics, Security 
and Home & Gifts. More than that, we offer China price at 
Japanese quality. OEM projects are welcome.

Are you marketing on the Internet? If not, YOU SHOULD!!
              Discover the secrets of Online Marketing!
REACH "MILLIONS" - ABSOLUTELY FREE - WITH OUR AMAZING
NEW USER-FRIENDLY INTERNET MARKETING EMAIL SOFTWARE!
ELMED provides everything your company needs to communicate 
around the world, around the clock: manage a commercial email 
system, collect email addresses from multiple sources, create 
personalized messages, and email out to your list at the touch 
of a button. 

If we can further assist you, please do not hesitate to contact 
me directly at .

We look forward to being able to develop a long and mutually 
beneficial business relationship.

Best Regards,
Elmed International (China,HongKong,Cyprus) Ltd

Nikola


************** The products Every Home Will Want ***************

(*) LAUNDRY BALLS "CODE WASH"
    ANTI-BACTERIAL, HYPO-ALLERGENIC, ECONOMICAL SOAP SUBSTITUTE, 
    NON-TOXIC, ENVIRONMENTALLY SAFE, REUSABLE UP TO 750 TIMES
    Say Goodbye to Detergents !!!
    It's a whole new concept in washing that's so economical, 
    it saves time, energy, water and fabric softener. 

(*) FULLY AUTOMATIC TREATMENT APPARATUS  
    "World's Best Health Care Product"
    Effective pain & disease relief; Improves metabolism, 
    blood circulation, the nervous system and immunity function; 
    Gold medal EUREKA-Brussel

(*) BACK-STOP Gets Stolen Cars Back /ON-LINE AUTO ALARM/         
    Patented anti-theft paging facility that allows users to 
    immobilise a car being stolen, from a safe distance.    

(*) The World's Leading Internet Marketing Tools!
                       Get Your Business Noticed.
    You cannot successfully market your product, service, or MLM 
    on the Internet without our tools:
    - Precision WebPage Email Address Collector will begin searching 
      for targeted email addresses 
    - The World's Number #1 Bulletproof Bulk Email Software
    - The best Web Site Submission software available ! 
      Auto submits your Web Site to hundres of Major Search Engines.
    - The Web Position Analyser software to analyze, to track, and 
      to help you improve all your Internet search positions 

(*) IDEAL PRODUCTS FOR MAIL ORDER, TV SHOP, MLM, DIRECT MARKETING : 
    - OPTIMAX Internet Relaxation Tool   
    - "EINSTEIN" - A BRAIN WAVE ENHANCING MACHINE
    - CAMMY-BELLE Apparatus for Beautification & Weight Reduction
    - ROCKY-BO Magnetic Beauty-Fit Apparatus                  
    - WONDER CREAM Human body-cell potential activator                     
    - SLEEP SOOTHER (THE DREAM MACHINE)
    - $3.55 Personal Organizer (Data Bank)                         
    - A WONDERFUL WORLD OF SOUNDS - Talking Children's Books 
    - New Solar Products (lights, radio, premiums...)
      . . . AND MUCH MORE !!!






From rubin at research.att.com  Thu Mar  5 07:15:11 1998
From: rubin at research.att.com (Avi Rubin)
Date: Thu, 5 Mar 1998 07:15:11 -0800 (PST)
Subject: List of college and graduate courses in crypto and security
Message-ID: <199803051512.KAA08000@mgoblue.research.att.com>


I maintain a list of college and gruaduate level courses in security 
and cryptography at

   http://www.cs.nyu.edu/~rubin/courses.html

>From time to time, I like to update the list. If you know of
a full semester course in crypto or security that is not on my
list please let me know. URLs are especially useful. Also, if you 
see something on my list that is out of date, let me know.

Thanks,
Avi


*********************************************************************
Aviel D. Rubin                                 rubin at research.att.com
Secure Systems Research Dept.                Adjunct Professor at NYU
AT&T Labs - Research
180 Park Avenue                   http://www.research.att.com/~rubin/
Florham Park, NJ 07932-0971                    Voice: +1 973 360-8356
USA                                            FAX:   +1 973 360-8809

   --> Check out http://www.clark.net/pub/mjr/websec/ for a new
       book on web security (The Web Security Sourcebook).
*********************************************************************





From Ekkoh1 at aol.com  Thu Mar  5 08:12:34 1998
From: Ekkoh1 at aol.com (Ekkoh1)
Date: Thu, 5 Mar 1998 08:12:34 -0800 (PST)
Subject: WARNING!
Message-ID: <3557c8ad.34f8053e@aol.com>


Warning! You're about to see something great!  If you are interested, visit
this web site....

http://207.36.85.71




or click here!





From debiloo at juno.com  Thu Mar  5 09:46:09 1998
From: debiloo at juno.com (debiloo at juno.com)
Date: Thu, 5 Mar 1998 09:46:09 -0800 (PST)
Subject: $.03 PHONE CALLS?
Message-ID: <199803051746.JAA18767@cygint.cygnus.com>


$.03 PHONE CALLS?
1+ dialing and 800 incoming
Hard To Believe...  But TRUE
With the amazing new Technology, 
you'll see calls on your phone 
bill for $.06, $.04......even $.03
Best of all, it doesn't matter 
what company you're now using.
You don't need to switch carriers!

Call anytime and leave your name,phone #
and a representative will call you back with 
information the phone company 
never wanted you to find out about.

Don't wait , call now! you'll love what we 
have to share with you on this exciting 
New Technology!

Call:   Owen @ 1-408-393-0106





From jkwilli2 at unity.ncsu.edu  Thu Mar  5 10:11:33 1998
From: jkwilli2 at unity.ncsu.edu (Ken Williams)
Date: Thu, 5 Mar 1998 10:11:33 -0800 (PST)
Subject: No Subject
Message-ID: 



Hello,

I have more of a general privacy rather than a crypto question.  I am
trying to set up "tripwires" in the various computer accounts that i have
so i will know if a superuser or sysadmin has accessed them.  (it should
be taken for granted at this point that all sensitive or personal data is 
encrypted and/or stored on floppies)  i of course am only concerned with
doing so for accounts that i don't already have su access with.  i have
accounts on various flavors of UNIX, but i am most interested in
tripwires/scripts for Solaris 2.4-6.  so far, the best i have been able to
come up with is a couple of very ineffective tripwires.

1.  a few lines in .Xlogout that write the host/date stamp to a file that
    is hidden a few directories deep.

    - this of course only works if someone logs in to my account using
    my own login/passwd, and it doesn't work over dialup at all.

2.  i have a .environment file that will write all of the relevant user
    info to a file if that user adds my directory with the "add" command

    - this will catch all superuser accesses *if and only if* they add
    my directory.  they could simply cd into my directory to bypass it.

anyone have any ideas for tripwires or any other methods i can use, having
only regular user access, to monitor ANY accesses made to my account,
especially by superusers/sysadmins?


thanks for your consideration of this question,

ken






From honig at otc.net  Thu Mar  5 11:18:21 1998
From: honig at otc.net (David Honig)
Date: Thu, 5 Mar 1998 11:18:21 -0800 (PST)
Subject: Feds bust Inet gambling
Message-ID: <3.0.5.32.19980305111814.007a9b20@otc.net>



All parties were consenting but the Fed doesn't like it.

First the virtual betting parlors.
Then the virtual banks and cryptocash.



http://dailynews.yahoo.com/headlines/technology/wired/story.html?s=n/reuters
/980304/wired/stories/gambling_1.html
	
Wednesday March 4 4:56 PM EST 

U.S. authorities launch Internet gambling crackdown

NEW YORK (Reuters) - U.S. federal authorities charged 14 people on
Wednesday with running gambling sites on the Internet in violation of
federal laws. 

In complaints unsealed in Manhattan Federal Court, the U.S. Attorney's
office charged the 14 with using Internet Web sites and telephone lines to
bet on U.S. football, basketball, hockey and baseball games, charging a 10
percent commission per bet. 

At least some of the defendants were scheduled to appear before a U.S.
magistrate judge later on Wednesday. 

The defendants were charged with using Internet sites to open bettor
accounts, usually with a minimum deposit of $500, and then accepting bets
on games and game score spreads and maintaining accounts for clients. 

Client funds were directed to banks or addresses in such offshore locations
as Antigua, Curacao, Costa Rica and Panama, where betting is legal. But the
complaints alleged that the six operations conducted much of their business
within U.S. borders. 

One defendant, Steven Budin, 27, of SDB Global (www.sdbg.com), said his
business used the Internet only for marketing, not to take bets. 

"We don't take wagers over the Internet," he said. 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

"But if we have to use force, 
it is because we are America;
we are the indispensable nation."
---Secretary of State Madeleine K. Albright
http://www.jya.com/see-far.htm







	
















From nobody at REPLAY.COM  Thu Mar  5 11:24:11 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 5 Mar 1998 11:24:11 -0800 (PST)
Subject: No Subject
Message-ID: <199803051920.UAA16885@basement.replay.com>


In doing a search on the "RELIGIOUS FREEDOM AMENDMENT", Lycos popped over 2000 hits.  In checking out several sites, this one seemed the most rational in discussing the issue.

http://www.religioustolerance.org/const_am.htm










From n9505834 at garbo.nepean.uws.edu.au  Thu Mar  5 11:48:20 1998
From: n9505834 at garbo.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Thu, 5 Mar 1998 11:48:20 -0800 (PST)
Subject: Feds bust Inet gambling
In-Reply-To: <3.0.5.32.19980305111814.007a9b20@otc.net>
Message-ID: 


On Thu, 5 Mar 1998, David Honig wrote:

[...]

> U.S. authorities launch Internet gambling crackdown
> 
> NEW YORK (Reuters) - U.S. federal authorities charged 14 people on
> Wednesday with running gambling sites on the Internet in violation of
> federal laws. 

I wonder if thay are going to go after http://www.tab.com.au/ ?
I personaly find these anty-betting laws difficalt to understand.

Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep. 
Support NoCeM http://www.cm.org/                   
I'm sorry but I just don't consider 'because its yucky' a convincing argument






From readmexxx at aol.com  Thu Mar  5 13:42:20 1998
From: readmexxx at aol.com (jic)
Date: Thu, 5 Mar 1998 13:42:20 -0800 (PST)
Subject: Readme
Message-ID: <199803051737.RAA17689@mailroot.com>









From vznuri at netcom.com  Thu Mar  5 14:04:33 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Thu, 5 Mar 1998 14:04:33 -0800 (PST)
Subject: y2k: 37% govt computers
Message-ID: <199803052204.OAA11157@netcom13.netcom.com>



------- Forwarded Message

Date: Thu, 05 Mar 1998 07:04:43 -0600
To: believer at telepath.com
From: believer at telepath.com
Subject: IP: Y2K-37% of most critical gov't computers will not be updated
  in time

Source: Los Angeles Times

Thursday, March 5, 1998 

House Panel Warns of Year 2000 Computer Crisis 
By RALPH VARTABEDIAN, Times Staff Writer

WASHINGTON--In the most dramatic warning yet of an impending computer
crisis in the government, a congressional panel said Wednesday that 37% of
the most critical computers used by federal agencies will not be updated in
time to handle dates in the year 2000 and will be subject to widespread
failure. 

The estimate calls into sharp question past assurances by the Clinton
administration that it is moving quickly enough to avert serious outages
that could undermine military forces, benefit payments to the public and
the nation's air transportation system, among much else. 

With just 666 days left until the year 2000, a slew of reports and
investigations in recent weeks have raised serious concerns that the
government is not acting fast enough to avoid serious problems. 

The executive branch has almost 8,000 computer systems that are considered
critical to government operations, and nearly 3,000 of them will not be
able to read dates in 2000, according to the report issued by the
subcommittee on government management, information and technology of the
House Government Operations and Oversight Committee. The computers will
either shut down or spew out erroneous data. 

California Rep. Steve Horn (R-Long Beach), the subcommittee chairman who
has taken the lead in Congress in solving the problem, issued a "report
card" along with the new report that gave the federal government a D-minus
in its efforts to avoid a crisis. 

"Failure is intolerable," Horn said. 

The year 2000 problem results from widespread use of two digits in software
to designate years. Computers assume that every year starts with "19," so
when 2000 arrives, they will interpret "00" as the year 1900. 

President Clinton created a White House panel on Feb. 4 to lead the
government's efforts in solving the problem and appointed John A. Koskinen,
former deputy director at the Office of Management and Budget, to lead the
effort. But Koskinen has not yet started his work, and his panel has hardly
gotten off the ground after 28 days, according to Horn's staff. 

White House press officials did not respond to queries about Horn's report. 

As the scope of the government's problems become clearer, the cost to avert
a crisis is also growing. The Office of Management and Budget had long
insisted that the problem would cost a little more than $2.3 billion to
fix, but that figure has been growing over the last year. Its most recent
estimate pegged the cost at $4 billion. 

Horn estimated that the government is facing a cost of $10 billion. 

 Copyright Los Angeles Times 

     


**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     subscribe ignition-point email at address
or
     unsubscribe ignition-point email at address
**********************************************

------- End of Forwarded Message






From afabbro at umich.edu  Thu Mar  5 17:39:15 1998
From: afabbro at umich.edu (andrew fabbro)
Date: Thu, 5 Mar 1998 17:39:15 -0800 (PST)
Subject: Login Tripwire Protocols
In-Reply-To: 
Message-ID: 


> I have more of a general privacy rather than a crypto question.  I am>
> trying to set up "tripwires" in the various computer accounts that i have>
> so i will know if a superuser or sysadmin has accessed them.  (it should

Can you build a reliable login tripwire on a machine where you don't
have root access and root is likely a malicious character?  The answer
is...maybe!  It requires a fairly sophisticated protocol and a lot of
work...here are three of my ideas that didn't pan out, one that probably
would, and a lot of caveats.  I'd appreciate comments, criticism,
etc. from other 'punks.

THE GOAL

You have an account on a system on which you do not trust root, or on
which you think someone else may be able to log in as you.  You want
to build an automated system which alerts you when someone logs in as
other than yourself.

(n.b.: we're just talking about a login tripwire.  Root doesn't need to
log in as you to read your mail or copy your files).

THE PROBLEM 

The basic problem here is that you can't trust anything on the
insecure system.  Root can modify any file, any binary, your shell, your
environment, the kernel, a program running in memory, logs, devices, etc.
You want to get secure information out of an environment in which all
incoming and outgoing communications can be tampered with at will.

It's sort of like standing in front of a locked door to a speakeasy and
wanting to know if your friend Ivan is inside.  You can slide a paper
through the slat and if Ivan is in inside, require that he prove himself
by signing the paper.  However, if the paper comes back blank and the
bouncer says "he ain't here," how do you know that Ivan isn't tied up
in the back room?

I've thought of some protocols which root could defeat only if he had an
above-average degree of technical sophistication...e.g., examing a running
kernel and modifying it, disassembling binaries, etc.  These are not
normal admin tasks.  However, trusting your adversary to be ill-educated
is poor security practice.  There is one good protocol I thought of,
which would work except for the the #1 problem common to any attempt of
this sort...

THE ACHILLES HEEL

...and the #1 problem is: how do you determine if you (or someone posing
as you) is logged on to the remote machine?  Suppose the bouncer is
honest.  What if your adversaries can make Ivan invisible?  Anything your
account initiates via a .login script or similar can easily be avoided
by root, who can modify these scripts before logging in and restoring
them when done.  This leaves you with some sort of automated checking
to see if you're on, and a system to alert you if you are.

The common ways of determining who's logged on to a system can fail or be
circumvented:

	(a) utmp - notoriously easy to circumvent (utmp provides the info
	for who, finger, etc.)  Sometimes an errant shell will circumvent 
	this accidentally, to say nothing of a concerted effort.  Root can
	modify this trivially.

	(b) ps to look for owned processes -- root can easily write a ps
	program that works normally except for devious reporting when
	he's masquerading as you.  Even if you use a custom program
	(which you have to either import each time or hash-check),
	root can modify the kernel, your environment, etc.

	(c) you can see who owns /dev terminals, but again...

	(d) I'm not sure if there is some method of consulting the kernel.
	Modifying a running kernel is considerably more difficult than
	the above, but if there is a means of consulting the kernel to
	see who's on, root could certainly circumvent it.

You could make SHA message digests of the relavent system binaries and
include checks for them in your robot messanger, but root may already
have changed them.  And remember that root can control your shell,
your environment, etc.

Maybe you assume that your adversary could not do these things.  I don't
think there is no 100% reliable way to see authoritatively who's logged
on to a system, even if your adversary is not a wizard.  However, for
the sake of discussion, let's assume for the moment that you find some
method of determining who's logged in that you feel confidant with,
either because your adversary lacks the technical ability to circumvent
normal methods, or because they are one person secretly being naughty
in an otherwise professional team that would notice changes, or because
your own wizardry outstrips there's.

The next trick is to build a robot to either sit inside the speakeasy to
shout out to you if Ivan is there, or one that goes into the speakeasy,
looks around, and reports back to you.  The trick is making sure that
the robot's voice is not impersonated by your enemies or that it is not
rewired before being sent back to you.

THINGS THAT WON'T WORK

Any kind of notification system that is initiated by your login scripts.

Anything that requires querying the insecure machine from a remote
machine to ask if you're logged on.  Root controls all inbound and
outbound communication.

Any sort of cron job run on the insecure machine -- root can turn these
off, insert a spoofer, do his deeds, and then restore things, with you
being none the wiser.

These protocols all assume you have an account on a trusted machine
that you feel is secure (you fool!), at least from the admin on the
insecure machine.

PROTOCOL #1 - DAEMON

You set up a daemon on the insecure machine which once a minute sees
who's on, and if you're on, sends that information along with a SHA
message digest (hash) of itself and its process number to the remote
machine, who checks to see if the process number or hash has changed,
and then builds a log.  You can then check this log to see if anyone
was on when you don't remember being on.

Problems:

(*) root can monitor outbound mail.  When he sees a message going to
your secure machine, he simply replaces it.

(*) root can grab the daemon's code out of memory, rewrite it so that it
first asks root if it should say you're on, and then proceeds normally,
sending out the same process number and SHA MD as an unmodified daemon
would.  He can even write a daemon that monitors for your daemon,
correcting its output whenever you restart your daemon.

PROTOCOL #2 - DAEMON IMPROVED

Same as #1, but this time the daemon first asks for a public key
from your secure host, and then encrypts its response using that key.
This defeats the first attack above.

Problems:

(*) root can use a classic man-in-the-middle attack to harvest the key
on inbound mail and then encrypt it for outbound mail.  No improvement.

PROTOCOL #3 - PROCMAIL + BINARY ROBOT

The trusted machine contains a set of object files in a linkable state
(i.e., post-compile, pre-link) for a binary robot which (a) checks to
see if you are logged on to whatever machine the robot is running on,
(b) encrypts this information using a public key, and (c) returns the
encrypted "yes/no" to the trusted machine, as well as a SHA message
digest of itself.

You set the following up as a cron job to run every X minutes on the
trusted machine.  The longer the gap, the longer an intruder might be
able to play around unnoticed.  However, the shorter the gap, the higher
the load, and you have to make sure the insecure machine can finish it's
processing within the gap.  Perhaps X should be semi-random.

(a) the trusted machine generates a public/private key pair.  The public
key is placed in a linkable format and linked with the object files for
the binary robot.  The trusted machine notes the outbound binary's SHA
message digest.

(b) the trusted machine mails this binary robot to the insecure machine.
At the insecure machine, you have a .procmailrc which looks for the
robot and  runs it

(c) the robot checks to see if you're online, and encrypts a reply
using the public key that's stored within it.  It sends this back to
the trusted machine.

(d) the trusted machine decrypts the message.  Because each key is
different, one-time, and used sequentially, there should be no replay
attack possibility here.  The trusted machine checks the SHA MD, and
if it's different, goes into alert mode -- sending you e-mail, paging
you, whatever.  Otherwise it just continues to build its log that you
can examine later.  You could do more processing -- perhaps you only
turn on this system on the trusted machine when you're not logged into
the insecure machine.  If it detects you are on while it's running,
it goes into alert mode.

(e) lather, rinse, repeat.  

Problems:

(*) impracticalities of system load, and possible processing time length,
as noted above

(*) Root could sabotage procmail so instead of spawning your robot, it
spawns one of root's.  This mischevious binary then digs out the public
key from your robot's binary code, and returns a message with a "no,
he's not on" message and an SHA message digest of your binary.  (He could
also delete your .procmailrc or otherwise stop your automated system, but
this would be obvious and suspicious).  Since he'll have your binary and
your public key, there is no way to prevent this man-in-the-middle attack.

PROTOCOL #4 - PROCMAIL + BINARY, IMPROVED

Same as #3, but when the trusted machine links your little binary robot,
it randomly selects one of many random object files which contain
some trivial operation for the robot to perform.  The results of this
operation are then appended to the robot's reply.  Examples of these
random operations:

	-- print out the date in format X
	-- print "CNN Anchorwoman Lynn Russell is a goddess"
	-- lookup root's shell and `ls -l` it into the message
	-- print out the first 15 prime numbers into the message
	-- multiply pi by 9.856497 and print out the result
	-- figure the SHA hash of /bin/sh and print it

etc.  If this robot is intercepted, it will be difficult for root's robot
to mimic its behavior.  Yes, root could manually disassemble it and figure 
out what it's secret operation is and build his own binary to mimic it, but 
not in the minute or two that the binary will run before the next robot
each time would likely not work, because the compiler might link them all at
the same place and root's malicious binary could examine the binary and
ferret out the string automatically.

The random operations do not have to be complex, but they must have these
qualities:

	(*) the result must be definitively known to the trusted system
	(e.g., something like "finger root to see when he last logged
	in" will not work.  But "figure 9 to the 7th power and print
	the result" would)

	(*) the operation must be reasonably fast -- you don't want the
	robot doing a long calculation, which might let root analyze
	the robot, kill it, perform the calculation himself (perhaps
	on a faster machine), and spoof the reply.  Diversity is more
	important than complexity

	(*) there must be a large pool of these operations to choose from

	(*) the choosing must be random.  Obviously, it will
	be pseudorandom, but a strong pseudorandom system with
	least-significant time seeds should be sufficient, unless the
	insecure machine's root in this case is root at nsa.gov.

Problems:

(*) again, impracticalities of system load, and possible processing time
length, as noted above

(*) root will be able to save and analyze the robot binaries.  If the
pool is not diverse enough, root might be able to determine the likely
next message and spoof the reply.  This will not be detectable from
the trusted machine's perspective.  However, the trusted machine might
(a) have a large pool of random operations to choose from to make this
impractical, or (b) simply have a subroutine which randomly generates
random operations from a pool of pieces -- e.g., a set of rules from which
it randomly picks, and then performs other random operations to generate
the actual operation.  (i.e., rule #85 says pick three floating-point
numbers and generate an operation wherein the robot has to figure out
the cosine of each).  This would be much more difficult to predict/spoof.

CONCLUSIONS

First and foremost, the difficult of accurately determining who's on
will likely undermine any attempt to set up a login tripwire.

Also, we're talking about a login tripwire.  Suppose I'm root and I
want to copy a file from your home directory called diary-of-my-sexlife.
All I have to do is note the access/modify/change times, copy the file,
and then restore these times with touch(1).  You can't detect or prevent
read-only access.

Going to all the work of implementing protocol #4, the most reliable of
these, would likely result in a reasonably secure way of determing if
you're logged in (again, with the difficulty of determining who's logged
on caveats), but is it worth all this effort?  I was just thinking these
things up because I was bored.  If I really had an account on a system
I didn't trust, I would cancel it.



-- 
 Andrew Fabbro   [afabbro at umich.edu]   [andrewf at jesuswept.com]
 http://www-personal.umich.edu/~afabbro/          313.647.2713 
 "We make money the old fashion way. We print it." - DigiCrime






From jya at pipeline.com  Thu Mar  5 17:40:05 1998
From: jya at pipeline.com (John Young)
Date: Thu, 5 Mar 1998 17:40:05 -0800 (PST)
Subject: Gun Grabbers in WASHINGTON -- Friday
Message-ID: <1.5.4.32.19980306014415.0102aa64@pop.pipeline.com>


Anonymous wrote:
>
>8 a.m.-Noon. POWDER TAGGANTS - Conclusion of a two-day conference by a
>National Resarch Council committee examining the technical viability of
>and issues related to tagging black and smokeless powders.
>	Location: National Academy of Sciences, 2100 C St. NW.
>	Contact: 202-334-2138.


The New York Times reported today that the National Research
Council found that it was not feasible to require taggants in
explosives and recommended that the technology not be pursued.
Instead, it proposed improved licensing and protection of storage.

The panel noted that it would be very difficult to restrict access to
common materials for manufacturing explosives, and that law
enforcement should improve investigation, intelligence and
education of the public.

An unconfirmed Reuters is that the panelists fist-fought tooth-and-nail
gouch&suck-eyeballs over the issue of a confidential investigation to 
determine why there were no ATF agents in Murrah, only the 
head-hammered remains of all the agency's Wintel boxes choked 
with endless incoming of "The Availability of Bombmaking Information 
on the Internet" auto-forwarded from Senator_Feinstein at remailer.to.







From poc at search-engine-help.com  Thu Mar  5 22:26:07 1998
From: poc at search-engine-help.com (poc at search-engine-help.com)
Date: Thu, 5 Mar 1998 22:26:07 -0800 (PST)
Subject: Your Web Site's Findability
Message-ID: <199803060625.WAA20788@cygint.cygnus.com>





Would you like to improve your website's "find-ability" in
the Search Engines?

During the past two years, my company has been placing
hundreds of webpages into the Top Ten -- the front page --
of the major search engines... and, for about $8 a month, I
will show you how we do it... and I'll share with you our
ongoing research -- every month!

My name is Stephen Mahaney. I am the president of Planet
Ocean Communications. My web marketing company has literally
"written the book" on how to position your website on the
front page -- the Top Ten -- of each of the major search
engines... guaranteed!

Our 65 page manual identifies every trick & technique that
is being used on the Internet to gain an almost "unfair"
advantage in landing websites at the top of the search
engine lists -- right where you need to be so that potential
customers who are seeking your services or products can find
you.

Our monthly Newsletter keeps you abreast of the latest
techniques and frequent changes that take place in the
dynamic world of "search engine" science.

However, understanding the process does not require a degree
in "rocket" science -- nor do you need to be "technically
oriented". Whether your website is a "do-it-yourself"
project or you are paying someone to maintain your site, you
(or your webmaster) need to know the tricks in this book in
order to compete with the professionals who are dominating
the front pages of the various search categories.

To learn more about how you can obtain this essential
information and receive a free subscription to our
Newsletter -- SEARCH ENGINE SECRETS UPDATE, go to....

  http://www.search-engine-help.com/advantage/

You'll be glad you did.


Sincerely, 
Stephen Mahaney - President 
Planet Ocean Communications



***************************************************
Note: We have contacted you based on information that we
gathered while visiting your website - If you would prefer
not to receive mail from us in the future, simply reply with
the word "remove" in the subject line and you will be
automatically excluded from future correspondence. Thanks
***************************************************


Thought for the day... 
"The only thing a man can take
beyond this lifetime is his ethics" 








From sherman at cs.umbc.edu  Fri Mar  6 03:11:48 1998
From: sherman at cs.umbc.edu (Dr. Alan Sherman)
Date: Fri, 6 Mar 1998 03:11:48 -0800 (PST)
Subject: Barry Smith (FBI) speaks today 3:30pm at UMBC
Message-ID: 


   The UMBC Security Technology Research Group presents

     A Law-Enforcement Perspective on Encryption Policy

			Barry Smith
	       Supervisory Special Agent, FBI

	    moderated by journalist Peter Wayner

		      3:30pm - 5:00pm
		   Friday, March 6, 1998
		      Lecture Hall III
	       University of Maryland, Baltimore County
    http://www.cs.umbc.edu/events/spring98/crypto.shtml

The second lecture and discussion in a two-part forum on
encryption policy.  Journalist Peter Wayner will introduce
and moderate the event, which is free and open to the
public.  In Part I, freedom activist John Gilmore and Fritz
Fielding (Ex-Associate General Councel, NSA) gave their
divergent views, focusing on the Burnstein case.

Barry Smith will articulate the needs of law enforcement to
conduct lawful wiretaps; he will advocate the use of
key-recovery techniques to achieve this end as a way that
provides adequate privacy to law-abiding citizens.

Schedule: The event will begin with a brief (10 minute)
introduction by Peter Wayner.  Following Barry Smith's talk,
which will last approximately 45 minutes, there will be an
opportunity to ask questions for approximately 20-30
minutes.

Questions: Attendees are encouraged to ask questions in
advance by sending email to sherman at cs.umbc.edu

Directions: Take Exit #47B off interstate I-95 and follow
signs to UMBC.  LH III is in the Administration Building,
adjacent visitor's parking lot near the I-95 entrance to
UMBC.  

Host: Dr. Alan T. Sherman
      Associate Professor, Computer Science
      sherman at cs.umbc.edu
      http://www.umbc.edu
      (410) 455-2666

     This event is held in cooperation with the UMBC
	       Intellectual Sports Council
		       Honors College
	       Phi Beta Kappa honors society
                   CMSC Council of Majors
		   IFSM Council of Majors
		ACM Student Chapter at UMCP







From jya at pipeline.com  Fri Mar  6 06:50:57 1998
From: jya at pipeline.com (John Young)
Date: Fri, 6 Mar 1998 06:50:57 -0800 (PST)
Subject: BXA 97 Report on Encryption
Message-ID: <1.5.4.32.19980306145512.0105b03c@pop.pipeline.com>


BXA issued its 1997 Annual Report on March 4. We've
excerpted the sections on encryption, which summarize
the administration's policy, goals and accomplisments:

   http://jya.com/bxa97-encry.htm  (43K)

Sample:

In the nine month period from the transfer of commercial 
encryption items to Commerce through the end of FY 1997, 
BXA has received over 1,000 encryption license applications
valued at more than $500,000,000. Forty companies have 
submitted commitment plans which lay out how they will build 
and market key recovery products. These companies include
some of the largest software and hardware manufacturers in 
the country. BXA has approved 32 of these plans; none have
been rejected. Furthermore, eight companies have submitted 
requests for a one-time review of key recovery encryption items 
which will facilitate the establishment of a key management 
infrastructure (KMI). Four of these products have been approved
for eligibility under License Exception KMI. BXA has also 
approved four U.S. entities to serve as their own Key Recovery 
agents for these products (i.e. corporate "self-escrow").






From honig at otc.net  Fri Mar  6 09:48:28 1998
From: honig at otc.net (David Honig)
Date: Fri, 6 Mar 1998 09:48:28 -0800 (PST)
Subject: Login Tripwire Protocols
In-Reply-To: 
Message-ID: <3.0.5.32.19980306093852.007b3200@otc.net>


At 08:38 PM 3/5/98 -0500, andrew fabbro wrote:
>Can you build a reliable login tripwire on a machine where you don't
>have root access and root is likely a malicious character?  The answer
>is...maybe!  It requires a fairly sophisticated protocol and a lot of
>work...here are three of my ideas that didn't pan out, one that probably
>would, and a lot of caveats.  I'd appreciate comments, criticism,
>etc. from other 'punks.

Look up Ross Anderson et al's paper, Programming Satan's Computer, in
which a similarly omnipotent and malicious programming environment is 
discussed.


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

"But if we have to use force, 
it is because we are America;
we are the indispensable nation."
---Secretary of State Madeleine K. Albright
http://www.jya.com/see-far.htm







	
















From honig at otc.net  Fri Mar  6 10:32:47 1998
From: honig at otc.net (David Honig)
Date: Fri, 6 Mar 1998 10:32:47 -0800 (PST)
Subject: UPS to market DIGITAL SIGNATURE AUTHENTICATED DIGITAL DOCUMENT DELIVERY, $5 < $x < $10
Message-ID: <3.0.5.32.19980306103212.007aedd0@otc.net>



http://dailynews.yahoo.com/headlines/technology/wired/story.html?s=n/reuters
/980306/wired/stories/ups_2.html

UPS ships high-tech security along with packages

By Randolph Court 

SAN FRANCISCO (Wired) - United Parcel Service stepped into the
secure-electronic-data-transmission business this week, promising to make
online-document delivery as trustworthy and easy to use as a dollar bill
minted by the US Treasury. 

"We view ourselves as a trusted third party," said Mark Rhoney, vice
president of marketing for electronic commerce at UPS. 

But can UPS shift its focus from shipping cartons into computer bits? Its
move marks a head-on assault at a growing business now handled by much
smaller, specialized high-tech companies. What UPS will offer by the second
quarter of 1998 is an alternative to existing systems offered by lesser
known entities like Entrust Technologies and Network Associates' PGP
division. 

Entrust and PGP hawk encryption systems that allow one person to send a
secure data file to someone else with no meddling from any outsiders. 

UPS's new service, developed in partnerships with Tumbleweed Software and
NetDox, is based on the idea that a supervisor should be involved in the
process to guarantee the integrity of the information being sent. 

Say a lawyer wants to send a contract worth $3 million, but the recipient
decides to tinker with the numbers and knock the figure down to $2.5
million. The situation dissolves to finger pointing, each side saying they
agreed to something different. 

With the UPS system, the data that is sent will be digitally fingerprinted
and archived with time stamps and receipts from each party, so there will
be records of whether or not a document has been tampered with. 

"The document is digitally notarized and legally binding," said NetDox
spokesman Lee Kallman. If there is a finger-pointing situation, UPS will be
able to prove in court exactly what was sent, by whom, who received it, and
when. 

"That's what you don't get with other encryption systems, and that's the
void UPS wants to fill," said Kallman. The service will play a role not
unlike the role a government plays when it guarantees the value of
currency, Kallman said. 

UPS will insure the integrity of each document, and the identity of both
sender and receiver, for up to $100,000. 

The system is called UPS Document Exchange, and it will offer two levels of
security - Dossier for the strong stuff and Courier for the milder version. 

For the most sensitive data, UPS will use a system designed by NetDox that
requires users to download a software client that wraps data - any sort of
digital information, from simple documents to multimedia - in two layers of
encryption, an inner 40-bit layer, and an outer 128-bit layer. 

The data is sent to a UPS server where it is unwrapped, and a digital
fingerprint is taken and stored; then it is re-wrapped and sent to its
destination, where the recipient opens it with the NetDox client software. 

For less-critical data packages, UPS will use a system designed by
Tumbleweed that encrypts data with a varying number of bits to accommodate
the different encryption levels supported by browsers in different countries. 

The encrypted data is then sent to a UPS server, where it is stored at a
128-bit encryption level. The server sends an email message to the
recipient telling him or her the Web address where the data resides and how
it can be accessed via browser with RSA encryption. 

--- 

UPS has been close-mouthed on the question of price, saying only that
delivery will be more expensive than a 32-cent stamp and cheaper than a
traditional overnight delivery. 

NetDox has been charging $5.35 for domestic transactions and $10.70 for
international data exchanges, according to Kallman. But it hasn't had much
competition. If the UPS service proves viable and other competitors emerge,
prices could drop precipitously, Kallman said. 

News of the UPS service was greeted warmly in some corners of the
encryption industry, and skeptically in others. 

"We're very excited to hear that a large company like UPS is rolling out a
broad-based service like this," said Gina Klein Jorasch, director of
enterprise marketing at VeriSign. The company provides digital
certificates, which act like identity cards tying a user's identity to a
public key that enables the encryption process. 

--- 

VeriSign has reason to be hopeful, though. Software clients like the ones
provided by NetDox and Tumbleweed require digital certificates, just like
those provided by VeriSign. 

"A deal between VeriSign and UPS is very conceivable," Jorasch said. 

Jeff Harell, the product manager for PGP products at computer security
giant Network Associates, quarreled with the fundamental idea of involving
outsiders in the data transmission process. 

"Why would a corporate customer want to go to third-party systems?" Harell
asked. "A lot of companies don't want to involve a third party that they
are required to trust." Many companies view their data as too important to
risk exposing to a system with so many junctions and exchange points. 

PGP is a proprietary system. Users sending and receiving data must both
have PGP, and their keys can only be provided and verified by PGP. 

All of this is new in the traditional package delivery industry, but not
unexpected. 

"Now that the Web has become so ubiquitous, this strikes me as something
that UPS and the other delivery companies needed to do," said Rita Knox, an
industry analyst with the Gartner Group. 

"This is a pretty compelling service," Knox added. "It's available 24/7 and
it's virtually instantaneous." 

Federal Express, after a failed attempt to introduce an electronic service
in the early 1980s, ended up setting a standard in the industry in 1995
when it launched a self-service ordering and tracking system on the Web. 

Similar services have since been adopted by UPS and Airborne Express, among
other competitors. Analysts are looking ahead to the possibility of UPS's
online delivery service becoming an industry must-have if it proves
successful. 

"I definitely anticipate another domino effect if UPS has any success with
this at all," said Michael Sullivan-Trainer of International Data Corp.
"All it takes is one competitor to introduce a new software innovation and
it changes industry dynamics." 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

"But if we have to use force, 
it is because we are America;
we are the indispensable nation."
---Secretary of State Madeleine K. Albright
http://www.jya.com/see-far.htm







	
















From honig at otc.net  Fri Mar  6 12:16:25 1998
From: honig at otc.net (David Honig)
Date: Fri, 6 Mar 1998 12:16:25 -0800 (PST)
Subject: No Subject
Message-ID: <3.0.5.32.19980306121618.007b7a10@otc.net>



Politicians still think they're relevant...

Given that this bill passed 414-1, it'll likely be US law soon.

Does this mean that law enforcement will now need a judicial wiretap order
to go scanning for evidence to get a warrant?






http://dailynews.yahoo.com/headlines/technology/story.html?s=n/reuters/98030
6/tech/stories/privacy_1.html
 Friday March 6 10:33 AM EST 

 House Passes Wireless Privacy Bill

 WASHINGTON (Reuters) - In a bid to protect privacy for cellphone or
digital calls, the House Thursday voted
 414-1 to make intercepting such phone conversations illegal. 

 The Wireless Privacy Enhancement Act makes clear that the act of
interception -- whether or not the call is later
 divulged or disseminated in any way -- is against the law. 

 It bans modification of scanners that are now on the market that can
easily pick up calls made on cell phones, and
 prevents a market for new scanners capable of intercepting digital
communications. 

 The bill, which the Senate has not yet acted on, increases penalties for
intercepting or divulging private
 communications, making them subject to a $2,000 fine and six months in
jail. Earlier laws had not treated such
 interceptions as serious offenses if they were not used for financial gain. 

 Although the bill had broad bipartisan support, it was a particular
favorite of Republicans, who were furious after a
 December 1996 cellphone conversation involving House Speaker Newt Gingrich
and fellow Republican leaders
 was taped by a Florida couple. House Republicans have alleged that
Washington Democratic Rep. Jim
 McDermott then leaked it. 

 McDermott -- who voted for the wireless privacy act -- has not publicly
commented on those allegations. 

 Ohio Republican Rep. John Boehner, who was using a cellphone in his wife's
car in that conversation with
 Gingrich, enthusiastically backed the bill. "Our message should be plain
and simple," he said. "If you violate
 someone's privacy, you are not creating idle mischief, you are breaking
the law and of the land and you will be
 brought to justice." 

 Roughly 50 million Americans use some kind of new mobile electronic
communications services, according to the
 bill's sponsors. 

 The sole vote against the bill came from Ron Paul, a Texas Republican. He
was not immediately available for
 comment. 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

If you start now, the year 2038 problem might be tractable.







	
















From Eng500 at aol.com  Fri Mar  6 14:58:39 1998
From: Eng500 at aol.com (Eng500)
Date: Fri, 6 Mar 1998 14:58:39 -0800 (PST)
Subject: Hoo ha!
Message-ID: <9acb3179.34f6af5d@aol.com>


Hi.  Check out the #1 best site on the web! You wont regret it!

http://152.163.233.31/dcja1


or click here!





From die at die.com  Fri Mar  6 20:09:59 1998
From: die at die.com (Dave Emery)
Date: Fri, 6 Mar 1998 20:09:59 -0800 (PST)
Subject: Crypto as contraband
Message-ID: <19980306231001.53809@die.com>


Subject: Re: [LEGAL] Crypto as Contraband?
Reply-To: die at die.com
References: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Mailer: Mutt 0.85
In-Reply-To: ; from Tim May on Fri, Mar 06, 1998 at 06:20:39PM -0800

On Fri, Mar 06, 1998 at 06:20:39PM -0800, Tim May wrote:
> 
> (Even with guns, in the U.S., there have historically been
> "grandfatherings" of existing guns. Not always, as with certain machine
> guns. And not with gold, which was declared contraband by the Reichsfuhrer
> in 1933.)
> 
> Could possession of PGP be still legal, but _use_ declared illegal?
> 
> (Not addressing the First Amendment issues, which are even stronger, but
> just the issue of retroactive contrabanding of something which was acquired
> legally, and by hundreds of thousands of law-abiding citizens.)
> 

	The House has just done this yesterday as mentioned in several
items posted to this very list:


	From HR2369, the Wireless Communications Privacy Enchancement Act
of 1998, passed by the House 414 to 1....



 "(4) Any person who manufactures, assembles, modifies, imports, exports,
 sells, or distributes any electronic, mechanical, or other device or
 equipment, knowing or having reason to know that the device or equipment ..."

 .... clause concerning satellite  piracy gear omited .....

 " , or is intended for any receipt, interception, divulgence, publication, or
 utilization of any communication in violation of subsection (a), shall
 be fined not more than $500,000 for each violation, or imprisoned for
 not more than 5 years for each violation, or both. For purposes of all
 penalties and remedies established for violations of this paragraph, the
 prohibited activity established herein as it applies to each such device
 shall be deemed a separate violation."

Subsection a: 

 " ....... No person not being authorized by the sender shall
 intentionally intercept any radio communication *or* divulge or publish
 the existence, contents, substance, purport, effect, or meaning of such
 intercepted communication to any person..........." 

	[note that *and* was changed by this bill to *or*, making interception
itself criminal]

	The only exception being :

 "Nothing in this subsection prohibits an interception or disclosure of a
  communication as authorized by chapter 119 of title 18, United States
  Code." 
     	  [which covers broadcast, ham, marine, aviation. governmental,
and communications readily accessible to the general public, whatever
that means]


	While this doesn't exactly retroactively ban *possession* of
radio gear capable of intercepting banned radio communications, it
provides extremely stiff felony level penalties for manufacturing,
assembling, modifying, importing, exporting, selling, or distributing
any radio receiving gear that might be construed to be intended for
receipt or interception of any radio communications not on the allowed
list.  And these penalties apply to each individual sale.

	Thus selling an old scanner at a Saturday morning hamfest to a
stranger for cash - a scanner legally purchased from Radio Shack in the
era  before cell phone frequencies were outlawed on scanners -  could
conceivably result in a $500,000 fine and a five year jail term.  And
Lord knows what horrible penalties could be assessed against innocent
people selling the sort of oddball specialized communications gear and
test equipment that are the stock in trade of many of the more
interesting ham fests and swapmeets [MIT's monthly fleas for example].

	Perhaps such informal personal sales will never be prosecuted,
but most sales of gear at hamfests and the like are anonymous cash
transactions between total strangers with every possiblity that the guy a
table over with the video camera is filming your sale for evidence.

	And for those who like to hack, tinkering quietly in their
basements with communications monitoring and decoding software and
hardware, manufacture and assembly have been defined in other federal
cases to include merely writing software for one's own use. Surely this
would apply to creating cryptanalysis software for any form of radio
communications at all, since it is not legal to intercept any radio
communications that are "scrambled or encrypted".  And there is no
exception made for research and development or academic purposes.

	So yes, they have done at least as bad a thing to people who
merely want to tinker with their radios and occasionally explore what is
out there in the ether by passively and in private receiving radio
signals as they have to gun owners, who at least possess a weapon
capable of doing some serious harm.  And there is not a single sentance
in the legislation providing any kind of encouragement for the use of
cryptography to protect the privacy of openly broadcast signals
receivable for miles around, let alone mandating it.

-- 
	Dave Emery N1PRE,  die at die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18






From 96866514 at mci.net  Fri Mar  6 21:37:49 1998
From: 96866514 at mci.net (96866514 at mci.net)
Date: Fri, 6 Mar 1998 21:37:49 -0800 (PST)
Subject: Expose your Website or Business To Millions With Stealth !!!!
Message-ID: <>



Bulk Email Programs 6 Major Programs On ONE CD ONLY $600.00 !!!!!!! All these programs together will cost of over $1600.00 at retail price and are available until 02/28/98 for this price.

Please keep in mind that none of these programs are demos they are full version programs.

STEALTH MASS MAILER (FULL VERSION) SEND BULK EMAIL AT THE RATE OF 200,000/HOUR ( Retail $399.00 ) TURBO EMAIL LIST MANAGER POWERFUL EMAIL DATABASE LIST MANAGER (Retail 299.00) HURRICANE EMAIL ADDRESS COLLECTOR COLLECTS TARGETED EMAIL ADDRESSES FROM WEB SITES (Retail $295.00 ) GEO SNAKE COLLECTS TARGETED EMAIL ADDRESSES BASED ON CITY/STATE (Retail $199.00) NEWS SLEUTH COLLECTS TARGETED EMAIL ADDRESSES FROM NEWSGROUP POSTS (Retail $295.00 ) EMAIL PRO EMAIL ADDRESS LIST MANAGER ( Retail $195.00 )

YOU GET ALL 6 PROGRAMS ON CD FOR ONLY $600

TO ORDER PLEASE CALL (213)757-9032 FOR COMPLETE ORDERING DETAILS.epartment at (213) 757-9032 For orders for next day delivery please add $15.00 to your order and priority mail please add $3.00 to your order. If you are interested in becomming a vendor for our software please email us at Infosupport at juno.com for complete details. Remove Here ----------------------- Headers -------------------------------- Return-Path: Received: from relay17.mail.aol.com (relay17.mail.aol.com [172.31.106.71]) by air15.mail.aol.com (v37.8) with SMTP; Sat, 10 Jan 1998 18:46:34 -0500 Received: from relay17.mx.aol.com (sdn-ts-043txfwoRP05.dialsprint.net [206.133.153.120]) by relay17.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with SMTP id SAA00988; Sat, 10 Jan 1998 18:45:09 -0500 (EST) From: XstudmanXX at aol.com Received: from x2see4uooh at aol.com by x2see4uooh at aol.com (8.8.5/8.6.5) with SMTP id GAA04408 for ; Sat, 10 Jan 1998 18:49:17 -0600 (EST) To: x2see4uooh at aol.com Message-ID: <299703123654.GGA18155 at blahblahblah.com> Date: Sat, 10 Jan 98 18:49:17 EST Subject:#1 Bulk Email Software(Advertise To Millions Free) Reply-To: x2see4uooh at aol.com X-PMFLAGS: 32110291 3 X-UIDL: 0132569874a56kla5x357xex534a5s6d Comments: Authenticated sender is Subject: #Advertise Your Business To Millions By Email With R.A.F.) ----------------------- Headers -------------------------------- Return-Path: Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2]) by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id BAA05102 for ; Sat, 11 Oct 1997 01:40:12 -0400 (EDT) Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.73.130]) by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191 for ; Sat, 11 Oct 1997 01:40:02 -0400 (EDT) Date: Sat, 11 Oct 1997 01:40:02 -0400 (EDT) From: timothy drobnick To: roargi at aol.com Subject: I saw your AOL classified ad, Reply-to: conserve at micro-net.com Comments: Authenticated sender is Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for ; Sat, 11 Oct 1997 1:34:14 -0500 (EST) Message-Id: 0000000000.AAA000 at micro-net.com X-UIDL: 41489129262628956441837275925415 Subject: #1Advertise Your Business To Millions By Email With R.A.F) ----------------------- Headers -------------------------------- Return-Path: Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2]) by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id BAA05102 for ; Sat, 11 Oct 1997 01:40:12 -0400 (EDT) Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.68.130]) by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191 for ; Sat, 11 Oct 1997 01:40:02 -0400 (EDT) From: timothy drobnick To: roargi at aol.com Subject:#1 Bulk Email Software(Advertise To Millions Free) Comments: Authenticated sender is Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for ; Sat, 11 Oct 1997 1:34:14 -0500 (EST) Message-Id: 0000000000.AAA000 at micro-net.com X-UIDL: 41489129262628956441837275925415 Subject: #1 Advertise Your Business To Millions By Email With R.A.F)

----------------------- Headers -------------------------------- Return-Path: Received: from relay03a.mail.aol.com (relay03a.mail.aol.com [172.31.160.3]) by air03a.mail.aol.com (v37.8) with SMTP; Sat, 17 Jan 1998 02:49:56 -0500 Received: from multi38.netcomi.com (multi38.netcomi.com [204.58.155.238]) by relay03a.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id CAA21650; Sat, 17 Jan 1998 02:49:54 -0500 (EST) Received: from SOFTWINU (ts1p5.vh.net [207.204.249.25]) by multi38.netcomi.com (8.8.7/8.7.3) with SMTP id BAA04667; Sat, 17 Jan 1998 01:49:50 -0600 Message-Id: <199801170749.BAA04667 at multi38.netcomi.com> From: 1112_man at thecard.com Date: Sat, 17 Jan 1998 02:47:23 PST Subject: #1 Advertise Your Business To Millions By Email With R.A.F)

From 96866514 at mci.net Fri Mar 6 21:37:49 1998 From: 96866514 at mci.net (96866514 at mci.net) Date: Fri, 6 Mar 1998 21:37:49 -0800 (PST) Subject: Expose your Website or Business To Millions With Stealth !!!! Message-ID: <>

Bulk Email Programs 6 Major Programs On ONE CD ONLY $600.00 !!!!!!! All these programs together will cost of over $1600.00 at retail price and are available until 02/28/98 for this price.

Please keep in mind that none of these programs are demos they are full version programs.

STEALTH MASS MAILER (FULL VERSION) SEND BULK EMAIL AT THE RATE OF 200,000/HOUR ( Retail $399.00 ) TURBO EMAIL LIST MANAGER POWERFUL EMAIL DATABASE LIST MANAGER (Retail 299.00) HURRICANE EMAIL ADDRESS COLLECTOR COLLECTS TARGETED EMAIL ADDRESSES FROM WEB SITES (Retail $295.00 ) GEO SNAKE COLLECTS TARGETED EMAIL ADDRESSES BASED ON CITY/STATE (Retail $199.00) NEWS SLEUTH COLLECTS TARGETED EMAIL ADDRESSES FROM NEWSGROUP POSTS (Retail $295.00 ) EMAIL PRO EMAIL ADDRESS LIST MANAGER ( Retail $195.00 )

YOU GET ALL 6 PROGRAMS ON CD FOR ONLY $600

TO ORDER PLEASE CALL (213)757-9032 FOR COMPLETE ORDERING DETAILS.epartment at (213) 757-9032 For orders for next day delivery please add $15.00 to your order and priority mail please add $3.00 to your order. If you are interested in becomming a vendor for our software please email us at Infosupport at juno.com for complete details. Remove Here ----------------------- Headers -------------------------------- Return-Path: Received: from relay17.mail.aol.com (relay17.mail.aol.com [172.31.106.71]) by air15.mail.aol.com (v37.8) with SMTP; Sat, 10 Jan 1998 18:46:34 -0500 Received: from relay17.mx.aol.com (sdn-ts-043txfwoRP05.dialsprint.net [206.133.153.120]) by relay17.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with SMTP id SAA00988; Sat, 10 Jan 1998 18:45:09 -0500 (EST) From: XstudmanXX at aol.com Received: from x2see4uooh at aol.com by x2see4uooh at aol.com (8.8.5/8.6.5) with SMTP id GAA04408 for ; Sat, 10 Jan 1998 18:49:17 -0600 (EST) To: x2see4uooh at aol.com Message-ID: <299703123654.GGA18155 at blahblahblah.com> Date: Sat, 10 Jan 98 18:49:17 EST Subject:#1 Bulk Email Software(Advertise To Millions Free) Reply-To: x2see4uooh at aol.com X-PMFLAGS: 32110291 3 X-UIDL: 0132569874a56kla5x357xex534a5s6d Comments: Authenticated sender is Subject: #Advertise Your Business To Millions By Email With R.A.F.) ----------------------- Headers -------------------------------- Return-Path: Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2]) by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id BAA05102 for ; Sat, 11 Oct 1997 01:40:12 -0400 (EDT) Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.73.130]) by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191 for ; Sat, 11 Oct 1997 01:40:02 -0400 (EDT) Date: Sat, 11 Oct 1997 01:40:02 -0400 (EDT) From: timothy drobnick To: roargi at aol.com Subject: I saw your AOL classified ad, Reply-to: conserve at micro-net.com Comments: Authenticated sender is Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for ; Sat, 11 Oct 1997 1:34:14 -0500 (EST) Message-Id: 0000000000.AAA000 at micro-net.com X-UIDL: 41489129262628956441837275925415 Subject: #1Advertise Your Business To Millions By Email With R.A.F) ----------------------- Headers -------------------------------- Return-Path: Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2]) by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id BAA05102 for ; Sat, 11 Oct 1997 01:40:12 -0400 (EDT) Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.68.130]) by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191 for ; Sat, 11 Oct 1997 01:40:02 -0400 (EDT) From: timothy drobnick To: roargi at aol.com Subject:#1 Bulk Email Software(Advertise To Millions Free) Comments: Authenticated sender is Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for ; Sat, 11 Oct 1997 1:34:14 -0500 (EST) Message-Id: 0000000000.AAA000 at micro-net.com X-UIDL: 41489129262628956441837275925415 Subject: #1 Advertise Your Business To Millions By Email With R.A.F)

----------------------- Headers -------------------------------- Return-Path: Received: from relay03a.mail.aol.com (relay03a.mail.aol.com [172.31.160.3]) by air03a.mail.aol.com (v37.8) with SMTP; Sat, 17 Jan 1998 02:49:56 -0500 Received: from multi38.netcomi.com (multi38.netcomi.com [204.58.155.238]) by relay03a.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id CAA21650; Sat, 17 Jan 1998 02:49:54 -0500 (EST) Received: from SOFTWINU (ts1p5.vh.net [207.204.249.25]) by multi38.netcomi.com (8.8.7/8.7.3) with SMTP id BAA04667; Sat, 17 Jan 1998 01:49:50 -0600 Message-Id: <199801170749.BAA04667 at multi38.netcomi.com> From: 1112_man at thecard.com Date: Sat, 17 Jan 1998 02:47:23 PST Subject: #1 Advertise Your Business To Millions By Email With R.A.F)

From mgraffam at mhv.net Sat Mar 7 01:41:05 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Sat, 7 Mar 1998 01:41:05 -0800 (PST) Subject: Crypto as contraband In-Reply-To: <19980306231001.53809@die.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Fri, 6 Mar 1998, Dave Emery wrote: > So yes, they have done at least as bad a thing to people who > merely want to tinker with their radios and occasionally explore what is > out there in the ether by passively and in private receiving radio > signals as they have to gun owners, who at least possess a weapon > capable of doing some serious harm. And there is not a single sentance > in the legislation providing any kind of encouragement for the use of > cryptography to protect the privacy of openly broadcast signals > receivable for miles around, let alone mandating it. Hmm.. the wording of the bill uses the word "communication" .. I wonder just what this is supposed to mean. Any ideas on what this means? Would this be deliberate transmission of a signal, or would EMR monitoring be covered by this too. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "..subordination of one sex to the other is wrong in itself, and now one of the chief hindrances to human improvement.." John Stuart Mill "The Subjection of Women" -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQCVAwUBNQEUpwKEiLNUxnAfAQFllAP/VgdQpjerjenKUCjif58Jjoh718QKlf56 FvAyquQW+Q8TErWC5TE+H6QODMoNPJ645XkTN9M91qqpMCbWHvWDu6PpvDt58qa8 GVPOKtFBaUSGJuI6ph2GGI8ypciBTouDgnloCXLK/9be/lk0+BjcDBDRFPuqsc4k TG9p2lv6nTk= =WB2y -----END PGP SIGNATURE----- From bill.stewart at pobox.com Sat Mar 7 03:19:11 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 7 Mar 1998 03:19:11 -0800 (PST) Subject: tripwires when you're not superuser. In-Reply-To: Message-ID: <3.0.5.32.19980306181151.0089ba10@popd.ix.netcom.com> At 01:11 PM 3/5/98 -0500, Ken Williams wrote: >trying to set up "tripwires" in the various computer accounts that i have >so i will know if a superuser or sysadmin has accessed them. In the general case, you can't do it, though there may be special environments which let you do this but still let you do useful work. If somebody else controls the RAM, file systems, and communications on a computer, and you don't, you have no way to tell what they've done. For instance, anybody who can read raw blocks off the disk can read your files without triggering any mechanisms you control. Anybody who can read incoming packets off the LAN and WAN can read your email before putting it in your mailbox. If you convince people to encrypt mail before sending it to you, and you encrypt any data you store on the system's disk blocks, using programs that aren't running on that computer, reading your stuff may not be very interesting to the sysadm. But if you run the decryption program on the system, and the sysadm can read your keystrokes (either from a keyboard or tty driver or telnet daemon), you're still naked. There's been some theoretical work done into computing entirely with encrypted data, and for a few specific mathematical problems it's probably possible to get useful work done by an untrusted processor, but usually the computations required for blinding and unblinding are more work that the untrusted processor did for you anyway. Short of that, the closest you'll find are secure operating systems rated at Orange Book B2 or above (B3 and A, if any), which don't have one all-powerful superuser. In those systems, if the person who has access to the raw disk (either physically or by asking the OS) doesn't cheat, you have some guarantees about security, and in particular you have some guarantees that nobody _but_ the semi-super-users can crack the system in ways that give them access to your bits. Unless all writes to the disk drive are encrypted, anybody who's got unsupervised physical access to the disk is a semi-super-user, because they can steal the disk and plug it into their own machine, where they're as super a user as they want to be. If you're concerned about the machine being physically compromised, you could set up an application that's always sending keepalives across the net to your off-site monitoring location, but that's pretty annoying, leads to lots of false alarms, may still be crackable (though cracking may interrupt the system briefly, which is the win), and is overall not very practical. But it might let you know that the disk drive has been stolen. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From datasystem at mailcity.com Sat Mar 7 03:28:49 1998 From: datasystem at mailcity.com (datasystem at mailcity.com) Date: Sat, 7 Mar 1998 03:28:49 -0800 (PST) Subject: Free Email Software! Message-ID: <199803071128.DAA26280@cygint.cygnus.com> ////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// Advertising Secrets Exposed ! Are you having a difficult time trying to promote your business on the Internet? Have you posted classified ads with little or no response? Well, if you'd like to know something that you could use with your present business to make it Explode! I have the answer to your business growth problems. Free Email Software! Everybody's talking about Email Marketing! A gold mine for those who can take advantage of mass Email Marketing. Just imagine for a minute what this will mean to your business, being able to reach thousands of new prospects daily, with no cost to you. We will give you a new software package called Freedom, absolutely Free, to use in your business. Now you will have, a do it yourself method of online advertising, that up till now only the professional Internet Marketer had access to. And have a powerful potential to target millions with simple click of your mouse. And if you need fresh Email addresses, we have them on, 3.5 IBM disk. The best prices on the Internet. 100,000 Addresses Oppty Seekers Only $29.95 Includes shipping and handling. 200,000 Addresses Oppty Seekers Only $39.95 Includes shipping and handling. 400,000 Addresses Oppty Seekers Only $49.95 Includes shipping and handling. And for the serious Internet Marketer, 25 million plus!! Our company has one of the largests databases on the Internet with over 25 million Email Addresses, these are split up in many different categories, and rotated frequently, giving you new addresses to choose from each time. This service allows you to access our database of Email Addresses as much as you want, from our website. All for only $195. No need to ever gather or purchase Email addresses again!! But because of our special internet promotion for the month of Mar20/98 you can purchase our E-Mail software program including 25 Million E-Mail addresses, and including full time tech support, telephone number, for only $95. for all orders received before Mar20/98 PRINT AND FILL OUT ORDER FORM BELOW Yes! Please Rush Me Fresh Email Addresses, And My FREE Email Software. Name______________________________________________________ Address____________________________________________________ City_________________________________State__________________ Zip____________________________Email________________________ Types Of Addresses Opportunity Seekers ( ) General ( ) 100,000 Addresses $29.95 Includes shipping&handling and Freedom Software. 200,000 Addresses $39.95 Includes shipping&handling and Freedom Software. 400,000 Addresses $49.95 Includes shipping$handling and Freedom Software. 25Million Addresses$95 From database Includes S&H and Freedom Software. And full time tech support, by telephone, for all orders received by Mar20/98 Freedom Software Only. Send $10. To cover S&H. IBM 3.5 Floppy disk. Bonus: Orders received before, Mar20/98 will receive another Software program Free, called "CHECKER" that allows you to receive checks by Fax, Email, and Phone. Sold over the Internet for $129. Free with your purchase of any or the above products! Never lose another impulse sale again, for lack of, a credit card, or the slowness of US mail. Also "FREE Lifetime 5 Page Commercial Web Site with Free Autoresponder and lifetime E-mail address. No adult material allowed. FREE report The 10 best homebased Online business, Creating and Selling on Line! FREE report Internet Profits and Search Engines Secrets! Payment: Check ( ) Money Order ( ) Cashier's CK ( ) Other ( ) U.S Funds Send Order Form Along With Payment: To REV TECH MARKETING 2172 Kanoy ave Thomasville N.C 27360-8733 U.S.A. Mail End. From 55459456 at msn.com Sat Mar 7 03:52:03 1998 From: 55459456 at msn.com (55459456 at msn.com) Date: Sat, 7 Mar 1998 03:52:03 -0800 (PST) Subject: Advertise Your Business To MIllions With Direct Email Marketing !!! Message-ID: <>

Bulk Email Programs 6 Major Programs On ONE CD ONLY $600.00 !!!!!!! All these programs together will cost of over $1600.00 at retail price and are available until 02/28/98 for this price.

Please keep in mind that none of these programs are demos they are full version programs.

STEALTH MASS MAILER (FULL VERSION) SEND BULK EMAIL AT THE RATE OF 200,000/HOUR ( Retail $399.00 ) TURBO EMAIL LIST MANAGER POWERFUL EMAIL DATABASE LIST MANAGER (Retail 299.00) HURRICANE EMAIL ADDRESS COLLECTOR COLLECTS TARGETED EMAIL ADDRESSES FROM WEB SITES (Retail $295.00 ) GEO SNAKE COLLECTS TARGETED EMAIL ADDRESSES BASED ON CITY/STATE (Retail $199.00) NEWS SLEUTH COLLECTS TARGETED EMAIL ADDRESSES FROM NEWSGROUP POSTS (Retail $295.00 ) EMAIL PRO EMAIL ADDRESS LIST MANAGER ( Retail $195.00 )

YOU GET ALL 6 PROGRAMS ON CD FOR ONLY $600

TO ORDER PLEASE CALL (213)757-9032 FOR COMPLETE ORDERING DETAILS.epartment at (213) 757-9032 For orders for next day delivery please add $15.00 to your order and priority mail please add $3.00 to your order. If you are interested in becomming a vendor for our software please email us at Support26 at juno.com for complete details. Remove Here ----------------------- Headers -------------------------------- Return-Path: Received: from relay17.mail.aol.com (relay17.mail.aol.com [172.31.106.71]) by air15.mail.aol.com (v37.8) with SMTP; Sat, 10 Jan 1998 18:46:34 -0500 Received: from relay17.mx.aol.com (sdn-ts-043txfwoRP05.dialsprint.net [206.133.153.120]) by relay17.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with SMTP id SAA00988; Sat, 10 Jan 1998 18:45:09 -0500 (EST) From: XstudmanXX at aol.com Received: from x2see4uooh at aol.com by x2see4uooh at aol.com (8.8.5/8.6.5) with SMTP id GAA04408 for ; Sat, 10 Jan 1998 18:49:17 -0600 (EST) To: x2see4uooh at aol.com Message-ID: <299703123654.GGA18155 at blahblahblah.com> Date: Sat, 10 Jan 98 18:49:17 EST Subject:#1 Bulk Email Software(Advertise To Millions Free) Reply-To: x2see4uooh at aol.com X-PMFLAGS: 32110291 3 X-UIDL: 0132569874a56kla5x357xex534a5s6d Comments: Authenticated sender is Subject: #Advertise Your Business To Millions By Email With R.A.F.) ----------------------- Headers -------------------------------- Return-Path: Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2]) by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id BAA05102 for ; Sat, 11 Oct 1997 01:40:12 -0400 (EDT) Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.73.130]) by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191 for ; Sat, 11 Oct 1997 01:40:02 -0400 (EDT) Date: Sat, 11 Oct 1997 01:40:02 -0400 (EDT) From: timothy drobnick To: roargi at aol.com Subject: I saw your AOL classified ad, Reply-to: conserve at micro-net.com Comments: Authenticated sender is Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for ; Sat, 11 Oct 1997 1:34:14 -0500 (EST) Message-Id: 0000000000.AAA000 at micro-net.com X-UIDL: 41489129262628956441837275925415 Subject: #1Advertise Your Business To Millions By Email With R.A.F) ----------------------- Headers -------------------------------- Return-Path: Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2]) by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id BAA05102 for ; Sat, 11 Oct 1997 01:40:12 -0400 (EDT) Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.68.130]) by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191 for ; Sat, 11 Oct 1997 01:40:02 -0400 (EDT) From: timothy drobnick To: roargi at aol.com Subject:#1 Bulk Email Software(Advertise To Millions Free) Comments: Authenticated sender is Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for ; Sat, 11 Oct 1997 1:34:14 -0500 (EST) Message-Id: 0000000000.AAA000 at micro-net.com X-UIDL: 41489129262628956441837275925415 Subject: #1 Advertise Your Business To Millions By Email With R.A.F)

----------------------- Headers -------------------------------- Return-Path: Received: from relay03a.mail.aol.com (relay03a.mail.aol.com [172.31.160.3]) by air03a.mail.aol.com (v37.8) with SMTP; Sat, 17 Jan 1998 02:49:56 -0500 Received: from multi38.netcomi.com (multi38.netcomi.com [204.58.155.238]) by relay03a.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id CAA21650; Sat, 17 Jan 1998 02:49:54 -0500 (EST) Received: from SOFTWINU (ts1p5.vh.net [207.204.249.25]) by multi38.netcomi.com (8.8.7/8.7.3) with SMTP id BAA04667; Sat, 17 Jan 1998 01:49:50 -0600 Message-Id: <199801170749.BAA04667 at multi38.netcomi.com> From: 1112_man at thecard.com Date: Sat, 17 Jan 1998 02:47:23 PST Subject: #1 Advertise Your Business To Millions By Email With R.A.F)

From 55459456 at msn.com Sat Mar 7 03:52:03 1998 From: 55459456 at msn.com (55459456 at msn.com) Date: Sat, 7 Mar 1998 03:52:03 -0800 (PST) Subject: Advertise Your Business To MIllions With Direct Email Marketing !!! Message-ID: <>

Bulk Email Programs 6 Major Programs On ONE CD ONLY $600.00 !!!!!!! All these programs together will cost of over $1600.00 at retail price and are available until 02/28/98 for this price.

Please keep in mind that none of these programs are demos they are full version programs.

STEALTH MASS MAILER (FULL VERSION) SEND BULK EMAIL AT THE RATE OF 200,000/HOUR ( Retail $399.00 ) TURBO EMAIL LIST MANAGER POWERFUL EMAIL DATABASE LIST MANAGER (Retail 299.00) HURRICANE EMAIL ADDRESS COLLECTOR COLLECTS TARGETED EMAIL ADDRESSES FROM WEB SITES (Retail $295.00 ) GEO SNAKE COLLECTS TARGETED EMAIL ADDRESSES BASED ON CITY/STATE (Retail $199.00) NEWS SLEUTH COLLECTS TARGETED EMAIL ADDRESSES FROM NEWSGROUP POSTS (Retail $295.00 ) EMAIL PRO EMAIL ADDRESS LIST MANAGER ( Retail $195.00 )

YOU GET ALL 6 PROGRAMS ON CD FOR ONLY $600

TO ORDER PLEASE CALL (213)757-9032 FOR COMPLETE ORDERING DETAILS.epartment at (213) 757-9032 For orders for next day delivery please add $15.00 to your order and priority mail please add $3.00 to your order. If you are interested in becomming a vendor for our software please email us at Support26 at juno.com for complete details. Remove Here ----------------------- Headers -------------------------------- Return-Path: Received: from relay17.mail.aol.com (relay17.mail.aol.com [172.31.106.71]) by air15.mail.aol.com (v37.8) with SMTP; Sat, 10 Jan 1998 18:46:34 -0500 Received: from relay17.mx.aol.com (sdn-ts-043txfwoRP05.dialsprint.net [206.133.153.120]) by relay17.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with SMTP id SAA00988; Sat, 10 Jan 1998 18:45:09 -0500 (EST) From: XstudmanXX at aol.com Received: from x2see4uooh at aol.com by x2see4uooh at aol.com (8.8.5/8.6.5) with SMTP id GAA04408 for ; Sat, 10 Jan 1998 18:49:17 -0600 (EST) To: x2see4uooh at aol.com Message-ID: <299703123654.GGA18155 at blahblahblah.com> Date: Sat, 10 Jan 98 18:49:17 EST Subject:#1 Bulk Email Software(Advertise To Millions Free) Reply-To: x2see4uooh at aol.com X-PMFLAGS: 32110291 3 X-UIDL: 0132569874a56kla5x357xex534a5s6d Comments: Authenticated sender is Subject: #Advertise Your Business To Millions By Email With R.A.F.) ----------------------- Headers -------------------------------- Return-Path: Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2]) by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id BAA05102 for ; Sat, 11 Oct 1997 01:40:12 -0400 (EDT) Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.73.130]) by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191 for ; Sat, 11 Oct 1997 01:40:02 -0400 (EDT) Date: Sat, 11 Oct 1997 01:40:02 -0400 (EDT) From: timothy drobnick To: roargi at aol.com Subject: I saw your AOL classified ad, Reply-to: conserve at micro-net.com Comments: Authenticated sender is Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for ; Sat, 11 Oct 1997 1:34:14 -0500 (EST) Message-Id: 0000000000.AAA000 at micro-net.com X-UIDL: 41489129262628956441837275925415 Subject: #1Advertise Your Business To Millions By Email With R.A.F) ----------------------- Headers -------------------------------- Return-Path: Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2]) by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id BAA05102 for ; Sat, 11 Oct 1997 01:40:12 -0400 (EDT) Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.68.130]) by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191 for ; Sat, 11 Oct 1997 01:40:02 -0400 (EDT) From: timothy drobnick To: roargi at aol.com Subject:#1 Bulk Email Software(Advertise To Millions Free) Comments: Authenticated sender is Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for ; Sat, 11 Oct 1997 1:34:14 -0500 (EST) Message-Id: 0000000000.AAA000 at micro-net.com X-UIDL: 41489129262628956441837275925415 Subject: #1 Advertise Your Business To Millions By Email With R.A.F)

----------------------- Headers -------------------------------- Return-Path: Received: from relay03a.mail.aol.com (relay03a.mail.aol.com [172.31.160.3]) by air03a.mail.aol.com (v37.8) with SMTP; Sat, 17 Jan 1998 02:49:56 -0500 Received: from multi38.netcomi.com (multi38.netcomi.com [204.58.155.238]) by relay03a.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id CAA21650; Sat, 17 Jan 1998 02:49:54 -0500 (EST) Received: from SOFTWINU (ts1p5.vh.net [207.204.249.25]) by multi38.netcomi.com (8.8.7/8.7.3) with SMTP id BAA04667; Sat, 17 Jan 1998 01:49:50 -0600 Message-Id: <199801170749.BAA04667 at multi38.netcomi.com> From: 1112_man at thecard.com Date: Sat, 17 Jan 1998 02:47:23 PST Subject: #1 Advertise Your Business To Millions By Email With R.A.F)

From whgiii at invweb.net Sat Mar 7 07:22:40 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Sat, 7 Mar 1998 07:22:40 -0800 (PST) Subject: In-Reply-To: <3.0.5.32.19980306121618.007b7a10@otc.net> Message-ID: <199803071522.KAA11429@users.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <3.0.5.32.19980306121618.007b7a10 at otc.net>, on 03/06/98 at 12:16 PM, David Honig said: >Politicians still think they're relevant... >Given that this bill passed 414-1, it'll likely be US law soon. >Does this mean that law enforcement will now need a judicial wiretap >order to go scanning for evidence to get a warrant? Don't you know that an exemption clause for the FED's is standard trailer on all Bill's passed by congress. - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html - --------------------------------------------------------------- Tag-O-Matic: OS/2: Not just another pretty program loader! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNQFYlY9Co1n+aLhhAQHBtQP9EDXJnXESt5cwwq/6DTpB06Yg2uCVeZe2 BUmF3BpzLPnW501usHoz/tTbHGsJdW2uSOFetWUyrljCY32mUxK6+kKkvv1zPHFG Pa5zeMvlDeBaGbbdtmBP+3adMuBpfghke9fysFwX8oJIUsRpQ42AZGum8sE8Ncpy LHCfCzCdZTs= =MKPu -----END PGP SIGNATURE----- From mvhs5 at comnett.net Fri Mar 6 20:18:07 1998 From: mvhs5 at comnett.net (mvhs5) Date: Sat, 7 Mar 1998 12:18:07 +0800 Subject: stroke the toad. Message-ID: <35B44855.760@comnett.net> pitch a tent From MAILER-DAEMON at chemistry.ohio-state.edu Sat Mar 7 13:29:34 1998 From: MAILER-DAEMON at chemistry.ohio-state.edu (Mail Delivery Subsystem) Date: Sat, 7 Mar 1998 13:29:34 -0800 (PST) Subject: Returned mail: Cannot send message within 5 days Message-ID: <199803072008.PAA26003@chemistry.mps.ohio-state.edu> The original message was received at Mon, 2 Mar 1998 14:14:28 -0500 (EST) from ts35-10.homenet.ohio-state.edu [140.254.114.193] ----- The following addresses had permanent fatal errors ----- ----- Transcript of session follows ----- 451 ... rmjent.com: Name server timeout Message could not be delivered for 5 days Message will be deleted from queue Reporting-MTA: dns; chemistry.mps.ohio-state.edu Arrival-Date: Mon, 2 Mar 1998 14:14:28 -0500 (EST) Final-Recipient: RFC822; Remove at rmjent.com Action: failed Status: 4.4.7 Last-Attempt-Date: Sat, 7 Mar 1998 15:08:01 -0500 (EST) To: Remove at rmjent.com From: cypherpunks at toad.com Date: Wed, 02 Jan 1980 01:47:53 -0500 Reply-To: cypherpunks at toad.com From nuapuosao29 at iddqd.org Sat Mar 7 15:39:17 1998 From: nuapuosao29 at iddqd.org (nuapuosao29 at iddqd.org) Date: Sat, 7 Mar 1998 15:39:17 -0800 (PST) Subject: Bulk Email For Profit !! Message-ID: <199803072076CAA24906@post.bistek.net.tr> If you would like to be removed from our list(s), hit reply and type remove in the subject of your letter. ********************************************************* MAIL THOUSANDS OF EMAIL MESSAGES PER HOUR - NO KIDDING !! SEND YOUR EMAIL MESSAGES OUT, AT 1,000's MESSAGES / HOUR (28.8K modem) YES, 1,000's Of Messages An Hour ****************************************************** 68+ MILLION EMAIL ADDRESSES ******** $100.00 ******* ****************************************************** YOU'LL RECEIVE 2 HIGH-SPEED EMAIL SOFTWARE PROGRAMS Introducing...."FLOODGATE BULK EMAIL LOADER" AND...."GOLDRUSH STEALTH MASS MAILER" This is the same software that all bulk emailing services use! ******************************************************** TO COMPLIMENT OUR PACKAGE............ WE NOW MAKE AVAILABLE...........A BULK FRIENDLY ISP !!! See Our Order Form Below For Details ********************************************************* GET A "BULK FRIENDLY" WEB HOST ACCOUNT FROM US FOR ONLY $45.00 PER MONTH* *($100 one-time setup fee additional) ********************************************************* Floodgate Bulk Email Loader Version 6.0 AND Goldrush Stealth Mass Mailer Version 3.215 for Windows 95 and Windows 3.1 now Supports 17 (really more with the free form filter) File Formats --------------------------------------------------------- SEND OUT 20,000+ MARKETING LETTERS EVERY SINGLE DAY! Or...every few days. In fact, when I send out just a few thousand marketing letters each day, it doesn't take long before I'm completely swamped with email inquiries and phone calls. This is very easy to do. And each one of these bulk mailings costs me nothing. I can teach you how to do this and provide you with the tools you'll need. If you've got a good marketing letter, I'll show you how to open the floodgates. You'll be deluged with inquiries, leads, and real sales, using nothing but email alone. Writing a good marketing letter is not easy. I often have to rewrite my marketing letters a half dozen times before I get the results I'm looking for. But once you have a good letter, as you probably know, you can use the same letter over and over again, predictably and consistently, closing sales, week after week, month after month. It takes me about one hour to send my marketing letter to THOUSANDS of fresh email addresses. I can do this, thanks to a Windows program I use. It's called Floodgate and Goldrush Stealth Mass Mailer. It's a bulk email loader and an email software program. If you're interested in electronic marketing, you should know about these programs. PROGRAM #1: FLOODGATE FOR WINDOWS The Floodgate Bulk Email Loader imports simple text files that anyone can download from CompuServe, Prodigy, Delphi Genie, or the Internet. These text files contain classified ads, forum messages, or data from the member directory. Each of these files is filled with email addresses. Floodgate is designed to read these files and strip out the email addresses. It then sorts the addresses, removes any duplicates, and formats them into an output file, with 10, 20 or 30 addresses per line. This is all done in one simple step. Just point and click. You'll need either a Windows based Internet account or an America On-line account to send out your marketing letters. Neither AOL nor the Internet charges to send email. Send your letter to 1,000 people or 10,000 people -- the cost is always the same. NOTHING! NEW! PREPARE A MAILING OF 50,000+ IN LESS THAN A 1/2 HOUR If you open an Internet account, you can send each letter to 20,000+ people. The new Floodgate now directly writes distribution lists. Some people are always collecting new addresses, but if you publish a newsletter or adsheet, you'll be using the same addresses over and over again. That's real power! When using addresses you've previously collected, you can press a few buttons and prepare a mailing of 50,000+ in less than a half hour. (To get a list of all the Internet access providers in your local calling area goto: http://thelist.com and click on your area code.) The Floodgate Users Guide will teach you, step by step, how to download the right files, how to strip the addresses, and finally, how to cut and paste the formatted addresses into your marketing letter. Or, if you have an Internet account, how to create distribution lists. One you've done this a few times you won't even have to think. It's that simple! FOR THE BRAVE & DARING: PUSHING TECHNOLOGY TO ITS LIMITS As you may know, the practice of sending unsolicited email is usually frowned upon, and most service providers have rules against it. But, like jay-walking, there is little enforcement. It's not illegal. If someone tells you that it is, ask them to provide the citation (and don't let them give you some nonsense about faxes - that's not email). They can't do it because it's not there. Sometimes, when a lot of people complain, I get a warning letter. And that's about it. About 1 in 200 will write back and tell me, "take me off the list", which I can do, thanks to Floodgates Remove List feature. Many people reply back thanking me for sending them my informative letter. That's always nice. Most people though, just reply and say, "send me more info." In this way, it usually takes me two or three letters to close a sale. The Floodgate Users Guide will provide you with proven formats for writing a successful marketing letter. You'll test and rewrite, test and rewrite. Then, once you've got it, just push a few buttons, and open the floodgates!!! THE FLOODGATE BULK EMAIL LOADER CURRENTLY SUPPORTS 17+ FILE FORMATS 1. CompuServe Classifieds: Send your marketing letter to everyone who is running a classified ad. I'll teach you how to download all the classifieds from any single ad category. This is one of the most responsive list of buyers. They check their email every day and they're already in business. 2. America On-line Classifieds: Download 1,000 addresses in 15 minutes. These are excellent lists for business to business sales. 3. CompuServe Forums: You can join a forum and download hundreds of forum messages in a matter of minutes. 4. America On-line Forums: Choose from dozens of forums. All good targeted lists. 5. Prodigy Forums: Prodigy allows you to easily export any group of forum messages. More targeted lists. 6. Internet Newsgroups: These are all targeted lists. You'll be able to send your marketing letter to everyone who posts a message in any newsgroup. Easily collect 1,000's of addresses per hour. 7. America On-line Member Directory: Most member directories only allow you to search by city and state. With AOL, you can search by business type, hobbies, computer type, etc. This is the gem of all member directories. Build huge targeted lists. 8. CompuServe Member Directory: This is a major resource. If you're willing to target your mailing to a single city, you can collect about 1,000 email addresses an hour. 9. Delphi Member Directory: The Delphi member directory allows you to search for people based on key words. These are good targeted mailing lists. A single search can easily generate 5,000 addresses. 10. Genie Member Directory: Similar to the CompuServe member directory, only you can download names much quicker. You can easily pull hundreds of thousands of addresses out of each of these member directories. 11. CompuServe File Cabinet: If you run classified ads, and save the responses in the CIM file cabinet, you'll be able to easily reuse these addresses. You can send your marketing letter to everyone in any single folder. Build master lists and clean UP your hard drive. 12. Free Form: If you have a text file with email addresses that floodgate does not support, chances are the Free Form filter will be just what you need. Just enter a key word to search for. 13. CompuServe Form Profiles (Forum Membership Directories): Easy to build targeted lists here. Each search can easily bring you 500+ addresses. 14. Genie Profiles: If you're building targeted lists, you'll get a lot of addresses very quickly from Genie. 15. Plain Addresses: Read Floodgate Master Files back into Floodgate to merge files and do selective mailings. Also useful for the management of email address lists that you might purchase. Floodgate also has filters to allow you to include or exclude any groups of addresses in your final distribution lists. For example, you could include only email addresses that ended in .com or exclude all with .gov. You could exclude all noc, root, and other addresses that almost guarantee a negative response. These filters are fully configurable and can be used together. BUILD REUSABLE MASTER FILES Floodgate maintains Master Files for each of your marketing letters. If you download from the same place on a regular basis, you only want to send your letter to the new people. Floodgate will compare the new addresses with those in the Master File, and prepare a mailing list of only new people. The new addresses are, of course, then added to the Master File. With each new mailing your Master File grows and grows. You may create as many Master Lists as you need. When you start a new marketing campaign, you'll want to send your new letter to everyone on your Master List. If you write a newsletter, each time you send your newsletter, you'll send it to everyone on a Master List. THE REMOVE LIST Very often, people will reply and tell you to take them off your mailing list. Place these addresses in the REMOVE.MST file and they will never receive another letter from you again. In this way, you will be operating your business with the most professionalism possible. DON'T BE FOOLED We have some new competitors that have tried to copy Floodgate. The following list describes why Floodgate is BETTER....... **Floodgate is a mature, bug free product. Not an initial release. **Floodgate comes with over 100 pages of step by step documentation. **Floodgate is the only one offering a money back guarantee. **Floodgate has more testimonials. **Filter for filter, Floodgate offers more capabilities, way more. **Floodgate does everything all the others *combined* claim. **Floodgate is by far the easiest to use. **There is NO *cutting and pasting* with Floodgate. **We have by far, the BEST technical support. SOME QUICK MATH Floodgate can pay for itself in a few days. It can also cut your advertising costs down to almost nothing. Think of what the competition will do when they get their Floodgate program. Don't be left in the dust - there are 75 million people out there, just a few keystrokes away. Let's do the math: - Email 50,000 sales letters (takes about 1-2 hours) - Let's say your product will bring you $5 profit per sale. - Let's also say you only get a 1% response(occasionally higher). * That's 500 orders x $5 = $2,500 profit !! Now imagine what 500,000 letters would do for your business !! WHAT CAN I MARKET ON-LINE? You can market anything on-line using direct email, that can be marketed using conventional postal direct mail marketing. The possibilities are practically endless. If it sells off-line, you can sell it on-line. EASY TO INSTALL AND EASY TO LEARN The Floodgate Email Loader requires Windows. The SUPPLIED MANUAL tells you where to go, what to do, and how to do it. All you need are basic computer skills that can be learned with a little practice or help from our computer savvy technicians. PROGRAM #2: GOLDRUSH STEALTH MASS MAILER Do not get this program confused with other slow speed programs that call themselves "STEALTH". This program is the only one in the world that can send email out at HIGH SPEEDS with one single connection to the internet. This is NEW, Cutting Edge Email Technology. First Of It's Kind.. The Most Powerful BULK EMAIL SENDER In The World.. NOTHING CAN EVEN COME CLOSE! Thanks to our top programmer's, this technology is NOW available and we are the only place you can get it from! *ONLY "ONE" DIAL-UP OR ISDN CONNECTION NEEDED. *NO MORE TERMINATED CONNECTIONS. *NO MORE WAITING TO SEND LARGE AMOUNTS OF EMAIL. *IMMEDIATE RESPONSE TO YOUR MASS MAILINGS. *YOU WILL HAVE ALL THE CONTROL AND CONFIDENCE OF SENDING EMAIL THE WAY IT SHOULD BE SENT... IN HUGE AMOUNTS! *SEND YOUR WHOLE LIST IN ONE DAY, WHETHER IT BE 500,000 OR 5 MILLION - AND JUST SIT BACK AND WAIT FOR YOUR ORDERS TO POUR IN. *NO MORE DOWNLOADING UNDELIVERABLE NAMES. Bulk Emailer's Dream Come True!!! - >>>GOLDRUSH STEALTH MASS MAILER<<< Connect to multiple mail servers (20 or more), make multiple connections to a single server or any combination of the two ( All Simultaneously ) with one single dial-up connection. SEND MULTIPLE SIMULTANEOUS MAILINGS... View complete details about your mailings. Shows each server your connected to, the status of that connection, how many messages are going out through that connection, etc... We show you ALL the tricks all the mass e-mailers don't want you to know... Here are just a few features the GOLDRUSH STEALTH MASS MAILER offers to you... *Forge the Header - Message ID - ISP's will Spin their wheels. *Add's a Bogus Authenticated Sender to the Header. *Add's a complete bogus Received From / Received By line with real time / date stamp and recipient to the Header. *Does NOT require a valid POP Account be entered in order to send your mailings. *Easy to use and operate *Plus much more! All this, at speeds of up to 1,000's messages/hour (28.8k modem). SPECIAL INTRODUCTORY PRICE... NOW YOU CAN HAVE BOTH THE FLOODGATE AND GOLDRUSH STEALTH MASS MAILER FOR JUST $499.00! UPDATE ... SAVE $149.05 AND ORDER NOW, BE ONE OF THE FIRST 100 ORDERS! Step up to the plate and play with the big boys TODAY and receive the COMPLETE 2 SOFTWARE PACKAGE for the unbelievably low price of ONLY $349.95! (Other bulk email software has sold for as much as $2,500 and can't even come close to the cutting edge technology of EASE, ACCURACY AND SPEED ... SPEED ... SPEED!) Try the Goldrush Stealth Mass Mailer & Floodgate Bulk Email Loader for 10 days FREE. And receive UNLIMITED technical support for 30 days. ************************************************************** 68+ MILLION EMAIL ADDRESSES MILLIONS AND MILLIONS OF EMAIL ADDRESSES CD with 68+ MILLION email addresses separated by domain name. All addresses are simple text format one per line. Addresses from the following domains: MCI, Delphi, Compuserve, Internet, .com & .net, MILLIONS OF THEM! Not available on diskette or download. ===> WANT THE 68+ MILLION ADDRESSES FOR $100.00? <=== Just buy our Floodgate / Goldrush software package (with ALL the bonuses INCLUDED), and the MILLIONS of addresses are yours for just $100.00 additional. These addresses will be delivered to you in simple text files that any bulk emailing program can use, on CD Rom. With this CD, YOU CAN BEGIN MAKING MONEY IMMEDIATELY!!! *************************************************************** ***SPECIAL BONUS #1:*** STOP Losing ISP Dial Up Accounts! If you order The FLOODGATE / GOLDRUSH software within the next 5 days - When you receive your program, you will also receive: *Complete instructions on "how to keep your dial up account from showing up in the header", plus everything you will need to get started doing this. IMPORTANT NOTICE! We will initially only be offering 100 copies of the program for sale, First come / First Served basis only. We are doing this because of the extreme power that these programs offer. ***SPECIAL BONUS #2*** When you receive your two programs, you will also receive: OVER 250 REPRINT AND RESELL RIGHTS REPORTS YOU CAN START TO MARKET AND MAKE MONEY IMMEDIATELY!!! These HOT sellers include: 1) How to Get a Top Rating in the Search Engines 2) 70 Money Making Reports 3) 75 MONEY MAKING PLANS & TRADE SECRETS and MUCH MUCH MORE!!! ($200 RETAIL VALUE - FREE!!!) ***SPECIAL BONUS #3*** With your two software programs, you will also receive our NEW "Address Grabber" utility program that enables you to grab 100's of THOUSANDS of email addresses from newsgroups in minutes ($100 RETAIL VALUE - FREE). ***SPECIAL BONUS #4*** RECEIVE CHECKS BY EMAIL, PHONE OR FAX MACHINE. With this software program, you can receive payment for your product or service INSTANTLY!! There is no more waiting for your customers chec to arrive. This software will no doubt, add to your sales, for customers who don't have credit cards, as well as the impulse buyers. With this software, you can print up your payments as soon as your customer gives you his/her checking information. You will then add the information given, to the proper blank check spaces, then just print and go to the bank!! *************************************************** To get your FREE demo and "test drive" our state-of-the-art software, email us your request by hitting reply and typing "flood" in the subject of your letter. **************************************************** HURRY ... RESERVE YOURS TODAY! So, if you are interested in taking advantage of the most powerful bulk email software in the world and start making money hand over fist..... Print out the EZ ORDER form below and FAX or MAIL it to our office. If you have any questions don't hesitate to call us at: 1-954-784-0312 SYSTEM REQUIREMENTS 386 or larger Windows 95 OR Windows 3.1 with 8 meg ram Extra 5 MB hard drive space Floodgate & Goldrush can be run on a fast Mac with 24 MB RAM and SoftWindows. NOTES FROM SATISFIED USERS "It is everything you said it was. Within one week of my first mailing, I received a record number of orders. All you need to print money is a decent sales letter. Thanks." Randy albertson, Wolverine Capital. "After using Floodgate and your utility program all day today, let me say these are as two of the finest programs I have ever bought in my 52 years! Your support has been superb. Thank You!" Vernon Hale, Prime Data Systems "My first day and I just used Floodgate and Pegasus to send 1,469 sales letters. So far I've got about 25 positive responses. It works GREAT!!! Thanks." Donald Prior "Floodgate is awesome!. I recently started a new business on-line. I stripped the addresses of the AOL & CIS classifieds. I sent out 3,497 email letters and got over 400 people to join my company in 5 days! Needless to say, it pays for itself." David Sheeham, OMPD "I was able to use Floodgate to extract the names from the Internet news groups. It works perfectly. Needless to say, I am very excited about the use of this new technology." Mark Eberra, Inside Connections "This is a great piece of software and an invaluable marketing tool." Joe Kuhn, The Millennium Group "I just thought you'd like to know that this program is fantastic. After loading it on my system, I wanted to test it out. In my first hour of using this, I collected 6,092 email addresses!" Richard Kahn, LD Communications "I just love the Floodgate program. It saves me hours and hours of time. This is the beginning of a wonderful FUN time marketing on-line. Thank you so much for writing this program." Beth O'Neill, Eudora, KS "Your software is brilliant, and from the technical support I've received, I can see you have a genuine love and respect of people...Floodgate is a divine package. Wish I had found it sooner." Tom Sanders, Peoria, IL "I really like the way the Floodgate software package works. It is very easy to use, and really does the trick. It has already saved me an incredible amount of time and energy." John Berning, Jr., Fairfield, NJ "It's going great with FLOODGATE! I like using Delphi. I just collected 50,000+ addresses within 20 minutes on-line." Richard Kahn, R&B Associates ------------------------------------------------- E-Z ORDER FORM: Please print out this order form and fill in the blanks...... Please send order form and check or money order, payable to: Dave Mustachi P.O. Box 772261 Coral Springs, FL 33077-2261 (954) 784-0312 ______Yes! I would like to try your cutting-edge software so that I can advertise my business to thousands of people on-line whenever I like! I understand that I have 10 days to trial the software. If I am not fully delighted, I will cheerfully be refunded the purchase price, no questions asked! Please rush me the FLOODGATE and GOLDRUSH package now! ______I am ordering within 72 hours! That qualifies me to receive the FLOODGATE and GOLDRUSH package at a substantial discount! I am ordering BOTH software packages for only $349.95. (Save $150 off the retail price....Software has sold for as much as $2,499.95) ______I am ordering within 72 hours! That qualifies me to receive UNLIMITED technical support for 30 days. ______I want to receive the package OVERNIGHT. I'm including $18.00 for shipping charges. ______I want to receive the package 2nd DAY. I'm including $10.00 (includes insurance & return receipt) for shipping charges. ______I'm ordering Floodgate / Goldrush software and want to order the 68+ MILLION email addresses as well. My additional cost is $100.00 enclosed. ______I'm NOT ordering your Floodgate / Goldrush software, but I want to order your 40 MILLION email addresses on CD. Enclosed is $249.00. ______I'm ordering your "BULK FRIENDLY" web hosting offer. Add $145 to this order ($45 PLUS $100 one time setup fee) I authorize Dave Mustachi to draft $45.00 per month from my checking account from the enclosed check OR charge my credit card account below each month for the service of hosting my BULK FRIENDLY web page that I can use in my BULK EMAIL marketing letter(s). Signature:____________________________________________ **************************************************** If you're interested in our "BULK FRIENDLY ISP", please call: Russell Rockefeller 1-905-714-7510 for details. **************************************************** (CHECKS: ALLOW 1 WEEK FOR BANK CLEARANCE) YOUR NAME_________________________________________________ COMPANY NAME_________________________________________________ YOUR POSITION_____________________________________________ STREET ADDRESS______________________________________________ CITY, STATE, ZIP____________________________________________ PHONE NUMBERS_______________________________________________ FAX NUMBERS_________________________________________________ EMAIL ADDRESSES_____________________________________________ ************************************************************ We accept Checks, Money Orders, MasterCard, Visa, American Express. You can either mail your order to us OR fax your order to: 954-572-5837 ************************************************************ Today's date:_____________ Visa____MasterCard____American Express____Discover_______ Card #:____________________________________________________ Expiration date:___________________________________________ Name on card:______________________________________________ Billing address:___________________________________________ Amount to be charged: $________________ Signature:___________________________________________ I agree to pay Dave Mustachi an additional $29 fee if my check is returned for insufficient or uncollectable funds. SIGNATURE: X________________________________DATE:_______________ Please send all order forms and check or money order to payable to: Dave Mustachi P.O. Box 772261 Coral Springs, FL 33077 (954) 784-0312 *************************************************** OR: PLEASE PASTE YOUR CHECK HERE (If you fax a check, there is no need for you to send the original check by mail. We will draft up a new check, with the exact information from your original check that you faxed to us) Please fax the above order form and check to: 1-954- From rdshea at 12291.com Sun Mar 8 05:02:51 1998 From: rdshea at 12291.com (rdshea at 12291.com) Date: Sun, 8 Mar 1998 05:02:51 -0800 (PST) Subject: This is your NEW HOUSE, or BOAT, or ROLLS ROYCE Message-ID: <> This is your NEW HOUSE, or BOAT, or ROLLS ROYCE THIS CAN BE YOUR BEST OF DREAMS......TRY IT! THIS MAY BE THE MOST SIGNIFICANT LETTER YOU WILL RECEIVE THIS YEAR!! ----------------------------------------------------------------------- ***Please,... Follow The Instructions Of This Letter Very Carefully. Immediately Make A Copy, And Read It Twice.*** Subject: It's Only a Game, But You Win Big Money! Greetings, Hopefully my name is still on the list below. I am a retired attorney, and about two years ago a man came to me with a letter. The letter he brought me is basically the same as the letter in front of you now. He asked me to verify the fact that this letter was legal. I told him that I would review it and get back to him. When I first read the letter I thought it was some off-the-wall idea to make money. A week later I met again with my client to discuss the issue. I told him that the letter originally brought to me was not 100% legal. My client asked me to alter the letter to make it 100% legal. I advised him to make a small change in the letter and it would be alright. I was curious about the letter, so he told me how it works. I thought it was a long shot, so I decided against participating. Before my client left, I asked him to keep me updated as to his results. About two months later he called to tell me that he had received over $800,000 in cash! I didn't believe him so he asked me to try the plan and see for myself. I thought about it for a couple of days and decided that there was not much to lose. I followed the instructions exactly and mailed out 200 letters. Sure enough, the money started coming! It came slowly at first, but after three weeks I was getting more than I could open in a day. After about three months the money stopped coming. I kept a precise record of my earnings and at the end it totaled $868,439.00. I was earning a good living as a lawyer, but as anyone in the legal profession will tell you, there is a lot of stress that comes with the job. I told myself if things worked out I would retire from practice and play golf. I decided to try the letter again, but this time I sent 500 letters out. Well, three months later I had totaled $2,344,178.00!!! I just couldn't believe it. I met my old client for lunch to find out how this exactly works. He told me that there were a few similar letters going around. What made this one different is the fact that there are six names on the letter, not five like most others. That fact alone resulted in far more returns. The other factor was the advice I gave him in making sure the whole thing was perfectly legal, since no one wants to risk doing anything illegal. I bet by now you are curious about what little change I told him to make. Well, if you send a letter like this out, to be legal, you must sell something if you expect to receive a dollar. I told him that anyone sending a dollar out must receive something in return. So when you send a dollar to each of the six names on the list, you must include a slip of paper saying, "Please put me on your mailing list" and include your name, mailing address, and email address. (Your phone # is optional). This is the key to the program! The item you will receive for a dollar you send to the six names below, is this letter and the right to earn thousands. We will be working together to improve each others lives! Follow the simple instructions below exactly, and in less than three months you will receive over $800,000.00 GUARANTEED!!!!!! A) Immediately send $1.00 to each of the six people on the list below. Wrap the dollar in a note (type written or handwritten) saying "Please add me to your mailing list" and include your name, mailing address, and email address. Your phone number is optional: 1) Anthony Thomas 8150 East Hildale St. Detroit, MI 48234 2) Claudia Stephan PO Box 1819 Carmichael, CA 95609 3) Anita Volsh PO Box 2408 Fair Oaks, CA 95628 4) Nadia Segun PO Box 1357 Rancho Cordova, CA 95741 5) Lidia Zoring 3500 Data dr. # 147 Rancho Cordova, CA 95670 6) James Thomas 11329 S Peoria St. Chicago, IL 60643 B) Remove the name next to #1 on the list and move the rest of the names up one position. Then place your name in the #6 spot. This is best done by typing a new list and taping or gluing it over the old one. Or by saving this to a text file and editing it yourself and saving the new edited copy. C) When you have completed the above instructions, you have an option of mailing your new letter out in two ways: 1) Through the U.S. Postal Service or 2) through e-mail. This letter has been proven perfectly legal for both ways as long as you follow the above instructions, because you're purchasing membership in an exclusive mailing list . To mail this out over the internet, you can browse through areas and find people to send this to all the time. All you have to do is cut and paste email addresses wherever you are on the Internet. Remember, it doesn't cost anything to mail on the Internet. Or you can get a Mass Mail Network to mail it out in large volumes for you. 2 One that we recommend is: Cyber Mail ($15 / 200 names) ($25 / 500 names) ($50 / 1,500 names) 16500 North Park Dr. Suite 413 Southfield, MI 48075 (248) 557-7778 Either way will bring big payoffs. If you are going to use the traditional U.S. Postal Service to do this program, you will want to order a minimum 200 names from a mailing list company. Two that have been most effective for these lists are: ***Be sure to ask for "Opportunity Seekers" and request a list less than 30 days old*** S.E. Ring Mailing List ($26 / 200 names) P.O Box 15061 Ft. Lauderdale, FL 33318 (954) 742-9519 Advon Distributors ($28 / 200 names) P.O. Box B-11 Shelly, ID 83274 (800) 992-3866 ***Keep in mind- there is no limit to the amount of names you can send out. The more names you send, the more money you'll make. We strongly encourage you to mail this letter to family, friends and relatives as well.*** D) When your mailing list arrives, place one label on a stamped envelope and drop it in the mail box (Be sure to send out at least 200). Within 90 days, you will receive over $800,000. E) Keep a copy of this letter and all the names you receive. Mail it out again in about 6 months. But mail it to the addresses you received with each dollar. It will work again, only much better. THIS IS A SERVICE AND IS 100% LEGAL ! (Refer to title 18, Section 1302 & 1342 of the U.S. Postal and Lottery Laws) 3 Assume for example you get a 7.5% return rate, which is very conservative. My first attempt was about 9.5% and my second time was over 11%. 1) When you mail out 200 letters, 15 people will send you $1.00. 2) Those 15 mail out 200 letters, and 225 people will send you $1.00 3) Those 225 mail out 200 letters, and 3,375 people will send you $1.00 4) Those 3,375 mail out 200 letters, and 50,625 people will send you $1.00 5) Those 50,625 mail out 200 letters, and 759,375 people will send you $1.00 At this point your name drops off the list, but so far you have received $813,615.00!!!!! It works every time, but how well depends on how many letters you send out. In the example above, you mailed out 200 letters, if you mailed out 500 letters, you would have received $2,006,917!! Check the math yourself, I want you to, but I guarantee it is correct! With this kind of return, you've got to try it. Try it once and you will do it again!!! Just make sure you send a dollar to each of the six names on the list with a note to be added to their mailing list. Together we will all prosper!!!! PS You've read this far, so let me ask you one simple question: Q. What do you have to lose?? A. Only $ 6.00 What you can gain is an income, like the example in this letter. Small Risk, Small Expense, HUGE Potential Return!!! What do you have to loose? I invite you to join our mailing list today!!! Don't throw this away. Keep it, think about it, and in several months you will try it! I looked at it for over two months and then I said "it's only $6" I have to be nuts not to try it. From rdshea at 12291.com Sun Mar 8 05:02:51 1998 From: rdshea at 12291.com (rdshea at 12291.com) Date: Sun, 8 Mar 1998 05:02:51 -0800 (PST) Subject: This is your NEW HOUSE, or BOAT, or ROLLS ROYCE Message-ID: <> This is your NEW HOUSE, or BOAT, or ROLLS ROYCE THIS CAN BE YOUR BEST OF DREAMS......TRY IT! THIS MAY BE THE MOST SIGNIFICANT LETTER YOU WILL RECEIVE THIS YEAR!! ----------------------------------------------------------------------- ***Please,... Follow The Instructions Of This Letter Very Carefully. Immediately Make A Copy, And Read It Twice.*** Subject: It's Only a Game, But You Win Big Money! Greetings, Hopefully my name is still on the list below. I am a retired attorney, and about two years ago a man came to me with a letter. The letter he brought me is basically the same as the letter in front of you now. He asked me to verify the fact that this letter was legal. I told him that I would review it and get back to him. When I first read the letter I thought it was some off-the-wall idea to make money. A week later I met again with my client to discuss the issue. I told him that the letter originally brought to me was not 100% legal. My client asked me to alter the letter to make it 100% legal. I advised him to make a small change in the letter and it would be alright. I was curious about the letter, so he told me how it works. I thought it was a long shot, so I decided against participating. Before my client left, I asked him to keep me updated as to his results. About two months later he called to tell me that he had received over $800,000 in cash! I didn't believe him so he asked me to try the plan and see for myself. I thought about it for a couple of days and decided that there was not much to lose. I followed the instructions exactly and mailed out 200 letters. Sure enough, the money started coming! It came slowly at first, but after three weeks I was getting more than I could open in a day. After about three months the money stopped coming. I kept a precise record of my earnings and at the end it totaled $868,439.00. I was earning a good living as a lawyer, but as anyone in the legal profession will tell you, there is a lot of stress that comes with the job. I told myself if things worked out I would retire from practice and play golf. I decided to try the letter again, but this time I sent 500 letters out. Well, three months later I had totaled $2,344,178.00!!! I just couldn't believe it. I met my old client for lunch to find out how this exactly works. He told me that there were a few similar letters going around. What made this one different is the fact that there are six names on the letter, not five like most others. That fact alone resulted in far more returns. The other factor was the advice I gave him in making sure the whole thing was perfectly legal, since no one wants to risk doing anything illegal. I bet by now you are curious about what little change I told him to make. Well, if you send a letter like this out, to be legal, you must sell something if you expect to receive a dollar. I told him that anyone sending a dollar out must receive something in return. So when you send a dollar to each of the six names on the list, you must include a slip of paper saying, "Please put me on your mailing list" and include your name, mailing address, and email address. (Your phone # is optional). This is the key to the program! The item you will receive for a dollar you send to the six names below, is this letter and the right to earn thousands. We will be working together to improve each others lives! Follow the simple instructions below exactly, and in less than three months you will receive over $800,000.00 GUARANTEED!!!!!! A) Immediately send $1.00 to each of the six people on the list below. Wrap the dollar in a note (type written or handwritten) saying "Please add me to your mailing list" and include your name, mailing address, and email address. Your phone number is optional: 1) Anthony Thomas 8150 East Hildale St. Detroit, MI 48234 2) Claudia Stephan PO Box 1819 Carmichael, CA 95609 3) Anita Volsh PO Box 2408 Fair Oaks, CA 95628 4) Nadia Segun PO Box 1357 Rancho Cordova, CA 95741 5) Lidia Zoring 3500 Data dr. # 147 Rancho Cordova, CA 95670 6) James Thomas 11329 S Peoria St. Chicago, IL 60643 B) Remove the name next to #1 on the list and move the rest of the names up one position. Then place your name in the #6 spot. This is best done by typing a new list and taping or gluing it over the old one. Or by saving this to a text file and editing it yourself and saving the new edited copy. C) When you have completed the above instructions, you have an option of mailing your new letter out in two ways: 1) Through the U.S. Postal Service or 2) through e-mail. This letter has been proven perfectly legal for both ways as long as you follow the above instructions, because you're purchasing membership in an exclusive mailing list . To mail this out over the internet, you can browse through areas and find people to send this to all the time. All you have to do is cut and paste email addresses wherever you are on the Internet. Remember, it doesn't cost anything to mail on the Internet. Or you can get a Mass Mail Network to mail it out in large volumes for you. 2 One that we recommend is: Cyber Mail ($15 / 200 names) ($25 / 500 names) ($50 / 1,500 names) 16500 North Park Dr. Suite 413 Southfield, MI 48075 (248) 557-7778 Either way will bring big payoffs. If you are going to use the traditional U.S. Postal Service to do this program, you will want to order a minimum 200 names from a mailing list company. Two that have been most effective for these lists are: ***Be sure to ask for "Opportunity Seekers" and request a list less than 30 days old*** S.E. Ring Mailing List ($26 / 200 names) P.O Box 15061 Ft. Lauderdale, FL 33318 (954) 742-9519 Advon Distributors ($28 / 200 names) P.O. Box B-11 Shelly, ID 83274 (800) 992-3866 ***Keep in mind- there is no limit to the amount of names you can send out. The more names you send, the more money you'll make. We strongly encourage you to mail this letter to family, friends and relatives as well.*** D) When your mailing list arrives, place one label on a stamped envelope and drop it in the mail box (Be sure to send out at least 200). Within 90 days, you will receive over $800,000. E) Keep a copy of this letter and all the names you receive. Mail it out again in about 6 months. But mail it to the addresses you received with each dollar. It will work again, only much better. THIS IS A SERVICE AND IS 100% LEGAL ! (Refer to title 18, Section 1302 & 1342 of the U.S. Postal and Lottery Laws) 3 Assume for example you get a 7.5% return rate, which is very conservative. My first attempt was about 9.5% and my second time was over 11%. 1) When you mail out 200 letters, 15 people will send you $1.00. 2) Those 15 mail out 200 letters, and 225 people will send you $1.00 3) Those 225 mail out 200 letters, and 3,375 people will send you $1.00 4) Those 3,375 mail out 200 letters, and 50,625 people will send you $1.00 5) Those 50,625 mail out 200 letters, and 759,375 people will send you $1.00 At this point your name drops off the list, but so far you have received $813,615.00!!!!! It works every time, but how well depends on how many letters you send out. In the example above, you mailed out 200 letters, if you mailed out 500 letters, you would have received $2,006,917!! Check the math yourself, I want you to, but I guarantee it is correct! With this kind of return, you've got to try it. Try it once and you will do it again!!! Just make sure you send a dollar to each of the six names on the list with a note to be added to their mailing list. Together we will all prosper!!!! PS You've read this far, so let me ask you one simple question: Q. What do you have to lose?? A. Only $ 6.00 What you can gain is an income, like the example in this letter. Small Risk, Small Expense, HUGE Potential Return!!! What do you have to loose? I invite you to join our mailing list today!!! Don't throw this away. Keep it, think about it, and in several months you will try it! I looked at it for over two months and then I said "it's only $6" I have to be nuts not to try it. From meconlen at IntNet.net Sun Mar 8 06:03:16 1998 From: meconlen at IntNet.net (Michael Conlen) Date: Sun, 8 Mar 1998 06:03:16 -0800 (PST) Subject: Telco Trafic Message-ID: Are their products designed to encrypt trafic across Frame Relay or dedicated telco circuits? Groove on Dude Michael Conlen meconlen at intnet.com The code was willing, It considered your request, But the chips were weak. From honig at otc.net Sun Mar 8 10:44:19 1998 From: honig at otc.net (David Honig) Date: Sun, 8 Mar 1998 10:44:19 -0800 (PST) Subject: Schneier on SET Message-ID: from Internet World, 2 Mar 98, "Reply to All" (reader feedback) Credit card transactions over the Net are new, but not overly different. We know how to do credit card transactions where there is no physical card: over the pohne. And we know how to establish a secure merchant-customer session: via SSL. SET is a complicated, server-intensive protocol, and I have trouble believing its possible to implement a two-inch-thick standard without security bugs. I'm not surprised merchants are so slow in acepting it. Why bother? [signed by Bruce Schneier] From MSDNFlashEditor_001781 at Newswire.Microsoft.com Sun Mar 8 11:28:08 1998 From: MSDNFlashEditor_001781 at Newswire.Microsoft.com (MSDNFlash Editor) Date: Sun, 8 Mar 1998 11:28:08 -0800 (PST) Subject: MSDNFlash, Volume 2, Number 5, March 9, 1998 Message-ID: <899977F2DFA7D111B5A200805F3118C1020B7953@bulkengine.dns.microsoft.com> *** MSDN Flash *** A Twice-Monthly Newsletter for the Microsoft Developer Community Visit us today on the World Wide Web at: http://www.microsoft.com/msdn/ In this issue: PRODUCT AND TECHNOLOGY NEWS *Free Developer Edition of Windows NT 4.0 Workstation *Look Out for a Special MSDN Flash *Watch Bob Muglia's Keynote Live from Spring Internet World *SAP Delivers Free COM Connectivity to its Systems RESOURCES *Mastering Chapter for MSDN Online Members *MSDN Online Chat: HelpDesk Sample Application *MSDN Online Chat: VBA and Office Development *New Download for MSDN Online Members *March/April MSDN News Now Online *Windows 98 Resource Kit *Introducing TechNet ITHome EVENTS *Web TechEd - Australia *XML Conference *XML Xposed *VBITS *Windows CE Developer Conference *Visual C++ Developer Conference *Visual J++ Developer Conference *Visual FoxPro Devcon 98 *Microsoft TechEd *Developer Events - United States *Developer Events - Europe MSDN FLASH TIP OF THE WEEK *Visual J++ Developer's Journal ================================================= PRODUCT AND TECHNOLOGY NEWS ================================================= FREE DEVELOPER EDITION OF WINDOWS NT 4.0 WORKSTATION. For a limited time developers can get a free Developer Edition of Windows NT Workstation 4.0 when they buy the Professional Editions of Visual Basic, Visual C++ or Visual Studio. If the Enterprise Edition of these same products are purchased, developers can get a free Developer Edition of BackOffice Server 4.0. Developer Editions include the full feature set with a development and testing license; the BackOffice license is limited to 10 simultaneous connections. For more information visit http://www.microsoft.com/developer/offer LOOK OUT FOR A SPECIAL MSDN FLASH Watch for a special MSDN Flash update later this week to fill you in on an exciting product announcement. WATCH BOB MUGLIA'S KEYNOTE LIVE FROM SPRING INTERNET WORLD Bob Muglia, Microsoft Senior Vice President, will discuss effective business applications on the Web at Spring Internet World, Los Angeles, CA. Watch it live on the Site Builder Network at http://www.microsoft.com/sbnmember/sbnlive/iworld-f.htm Wednesday, March 11 at 5:45p.m. (Pacific Time). Visit this site early to test your NetShow player and preferred bandwidth. SAP DELIVERS FREE COM CONNECTIVITY TO ITS SYSTEMS Download a free beta version of the SAP DCOM Component Connector at http://www.sap.com/bfw/dcom.htm. The connector makes it possible to integrate the rich business rules of SAP R/3 into your applications and solutions using Microsoft's award-winning Visual Tools and Microsoft COM. ================================================= RESOURCES ================================================= MASTERING CHAPTER FOR MSDN ONLINE MEMBERS Gain the skills you need to build dynamic, data aware, client/server Web sites. Check out this online training module on Using Microsoft Transaction Server from "Mastering Web Site Development using Visual InterDev" to start learning now. For more information visit http://www.microsoft.com/msdn/training/mastering.htm MSDN ONLINE CHAT: HELPDESK SAMPLE APPLICATION Tuesday, March 10, 11a.m. - noon Pacific Time Chat about building the HelpDesk Sample Application How did the MSDN developers build the HelpDesk sample application? What went wrong? How did they correct it? Ask them yourself in our MSDN Online chat. For more information visit http://microsoft.com/msdn/newsgroups/chats.htm If you can't make it to the chat but have a question, submit it to msdn at microsoft.com with "MSDN Chat" as the subject line. Then check back on MSDN Online for the transcript a day or two after the chat for the answers. MSDN ONLINE CHAT: OFFICE AND VBA DEVELOPMENT Tuesday, March 17th, 11:00 am to noon Pacific Time Join Microsoft VBA staffers for an on-line chat. You'll get a chance to pose your questions about developing solutions with Access, Excel, Word, PowerPoint, or any other VBA host application. Microsoft product managers, test engineers, and software designers will be on line to provide answers and guidance, so don't miss out. Visit http://www.microsoft.com/msdn/newsgroups/chats.htm for more information NEW DOWNLOAD FOR MSDN ONLINE MEMBERS Chili!ASP is an open, cross-platform web application environment that is the functional equivalent of Microsoft's Active Server Pages (ASP). Chili!ASP provides ASP functionality to Netscape, Lotus, IBM, and other web servers on Windows NT and 95, and soon on UNIX as well. For more information visit http://www.microsoft.com/msdn/downloads/ MICROSOFT WINDOWS 98 BETA RESOURCE KIT Get a head start in evaluating Microsoft Windows 98 and reviewing the architecture. The Microsoft Windows 98 Beta Resource Kit is the first full technical overview. And it includes a time-limited evaluation copy of the Beta 3 release of Windows 98. Quantities are limited. Not available outside North America. For more information visit http://mspress.microsoft.com/order/ MARCH/APRIL MSDN NEWS NOW ONLINE The new issue of MSDN News is online, with articles on adding Dynamic HTML to your VB apps, MFC for Windows CE, a new column by the esteemed Dr. GUI and more. Visit http://www.microsoft.com/msdn/news/devnews/ ANNOUNCING TECHNET ITHOME If you're responsible for selecting, deploying or supporting technology ITHome is for you. Get the latest details on new technologies, strategies, and industry issues from leading sources, including Microsoft, Network Computing, Information Week, New Riders Publishing, SAMS Publishing, and more. For more information visit http://www.microsoft.com/ithome/ ================================================= EVENTS ================================================= MICROSOFT WEB TECHED - AUSTRALIA March 10, Sydney March 12, Melbourne Microsoft Web Tech Ed will be bringing you sessions on IIS 4.0, Site Server 3.0, Electronic Commerce, Dynamic HTML, and Data Access. Cost is $250 for MSDN and SBN Level 2 & 3 Members, or $350 full conference fee. To register http://www.microsoft.com.au/australia/sitebuilder/webteched.asp XML, THE CONFERENCE March 23-27, Seattle, WA See tools that support XML today and those planned for tomorrow. For more information visit http://www.gca.org/conf/xmlcon98/ XML XPOSED If you are a Web developer or using the Web for business purposes, you'll want to learn more about XML. For more information visit http://Xmlu.com/ VBITS SAN FRANCISCO '98 March 23-27, San Francisco, CA Hands-on training on topics ranging from multithreading applications and servers, to leveraging component-based solutions to the Internet or intranet. Visit http://www.windx.com/vbits/ for more information REGISTER NOW FOR THE WINDOWS CE DEVELOPERS CONFERENCE April 6-8, San Jose, CA In-depth technical sessions will teach you all you need to know about the latest advances in Windows CE-based devices. Attendees will receive a complimentary Palm PC. For more information or to register visit http://www.microsoft.com/events/windowsce/ VISUAL INTERDEV 6.0 PRE-RELEASE SEMINAR Microsoft and 32X announce a 12-city US seminar tour for developers on the Microsoft Visual InterDev 6.0 Web development system. Seminars begin April 13, and all attendees will receive a beta version of Visual InterDev 6.0. For more information see http://www.32x.com MICROSOFT VISUAL C++ DEVELOPER CONFERENCE IV April 15-17, Boston, MA Come learn about COM and DCOM, MFC and ATL, MTS, hardcore Visual C++, and more. For more information visit http://www.vcdj.com/ VISUAL J++ DEVELOPER CONFERENCE April 27 - 30, Los Angeles, CA A technical forum on advanced Java development using Microsoft Visual J++, this event features four tracks and 48 sessions. For more information visit http://www.javaconference.com/ VISUAL FOXPRO DEVCON 98 May 17-20, Orlando, FL Come learn all about Tahoe, the next version of Microsoft Visual FoxPro at Visual FoxPro DevCon. For more information visit http://www.microsoft.com/vfoxpro/ MICROSOFT TECHED 98 June 1-4, New Orleans, LA This is the definitive technical conference for building complete solutions with Microsoft technologies. For more information or to register visit http://www.microsoft.com/events/teched/ MICROSOFT TECHED EUROPE 98 7-10th July, Nice Acropolis Convention Centre, France For more information visit http://www.eu.microsoft.com/europe/teched/ DEVELOPER EVENTS - UNITED STATES DEVELOPER CAF� HITS MICHIGAN AND OHIO Developers' Cafe hits Michigan and Ohio in March Learn the basics of Active Server Pages (ASP), a flexible server-side scripting environment you can use to create and run dynamic web server applications. See development environments including Internet Information Server 4.0, ActiveX Data Objects and others for creating and maintaining HTML pages. For more information visit http://www.microsoft.com/greatlakes/events/ BOB AND LARRY'S DEVELOPER WORKSHOP SERIES March 12, Waltham MA (event code 14776) March 17, Farmington CT (event code 14777) The theme in March is migration. Find out how to migrate your Visual Basic 3 and 4 code to Visual Basic 5; how to upsize your Access databases to SQL Server; and how to migrate your Two - Tier Client/Server applications to the Internet. For more information visit http://www.microsoft.com/newengland/developer/boblarry/default.asp MICROSOFT COLLABORATION COMPUTING SEMINAR FOR DEVELOPERS In Michigan and Ohio: Developing Applications with Collaboration Data Objects (CDO) and the Microsoft Exchange Scripting Agent. Get an in-depth technical look at the tools developers have available to them for promoting and extending collaboration among users. For more information visit http://www.microsoft.com/greatlakes/events/ DEVELOPER EVENTS - EUROPE MICROSOFT SQL SERVER AND UNIVERSAL DATA ACCCESS TECHNICAL CONFERENCE March 25 - 26 Paris March 30 - 31 Stockholm April 2 - 3 Frankfurt April 6 - 7 London For more information visit http://www.eu.microsoft.com/europe/msdn/events/sql/ ================================================= MSDN Flash Tip ================================================= Configuring the Call Stack Window from Visual J++ Developer's Journal During debugging, you can configure the Call Stack Window to display only method parameters, parameter types, or both. Viewing only the parameter types is particularly useful when your code contains a lot of long method names. MSDN Online Members - we have a new Tip for you each week at http://www.microsoft.com/msdn/ For a free issue of Visual J++ Developer's Journal visit http://www.cobb.com/vjp/freevyer.htm To receive the Visual J++ Developer's Journal tip of the Week in email, visit http://www.zdtips.com/vjp/msd-f.htm ================================================= HOW TO JOIN THE MAILING LIST: You received this e-mail newsletter as a result of your registration on the Microsoft Personal Information Center. You may unsubscribe from this newsletter, or subscribe to a variety of other informative newsletters, by returning to the Personal Information Center, http://register.microsoft.com/regwiz/personalinfo.asp and changing your subscription preferences. Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message. ================================================= The information provided is for informational purposes only and Microsoft Corporation and its suppliers make no warranties, either express or implied, as to the accuracy of such information or its fitness to be used for your particular purpose. The entire risk of the use of, or the results from the use of this information remains with you. From bill.stewart at pobox.com Sun Mar 8 13:19:13 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Sun, 8 Mar 1998 13:19:13 -0800 (PST) Subject: Telco Trafic In-Reply-To: Message-ID: <3.0.5.32.19980308123545.008c6100@popd.ix.netcom.com> At 08:56 AM 3/8/98 -0500, Michael Conlen wrote: >Are their products designed to encrypt trafic across Frame Relay or >dedicated telco circuits? There are a wide variety of products to do that. I mainly do ATM, for which there aren't many; there are a few for frame relay, and there are lots for private line at low-medium speeds, e.g. 56kbps through T1 (1.544Mbps), though not too many above T1. Cylink is a popular vendor. Also, a number of routers either currently or soon will support crypto; if you're already using one brand on both ends then you can set up the crypto features, but if you're doing higher speeds you may have performance limitations. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From die at die.com Sun Mar 8 13:35:04 1998 From: die at die.com (Dave Emery) Date: Sun, 8 Mar 1998 13:35:04 -0800 (PST) Subject: [LEGAL] Crypto as Contraband? In-Reply-To: Message-ID: <19980308163525.22538@die.com> On Sun, Mar 08, 1998 at 01:55:29PM -0500, Vin McLellan wrote: > > Whoever at NSA decided that the US national security interests in > crippled-crypto products, such as it is, could be sustained by such a > mechanism obvously never heard of the 2600 tone, once the biggest secret of > the telephone companies. And those who ignore the past, etc., etc.... As someone who was alive and curious back then (mid 60's), I'd take issue with this. I found plenty of technical papers in the Bell System Technical Journal proudly describing so called SF E&M signalling (which uses 2600 hz) in great detail, along with MFKP (blue box tones) and the whole signalling and switching architecture of the (then) Bell system. They were proud of what they had developed and quite willing to share it with the technical community - it was no dark secret at all. There was even a technical paper that described in detail a bizzare two frequency one transistor oscillator that allowed them to build what was essentially a blue box into a operator console keypad. The problem was that nobody outside of a few insider engineers with devious twisted hacker style imaginations and the spook agency types had ever asked what might happen if you sent these in-band tones down the line from a subscriber telephone at just the right (or wrong) moments, and what it might be possible to do with this knowlage. Nobody else knew or cared to find out what might happen if... It is a sad day for US national security if people entrusted with protecting it don't think about how to defeat the protections they put in place because they are linear thinkers hobbled by the idea that everyone will do only the most obvious things. But I really think that they perfectly well know that current software can be easily patched to defeat controls, and that there is little they can do about it. Nor is the threat from software patches to Netscape really likely to endanger much, since there is already a lot of software like PGP available that is already strong. In fact I rather suspect that they are quite happy to see that patch in ciculation since it substantially bolsters their long held insistance that all crypto be implemented in tamperproof hardware chips and not software. What scares me, as I have said before on this list, is what happens when future tamperproof Intel CPUs acquire the ability to run encrypted code decrypted inside the processor and all copies of Windows 2001 are completely unpatchable and opaque (without breaking the crypto) and nicely jiggered to enforce rules about what programs are allowed to do what or even run at all. -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From frantz at netcom.com Sun Mar 8 14:34:37 1998 From: frantz at netcom.com (Bill Frantz) Date: Sun, 8 Mar 1998 14:34:37 -0800 (PST) Subject: [LEGAL] Crypto as Contraband? In-Reply-To: Message-ID: At 1:35 PM -0800 3/8/98, Dave Emery wrote: > What scares me, as I have said before on this list, is what >happens when future tamperproof Intel CPUs acquire the ability to run >encrypted code decrypted inside the processor and all copies of Windows >2001 are completely unpatchable and opaque (without breaking the crypto) >and nicely jiggered to enforce rules about what programs are allowed to >do what or even run at all. I think the logical result of the wide-spread deployment of such systems in the US is loss of leadership in technology. Modern technology is very dependent on high performance software. Between cutting off small scale development and pissing off licensed developers, it sounds like a way to cut the nation's throat. It is hard to see how you could make an OS that prevented you from building a Touring machine and still support the generalized programming needed for technological leadership. I expect that encrypted instruction streams will only be used for copy protection, probably with the same market acceptance that other copy protection schemes have received. ------------------------------------------------------------------------- Bill Frantz | If hate must be my prison | Periwinkle -- Consulting (408)356-8506 | lock, then love must be | 16345 Englewood Ave. frantz at netcom.com | the key. - Phil Ochs | Los Gatos, CA 95032, USA From die at die.com Sun Mar 8 14:47:10 1998 From: die at die.com (Dave Emery) Date: Sun, 8 Mar 1998 14:47:10 -0800 (PST) Subject: [LEGAL] Crypto as Contraband? In-Reply-To: Message-ID: <19980308174741.48691@die.com> On Sun, Mar 08, 1998 at 04:35:25PM -0500, Dave Emery wrote: > On Sun, Mar 08, 1998 at 01:55:29PM -0500, Vin McLellan wrote: > > > What scares me, as I have said before on this list, is what > happens when future tamperproof Intel CPUs acquire the ability to run > encrypted code decrypted inside the processor and all copies of Windows > 2001 are completely unpatchable and opaque (without breaking the crypto) > and nicely jiggered to enforce rules about what programs are allowed to > do what or even run at all. > To amplify my point a bit, it is widely reported that Bill Gates (who is alleged to have started out in business by pirating and selling DEC software as a high school student) has a particularly keen desire to control the widespread piracy of MS products. His aggressive pushes to assert his property rights are well known (and not atypical of reformed sinners if the probably apocryphal report is true). And Microsoft, with its enormous market share of Wintel software, has a very strong incentive to push for implementation of copyright controls and smartcard authentication for its products into the basic architecture of PCs. And guess what - it controls the high level architecture of the worlds PCs pretty much entirely by its monopoly control of the major operating systems that run on them. So it seems frighteningly likely that Microsoft - which would stand to gain a lot of money now lost to piracy from such a feature - will very gladly do all it can to see that crypto based strong copyright enforcement is built into the hardware and inner regions of the operationg system of Wintel systems. And making this work clearly requires that the relevant parts of the inner kernel be unmodifiable (easy to do with digital signatures), and probably kept extremely secret (easy to do with crypto). In such an environment it is awfully easy to strike a deal with the government that adds a little piece or two of code in that black inner space in exchange for a bending a bit on anti-trust enforcement. -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From harding_david at hotmail.com Sun Mar 8 17:38:59 1998 From: harding_david at hotmail.com (harding_david at hotmail.com) Date: Sun, 8 Mar 1998 17:38:59 -0800 (PST) Subject: Bad/No Credit? FIX IT YOURSELF FREE Message-ID: <199803090138.SAA21617@bobcat.sni.net> If you want to fix your bad credit or establish AAA credit in less than 30 days, for FREE, you MUST Click Here ! You will get 2 special free gifts just for visiting my site! Thanks for reading this! I will NOT mail to you again! Click Here To be promptly removed from our list. EPsUn999 From die at die.com Sun Mar 8 17:59:18 1998 From: die at die.com ('die@die.com') Date: Sun, 8 Mar 1998 17:59:18 -0800 (PST) Subject: Encryption export controls are a rationalization of a "cheat" In-Reply-To: <413AC08141DBD011A58000A0C924A6D50D7DC5@MVS2> Message-ID: <19980308205943.36290@die.com> On Sun, Mar 08, 1998 at 01:59:53PM -0800, Ernest Hua wrote: > today. I am not aware of what cellular spectrum chip sets are available > via Wyle or some other distributor, but I wouldn't be surprised if the > cost of a digital intercept equivalent gear would be much more than $300 > in parts plus a 300MHz PC (to decode the intercepted stream). I don't think I'll bother the list with this, but a big problem with cellphones is that people have cellphones. And cellphones are generally not designed to be tamperproof (in many cases little or no effort in this cost competitive market has gone into this) so making a real cellphone serve as the front end to a snooping system has and will be done and in fact be the easiest hack engineering solution. > > The question is, what is worth the potential interceptor's time and > money to do this? It's obvious that politics is enough for the Florida > couple (in the Gingrich case). For a college-age hacker, "because I can > do it" plus "I work in a well-stocked University lab" is probably enough > reason. I won't venture to guess what is worth a criminal's time and > money, but surely existing models for analog piracy behavior is enough > to characterize the trade-offs. There are lots and lots of people who like to be spectators and are keenly interested in other people's affairs. All of us are to some degree - witness the feeding frenzy over the Monica affair - and some guestimates have estimated that perhaps as much as 40% of analog cell calls near large cities are being eavesdropped on by at least one other person. > > In short, we violently agree on the technical plus behavioral front. > But we are preaching to the choir. The real audience for a > easy-to-understand summary is Congress. They need to understand that > the assumptions 30 years ago do not apply today. And that market demand > for more and more technically-literate engineering professionals along > with the phenomenal downward price spiral in PC's and consumer > electronics gear will simply make those assumptions even less applicable > in the future. That problem is getting worse rather than better. The media depiction of the mysterious "hacker" long haired mad kid intent on evil invasion of the worlds computers is helping create the illusion that there is a separate techno criminal class. But the reality is that more and more people are crossing the barriers that the older lawyers in congress never tried to cross and learning something about technology and software. And these people are the guy next door with the cute kids, not fringe crazies. And the evil net allows information to become available much more widely than before. > > Regarding my moral or ethical argument, I am using the fuzzy standard > set by what society will accept or not accept. From my perspective, there are deep divisions and ambivalences in what the US people will tolerate. They hate the idea of being spied open but buy nanny cams and gobble up spy novels and TV shows. They purchase millions of police scanners and react in horror when Linda Tripp tapes a conversation to protect her ass. And they expect the US government to be on top of events around the world and have inside knowlage of other governments and react in horror when their spies are unmasked within our walls, and their eavesdropping gets shown on the nightly news. And cities install more and more cameras and bosses read more email and listen to more calls on business phones every year. > I don't think I need to > argue that most American citizens will be really really pissed if they > found out that the NSA is spying here via their British counterparts, or > that the FBI has conducted far more intercepts than they officially > report. Yes, its definately sausage but it tastes good... > I am definitely not arguing that the FBI or the NSA has any > obligation to inform the public of what weaknesses they use to gain an > intercept advantage. What concerns most people is that they see > (correctly) that the NSA's advantage was not based on technical > superiority, but on the ignorance of everyone else. That is true, and it is also sadly true that a lot of their effort has gone into frank deception, and active determined efforts to block those of us who have been fighting for incorperating at least minimal crypto communications security into the infrastructure. The Internet is ending this era, however, because it is no longer possible to control the flow of information and news about communications security and crypto, and slowly the holes will get plugged. People do get more > intelligent over time, and the rapid public gain in the cryptography > area has pretty much wiped out the gains the NSA has depended on over > the last 50 years. If the average person understands that what the FBI > and the NSA REALLY want is for you to be stupid (at least in the area of > communications security), then there would be an uproar. > This is happening, and that is why Louie is grabbing desperately for the last chance... and why congress is busily passing anti scanner bills to solve the cellphone privacy problem that don't mention a thing about cryptography. Their desparate hope is if they say it solomnly enough and with enough ceremony the public will see the emporer's clothes -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From roger at world.std.com Sun Mar 8 18:24:22 1998 From: roger at world.std.com (Roger H Tancrell) Date: Sun, 8 Mar 1998 18:24:22 -0800 (PST) Subject: Wrong Address??? Message-ID: To Cypherpunks: In the last couple days, I have received many, many e-mail messages. How did I get your your group list??? Perhaps, you have the wrong "Roger". Please remove my name. Thanks. Roger Tancrell From jya at pipeline.com Mon Mar 9 04:10:50 1998 From: jya at pipeline.com (John Young) Date: Mon, 9 Mar 1998 04:10:50 -0800 (PST) Subject: Matt Blaze KE Patent Message-ID: <1.5.4.32.19980309121223.007120d4@pop.pipeline.com> 9 March 1998, MicroPatent: Escrow key management system for accessing encrypted data with portable cryptographic modules (Assignee -- Lucent Technologies Inc.) Abstract: A cryptographic module, such as a smartcard, is designed to a) store decrypting software programs, and information indicative of predetermined conditions under which an escrow agent is enabled to use the software programs stored on the module to decrypt encrypted data files, and b) records for audit purposes, information indicating every time the software programs are used for decryption. Ex Claim Text: A system for managing access to one or more encrypted data files stored in a computer system, said system comprising: a file of the computer system which associates a cryptographic key with a cryptographic module that is subsequently assigned to a selected user; a memory of the cryptographic module which stores a) access information allowing use of the cryptographic module by the selected user under specific conditions, said access information including the cryptographic key, a corresponding cryptographic passphrase and a software program to decrypt the one or more encrypted data files; means responsive to receiving at said cryptographic module said corresponding cryptographic passphrase from said selected user, for a) permitting decryption of said one or more data flies when the specific conditions are met, and b) recording in said memory transactional information associated with said decryption, and b) uses said cryptographic module for the purpose of decrypting one or more of said data files; and means for querying at a later time said cryptographic module to retrieve said transactional information recorded on said memory. Assignee: Lucent Technologies Inc. Patent Number: 5721777 Issue Date: 1998 02 24 Inventor(s): Blaze, Matthew A. If you would like to purchase a copy of this patent, please call MicroPatent at 800-648-6787. From jamesd at echeque.com Sun Mar 8 12:27:22 1998 From: jamesd at echeque.com (James A. Donald) Date: Mon, 9 Mar 1998 04:27:22 +0800 Subject: [LEGAL] Crypto as Contraband? In-Reply-To: Message-ID: -- At 06:20 PM 3/6/98 -0800, Tim May wrote: > How could any "outlawing of unescrowed crypto" conceivably > deal with this vast amount of distributed software? Will a > user of RSA's MailSafe program face jail time for using a > program he legally bought in 1991 (as I did)? > > More questions than answers. Can anybody help me to > understand the legal issues? You are getting out of date. As the rule of law dissolves, legal issues become insignificant, and will in due course vanish altogether. For example nobody knows what are the "legal issues" with putting strong crypto on a web site, as I have done. According to what the legislation says, what I have done is completely in accord with legislation. Indeed, it is completely in accord with US legislation simply to post the stuff. on any server inside the US, the foreigner doing the download is violating the legislation, not the person who put it up. I have gone considerably further than is required by legislation, though not nearly as far as some others have gone. But mere legislation counts for less and less these days. If you read the business press, you will frequently read them complain of cases where the distinctions between executive, legal, and judicial powers are effectively dissolved, and penalties are in effect adminstratively applied for undefined offences, or retrospectively and administratively defined offences, often in ways that appear to personally enrich those administering these quasi judicial powers. Generally this sort of thing is only applied to people who are unpleasant and unpopular. Tobacco companies, junk bond merchants whose businesses have been more profitable for themselves than for many of their investors, and the like. Of course this creates a large vested interest in demonizing more and more people, so that more and more people can be dealt with in this fashion. Similar measures are applied not only to alleged recreational drug distributors, but to lawyers who defend alleged recreational drug distributors, but the business press tends to report such cases less. Meanwhile formerly totalitarian countries, such as China and Cuba, where there used to be no such things as laws, merely some people having the power to harm other people, power exercised in accordance with rules that those subject to this power were forbidden to know, are moving towards the rule of law. It used to be that if someone imprisoned in Cuba were to discover the actual reason for his imprisonment, he might possibly suffer some draconian additional punishment for improper possession of state secrets. In a fully totalitarian state, the regime does not have rules for most people, merely goals and desires. If some desire is not fulfilled, the masters will go around killing people more or less at random until somebody fulfills that desire, or until they have killed so many people that they suspect that what they desire is not readily achievable, or sometimes until they simply run out of people who might be able to assist in fulfilling that desire. For example all people possessing certain skills and experience were wiped out by Stalin, and in Cambodia everyone connected to the jute industry in any way. Such rules as exist only apply to the privileged, to those administering the terror, not to those terrorized. Crypto legislation is likely to resemble the announcement of a desire, rather than the announcement of rules and restrictions likely to fulfill that desire. Indeed, the proposals we have so far seen are desires, not rules. As you point out, that desire cannot be fulfilled, except by means that further radically undermine the rule of law. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG KheXnmd1kekBNA4gB1wyUeQgjPT7Y26FWeajCBIR 43jg9sJBVPllkPf+Yt2ByoAf/sIdt9xbXwh/wMV+Z From tsudik at pollux.usc.edu Mon Mar 9 09:02:08 1998 From: tsudik at pollux.usc.edu (Gene Tsudik) Date: Mon, 9 Mar 1998 09:02:08 -0800 (PST) Subject: Final CFP: 5th ACM Conference on Computer and Communications Security Message-ID: <199803091701.JAA20079@pollux.usc.edu> Final Call for Papers Fifth ACM Conference on Computer and Communications Security San Francisco, California November 3-5, 1998 Sponsored by ACM SIGSAC Papers offering novel research contributions in any aspect of computer security are solicited for submission to the Fifth ACM Conference on Computer and Communications Security. Papers may present theory, technique, applications, or practical experience on topics including but not limited to access control authentication accounting and audit mobile code security applied cryptography data/system integrity cryptographic electronic commerce intrusion detection protocols key management privacy and anonymity intellectual property protection information warfare secure networking secure operating systems viruses and worms security management distributed systems security database security smart-cards and secure security verification PDAs Accepted papers will be presented at the conference and published by the ACM in a conference proceedings. Outstanding papers will be invited for possible publication in ACM Transactions on Information and System Security. Instructions for paper submissions: Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with a proceedings. Papers should be at most 15 pages excluding the bibliography and well-marked appendices (using 11-point font and reasonable margins on 8.5'x11' paper), and at most 20 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Papers should be submitted in a form suitable for anonymous review (no author names or affiliations). * Send via email to reiter at research.att.com a plain ASCII text message containing the title and abstract of your paper, the authors' names, email and postal addresses, phone and fax numbers, and identification of the contact author. * In addition, submit your paper using ONE of the following two methods. o Electronic submission (preferred): Instructions for submitting your Postscript paper by e-mail can be obtained from http://www.research.att.com/~reiter/ccs5/esub.html or by sending email to ccs98 at research.att.com with the Subject line containing "HELP". It is strongly recommended that you electronically submit your paper at least five days in advance of the submission deadline, to allow us adequate time to verify that we can print your paper (and if not, to allow you to submit your paper in hardcopy to be received by the submission deadline). We cannot be held responsible for papers that we cannot print. OR o Hardcopy submission: Send eighteen (18) copies of your paper to the program chair at the address below with a cover letter indicating that your paper is a submission for the 5th ACM Conference on Computer and Communications Security, and listing the authors' names, email and postal addresses, phone and fax numbers, and identifying the contact author. Submissions received after the submission deadline will be rejected without review. Where possible all further communications to authors will be via email. Paper submissions due: April 3, 1998 Acceptance notification: June 5, 1998 Final papers due: July 16, 1998 Instructions for panel proposals The conference may include panel sessions addressing topics of interest to the computer security community. Proposals for panels should be no longer than five (5) pages in length and should include possible panelists and an indication of which of those panelists have confirmed participation. Send two (2) hardcopies of your proposal to the program chair at the address below with a cover letter indicating that your proposal is for the 5th ACM Conference on Computer and Communications Security, and listing the proposers' names, email and postal addresses, and phone and fax numbers. Panel proposals due: May 1, 1998 Acceptance notification: June 5, 1998 Steering committee chair: Ravi Sandhu, George Mason University General chair: Li Gong, JavaSoft Program chair: Mike Reiter AT&T Labs, Room A269, 180 Park Avenue Florham Park, NJ 07932-0971 USA phone: +973-360-8349 Awards chair: Jacques Stern, ENS/DMI Publication chair: Stuart Stubblebine, AT&T Labs Publicity chair: Gene Tsudik, USC ISI Program committee: Martin Abadi, DEC SRC David Naccache, Gemplus Bill Cheswick, Lucent/Bell Labs Hilarie Orman, DARPA/ITO Carl Ellison, Cybercash Avi Rubin, AT&T Labs--Research Ed Felten, Princeton University Pierangela Samarati, Universita di Milano Paul Karger, IBM T.J. Watson Gene Tsudik, USC ISI Steve Kent, BBN Corporation Paul Van Oorschot, Entrust Technologies Ueli Maurer, ETH Zurich Bennet Yee, UCSD Cathy Meadows, Naval Res. Lab Moti Yung, CertCo For more information, visit http://www.research.att.com/~reiter/ccs5 or http://www.isi.edu/~gts/cfp.html From jtsr-stock at jtsr-stock.com Mon Mar 9 09:48:50 1998 From: jtsr-stock at jtsr-stock.com (jtsr-stock at jtsr-stock.com) Date: Mon, 9 Mar 1998 09:48:50 -0800 (PST) Subject: JT's Restarants - Excellent Undervauled Investment Opportunity Message-ID: <199803091748.JAA04824@toad.com> To be removed from our mailing list please reply to this message with "REMOVE" in the subject. Recently we wrote you to tell about an excellent investment opportunity in JT's Restaurants (OTC BB: JTSR). Since our last message was sent JTSR has risen in value over 40% (from Feb 17, 1998 to March 6, 1998). This is just the beginning. This is still a ground floor opportunity. If you would like more information about this exciting investment opportunity please visit our web site at http://www.jtsr-stock.com or call 1-888-295-6365 for complete information. The contents of this message have been provided for the review of potential investors only and does not constitute an offering of securities. From sara at iddqd.org Mon Mar 9 10:00:38 1998 From: sara at iddqd.org (sara at iddqd.org) Date: Mon, 9 Mar 1998 10:00:38 -0800 (PST) Subject: Free Insurance Quote Message-ID: <199803091800.KAA04912@toad.com> DO YOU WANT LIFE INSURANCE FROM THE BEST COMPANIES AT THE LOWEST PRICE? COMPANIES LIKE: Security Connecticut, First Colony Life, Lincoln Benefit Life, Life of Virginia, Midland, Mutual of Omaha, New York Life, and many, many others! COMPARE YOUR CURRENT COVERAGE to these 10-year level term sampler, monthly premiums for super-preferred non-smokers. Age $100,000 $250,000 $500,000 Male Female Male Female Male Female 30 $10.00 $10.00 $17.00 $15.00 $28.00 $24.00 40 $12.00 $11.00 $21.00 $19.00 $36.00 $32.00 50 $21.00 $17.00 $44.00 $33.00 $82.00 $59.00 60 $43.00 $29.00 $99.00 $63.00 $193.00 $119.00 Are you paying too much for coverage? Chances are we can help! With past cases, our insurance professionals have SAVED THEIR CLIENTS AS MUCH AS 60% IN ANNUAL PREMIUMS! Visit http://www.servicebrokers.com/life_insurance.htm for a FREE rate quote TODAY! Our members shop the market for you to offer the lowest priced "A" and above rated Life Insurance companies in your state! Why waste YOUR time and MONEY with a one-company agent? To receive your FREE NO OBLIGATION quote, please: Visit http://www.servicebrokers.com/life_insurance.htm or http://www.servicebrokers.com/health_insurance.htm for individuals and businesses If you do not wish to receive information regarding, life, health and other insurance related offers as well as information on home loans. please click here: mailto:sara at iddqd.org?subject=remove From honig at otc.net Mon Mar 9 10:05:41 1998 From: honig at otc.net (David Honig) Date: Mon, 9 Mar 1998 10:05:41 -0800 (PST) Subject: Crypto as contraband In-Reply-To: <19980306231001.53809@die.com> Message-ID: <3.0.5.32.19980309094018.007be4f0@otc.net> >> So yes, they have done at least as bad a thing to people who >> merely want to tinker with their radios and occasionally explore what is >> out there in the ether by passively and in private receiving radio >> signals as they have to gun owners, The morons in congress responded to intercepts of cellphones. Because Newt was scanned. Response: outlaw *cellphones*... which are themselves typically programmable as scanners of cell freqs. And scanners and programmable RF receivers. Someone should pick up a congresscritter's monitor (a la van Eyk), then let them make fools of themselves banning television receivers... as video tempest receiving gear... [NB: since television Ch 83 overlaps with a cell-phone channel, TVs are already illegal under this law, no? Selling an old analog b/w TV is now punishable by 1/2 million fine... ] Are they going to ban IR lasers since they can be used to listen to window vibration? Remember Tacitus. ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu "I do believe that where there is a choice only between cowardice and violence, I would advise violence." Mahatma Gandhi From dc at panix.com Mon Mar 9 12:31:16 1998 From: dc at panix.com (David W. Crawford) Date: Mon, 9 Mar 1998 12:31:16 -0800 (PST) Subject: Fred Cohen's The Deception ToolKit (fwd) Message-ID: <42> >From comp.risks digest 19.62 > ------- Start of forwarded message ------- > Date: Mon, 9 Mar 1998 05:52:28 -0800 (PST) > From: Fred Cohen > Subject: The Deception ToolKit > > I would like to announce and introduce a new security tool available for free > from over the Internet - The Deception ToolKit - available from http://all.net/ > > The Deception ToolKit (DTK) is a toolkit designed to give defenders a couple > of orders of magnitude advantage over attackers. > > The basic idea is not new. We use deception to counter attacks. In the case > of DTK, the deception is intended to make it appear to attackers as if the > system running DTK has a large number of widely known vulnerabilities. DTK's > deception is programmable, but it is typically limited to producing output > in response to attacker input in such a way as to simulate the behavior of a > system which is vulnerable to the attackers method. This has a few > interesting side effects: > > It increases the attacker's workload because they can't easily tell > which of their attack attempts works and which fail. For example, if > an attack produces what appears to be a Unix password file, the > attacker would normally run "Crack" to try to break into the system. > But if the password file is a fake, it consumes the attackers time and > effort to no result. > > It allows us to track attacker attempts at entry and respond before > they come across a vulnerability we are susceptible to. For example, > when the attacker tries to use a known Sendmail attack against our > site, we record all of their entries to track their techniques. With > this deception in place, we have no problem picking up port scans, > password guessing, and all manner of other attack attempts as they happen. > > It sours the milk - so to speak. If one person uses DTK, they can see > attacks coming well ahead of time. If a few others start using it, we > will probably exhaust the attackers and they will go somewhere else to > run their attacks. If a lot of people use DTK, the attackers will find > that they need to spend 100 times the effort to break into systems and > that they have a high risk of detection well before their attempts succeed. > > If enough people adopt DTK and work together to keep it's deceptions > up to date, we will eliminate all but the most sophisticated > attackers, and all the copy-cat attacks will be detected soon after > they are released to the wide hacking community. This will not only > sour the milk, it will also up the ante for would-be copy-cat > attackers and, as a side effect, reduce the "noise" level of attacks to > allow us to more clearly see the more serious attackers and track them down. > > If DTK becomes very widespread, one of DTK's key deceptions will > become very effective. This deception is port 507 - which we have > staked a claim for as the deception port. Port 507 indicates whether > the machine you are attempting to connect to is running a deception > defense. Naturally, attackers who wish to avoid deceptive defenses > will check there first, and eventually, simply running the deceptive > defense notifier will be adequate to eliminate many of the attackers. > Of course some of us defenders will not turn on the deception > announcement message so we can track new attack attempts by those who > avoid deceptive defenses, so... the attacker's level of uncertainty > rises, and the information world becomes a safer place to work. > > Your positive and helpful comments are appreciated. FC > > Fred Cohen & Associates: http://all.net - fc at all.net - tel/fax:510-454-0171------- End of forwarded message ------- David W. Crawford Los Gatos, CA From rubin at research.att.com Mon Mar 9 13:59:17 1998 From: rubin at research.att.com (Avi Rubin) Date: Mon, 9 Mar 1998 13:59:17 -0800 (PST) Subject: Updated list of crypto and security courses Message-ID: <199803092156.QAA12426@mgoblue.research.att.com> Thanks to everyone for your great suggestions/additions/deletions. I added, changed or deleted over 25 courses this time around. Now back to my regularly scheduled life. The updated course list can be found at: http://www.cs.nyu.edu/~rubin/courses.html Avi ********************************************************************* Aviel D. Rubin rubin at research.att.com Secure Systems Research Dept. Adjunct Professor at NYU AT&T Labs - Research 180 Park Avenue http://www.research.att.com/~rubin/ Florham Park, NJ 07932-0971 Voice: +1 973 360-8356 USA FAX: +1 973 360-8809 --> Check out http://www.clark.net/pub/mjr/websec/ for a new book on web security (The Web Security Sourcebook). ********************************************************************* From jtatz at chemistry.ohio-state.edu Mon Mar 9 14:04:50 1998 From: jtatz at chemistry.ohio-state.edu (Jim Tatz) Date: Mon, 9 Mar 1998 14:04:50 -0800 (PST) Subject: Crypto as contraband In-Reply-To: <3.0.5.32.19980309094018.007be4f0@otc.net> Message-ID: > The morons in congress responded to intercepts of cellphones. Because > Newt was scanned. Response: outlaw *cellphones*... which are > themselves typically programmable as scanners of cell freqs. And scanners > and programmable RF receivers. The ECPA (Electronic Communications Privacy Act) banned cell phone scanning, as of 1994 I believe. When Newt was monitored, that was nothing really new. Ch 83, (890-986?) is cell, however Federal law (Title 18, Chapter 119) makes cell monitoring illegal only if it INTENTIONAL. And owning and buying cell-phone capable devices is LEGAL. The only catch is who is selling it, it is my understanding you can sell a cell scanner used without a prob. I currently own a cell-capable scanner. ~Jim ------------------------------------------ A great man named Ben Tersian once said "Avoid the cliche 'Information must be free'" "Find it learn it embrace it and set it free." From jtsr-stock at jtsr-stock.com Mon Mar 9 14:12:47 1998 From: jtsr-stock at jtsr-stock.com (jtsr-stock at jtsr-stock.com) Date: Mon, 9 Mar 1998 14:12:47 -0800 (PST) Subject: JT's Restarants - Excellent Undervauled Investment Opportunity Message-ID: <199803092212.OAA07415@cygint.cygnus.com> To be removed from our mailing list please reply to this message with "REMOVE" in the subject. Recently we wrote you to tell about an excellent investment opportunity in JT's Restaurants (OTC BB: JTSR). Since our last message was sent JTSR has risen in value over 40% (from Feb 17, 1998 to March 6, 1998). This is just the beginning. This is still a ground floor opportunity. If you would like more information about this exciting investment opportunity please visit our web site at http://www.jtsr-stock.com or call 1-888-295-6365 for complete information. The contents of this message have been provided for the review of potential investors only and does not constitute an offering of securities. From jtatz at chemistry.ohio-state.edu Mon Mar 9 14:32:28 1998 From: jtatz at chemistry.ohio-state.edu (jtatz at chemistry.ohio-state.edu) Date: Mon, 9 Mar 1998 14:32:28 -0800 (PST) Subject: Crypto as contraband Message-ID: <350453B0.7E32@accessatlanta.com> > The morons in congress responded to intercepts of cellphones. Because > Newt was scanned. Response: outlaw *cellphones*... which are > themselves typically programmable as scanners of cell freqs. > And scanners > and programmable RF receivers. The ECPA (Electronic Communications Privacy Act) banned cell phone scanning, as of 1994 I believe. When Newt was monitored, that was nothing really new. Ch 83, (890-986?) is cell, however Federal law (Title 18, Chapter 119) makes cell monitoring illegal only if it INTENTIONAL. And owning and buying cell-phone capable devices is LEGAL. The only catch is who is selling it, it is my understanding you can sell a cell scanner used without a prob. I currently own a cell-capable scanner. ~Jim ------------------------------------------ A great man named Ben Tersian once said "Avoid the cliche 'Information must be free'" "Find it learn it embrace it and set it free." From tm at dev.null Mon Mar 9 16:50:29 1998 From: tm at dev.null (Tim May) Date: Mon, 9 Mar 1998 16:50:29 -0800 (PST) Subject: [WAREZ] Mr. Hankey claims squatter's rights Message-ID: <35047490.456C@dev.null> * The show business newspaper Daily Variety reported in December that John Kricfalusi, creator TV's "The Ren & Stimpy Show," was threatening legal action against the producers of the Comedy Central show "South Park" for ripping off a cartoon character. According to Kricfalusi, his character "Nutty the Friendly Dump," an animated piece of excrement, must have been the basis for "South Park"'s "Mr. Hankey the Christmas Poo," a holiday-dressed, singing, dancing piece of excrement. ~~~~~~~~~~~~ WEIRDNUZ.520 (News of the Weird, January 23, 1998) by Chuck Shepherd NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated newspaper column distributed by Universal Press Syndicate. To receive the columns by e-mail, free of charge, send a message to notw-request at nine.org with the Subject line of Subscribe. To read these News of the Weird newspaper columns from the past six months, go to http://www.nine.org/notw/notw.html (That site contains no graphics, no photos, no video clips, no audio. Just text. Deal with it.) From tm at dev.null Mon Mar 9 16:50:33 1998 From: tm at dev.null (Tim May) Date: Mon, 9 Mar 1998 16:50:33 -0800 (PST) Subject: D.C.'s Sister City? Message-ID: <350476A6.51E4@love.cum> * According to a report in the Washington Post in November, armed robbers in the large Nigerian trading city of Onitsha are so bold, and the police so outmanned, that they often notify the victims in advance that they will be coming to rob them, to encourage the residents to be away from the house at the time. A few days after the police announced a crackdown, one gang of 50 armed robbers cordoned off a street and looted every apartment building on the block. ~~~~~~~~~~~~ WEIRDNUZ.520 (News of the Weird, January 23, 1998) by Chuck Shepherd NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated newspaper column distributed by Universal Press Syndicate. To receive the columns by e-mail, free of charge, send a message to notw-request at nine.org with the Subject line of Subscribe. To read these News of the Weird newspaper columns from the past six months, go to http://www.nine.org/notw/notw.html (That site contains no graphics, no photos, no video clips, no audio. Just text. Deal with it.) From blanc at cover.ed Mon Mar 9 16:50:47 1998 From: blanc at cover.ed (Blanc Weber) Date: Mon, 9 Mar 1998 16:50:47 -0800 (PST) Subject: The Revolution is NOW! (Think about it, Gertrude...over a Stein of beer, perhaps?) Message-ID: <35047968.23C7@cover.ed> * What Goes Around, Comes Around: Since taking control of most of Afghanistan in September 1996, the religious Taliban army has enforced strict, conservative Islamic rule, especially regarding the work, recreation, and dress of women. Now, according to a report in the London Daily Telegraph in November, a splinter Muslim group about 200 miles north of Kabul has begun to train a women-only battalion to fight the Taliban. Females from the Hazaras, a Turkic Mongol ethnic group, have been training at a secret location and will soon begin a major recruiting campaign. ~~~~~~~~~~~~ WEIRDNUZ.520 (News of the Weird, January 23, 1998) by Chuck Shepherd NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated newspaper column distributed by Universal Press Syndicate. To receive the columns by e-mail, free of charge, send a message to notw-request at nine.org with the Subject line of Subscribe. To read these News of the Weird newspaper columns from the past six months, go to http://www.nine.org/notw/notw.html (That site contains no graphics, no photos, no video clips, no audio. Just text. Deal with it.) From do at 2me.dash Mon Mar 9 16:50:49 1998 From: do at 2me.dash (Wilhelm Geiger III) Date: Mon, 9 Mar 1998 16:50:49 -0800 (PST) Subject: The Filth Dogman of the Surveillance Apocalypse Message-ID: <35048609.5EB4@2me.dash> * In August, two cities debated plans to reduce the amount of dog poop in municipal parks and on sidewalks. The city of Christchurch, New Zealand, was contemplating installing a series of anonymous "poopcams" around town to catch dog owners who neglect their scooping duty. And Tel Aviv, Israel, announced that squads of plainclothes police officers armed with cameras and night-vision equipment were on duty around the clock photographing violators of its ordinance. ~~~~~~~~~~~~ WEIRDNUZ.520 (News of the Weird, January 23, 1998) by Chuck Shepherd NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated newspaper column distributed by Universal Press Syndicate. To receive the columns by e-mail, free of charge, send a message to notw-request at nine.org with the Subject line of Subscribe. To read these News of the Weird newspaper columns from the past six months, go to http://www.nine.org/notw/notw.html (That site contains no graphics, no photos, no video clips, no audio. Just text. Deal with it.) From hughes at huge.cum Mon Mar 9 16:50:54 1998 From: hughes at huge.cum (Eric Hughes) Date: Mon, 9 Mar 1998 16:50:54 -0800 (PST) Subject: CypherPunks -- The Early Years Message-ID: <35047ADA.2EEF@huge.cum> * William Garland, the father of the late rap singer Tupac Shakur, fighting for part of Shakur's multi-million-dollar estate in Los Angeles in August, despite his having had no contact with his son after age five, pointed out at a hearing how he was a good father. For example, he said he would often tuck in little Tupac, a bed- wetter, with another Garland son, also a bed-wetter: "They could pee with each other." ~~~~~~~~~~~~ WEIRDNUZ.520 (News of the Weird, January 23, 1998) by Chuck Shepherd NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated newspaper column distributed by Universal Press Syndicate. To receive the columns by e-mail, free of charge, send a message to notw-request at nine.org with the Subject line of Subscribe. To read these News of the Weird newspaper columns from the past six months, go to http://www.nine.org/notw/notw.html (That site contains no graphics, no photos, no video clips, no audio. Just text. Deal with it.) From cap at knees.gun Mon Mar 9 16:52:27 1998 From: cap at knees.gun (Carol Anne CypherPunk) Date: Mon, 9 Mar 1998 16:52:27 -0800 (PST) Subject: I want 5-1/2 inches, and I want to bleed... Message-ID: <35047E46.16EF@knees.gun> * Robert Kong, 13, was arrested and charged with manufacturing a destructive device, namely a 5-1/2-inch pipe bomb that he had made, gift-wrapped, and presented to a female classmate in Corvallis, Ore., for her birthday. He said he followed the instructions he had seen on an Internet site. ~~~~~~~~~~~~ WEIRDNUZ.520 (News of the Weird, January 23, 1998) by Chuck Shepherd NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated newspaper column distributed by Universal Press Syndicate. To receive the columns by e-mail, free of charge, send a message to notw-request at nine.org with the Subject line of Subscribe. To read these News of the Weird newspaper columns from the past six months, go to http://www.nine.org/notw/notw.html (That site contains no graphics, no photos, no video clips, no audio. Just text. Deal with it.) From orowley at imaginemedia.com Mon Mar 9 16:55:40 1998 From: orowley at imaginemedia.com (Owen Rowley) Date: Mon, 9 Mar 1998 16:55:40 -0800 (PST) Subject: [LEGAL] Crypto as Contraband? In-Reply-To: Message-ID: <35048F2F.CFCC496D@imaginemedia.com> Dave Emery wrote: > To amplify my point a bit, it is widely reported that Bill Gates > (who is alleged to have started out in business by pirating and selling > DEC software as a high school student) has a particularly keen desire to > control the widespread piracy of MS products. His aggressive pushes to > assert his property rights are well known (and not atypical of reformed > sinners if the probably apocryphal report is true). some clues: clue 1) http://www.fourmilab.ch/autofile/www/section2_106_6.html#SECTION001066000000000000000 clue 2) http://www.fourmilab.ch/autofile/www/section2_106_7.html bonus mega clue) http://www.fourmilab.ch/autofile/www/section2_106_1.html#SECTION001061000000000000000 HELL Check out the whole Program. http://www.fourmilab.ch/autofile/www/chapter2_106.html LUX ./. owen From jkwilli2 at unity.ncsu.edu Mon Mar 9 17:39:30 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Mon, 9 Mar 1998 17:39:30 -0800 (PST) Subject: U.S. NATIONAL INFORMATION EMERGENCY DECLARED (Future View) (fwd) Message-ID: ____________________________________ U.S. NATIONAL INFORMATION EMERGENCY DECLARED (Future View) Hamilton, Bermuda -- Radio Free America at 2000 UTC -- (February 24, 1999) - FBI director Louis Freeh, Jr. today announced a nationwide crackdown on Internet abusers as President Clinton invoked new authorities granted him under the Information Infrastructure Defense Act (IIDA) of 1998. White House Press Secretary Monica Lewinsky said the President declared a national information emergency at 9:23 last night. The emergency automatically lasts for 100 days. The President may then seek an extension after consulting with three members of Congress. The FBI's Indication and Warning Threat Center in Newington, Virginia first reported an 850 percent increase in illegal Internet access attempts last Thursday, prompting Mr. Freeh to ask for the presidential emergency declaration. Among the sites hacked were the White House's Automated Oval Office Visit Scheduling System; the Democratic National Committee's Insta-Donation System; the Bureau of Alcohol, Tobacco, and Firearms Tennessee Summer Picnic Reservation System; the FBI's Hostage Rescue Team's Seventh Day Adventist Watch Network (also known as "Deep Six the Sevens Net"); the Electronic Pearl Harbor Visitors' Center; the Arkansas Attorney General's Cases-Disposed -Without-Further- Investigation System; the Embassy of China's "Rent-a-Prez" system; and the Indonesian Embassy's Rupiah-to-Dollar Laundromat Net. The nationwide sting of Internet intruders began at noon yesterday when the New York field office of the Secret Service arrested 25 members of the Brooklyn Cyberspace Liberation Front at their regularly scheduled Tuesday meeting at a Bayside Cyber Caf�. Secret Service spokesman Biff "Buck" Arew said, "it took us a while to figure out when they were going to be in one spot, but after we employed our best investigative techniques, we had them right where we wanted them. The arresting part was easy." The Secret Service is a designated information infrastructure law enforcement agency under the 1998 legislation. It was joined by elements of the FBI, the U.S. Marshals' Service, the Federal Emergency Management Agency, the Postal Inspection Service, the Park Service, the Border Patrol, the Enforcement Division of the Federal Communications Commission, as well as New York Mayor Rudy Giuliani, in the coast-to-coast operation. Meanwhile, special FAA security officers on loan from Microsoft were busy at the nation's airports searching the notebook and palmtop computers of air travelers for illegal software programs. At the Pentagon, the Chairman of the Joint Chiefs of Staff said, "the military now reserves the right to move forward on the information super highway." He said he considers the Internet similar to the nation's interstate highway system. "When you have a bunch of stalled cars from a high-altitude combination electromagnetic and gamma-ray burst littering all the passing lanes and on- ramps, our armored vehicles just need to push them aside and move on." The general, who escaped a recent international war crimes indictment resulting from his peacekeeping duties in Angola, did not elaborate on the meaning of his comment. Other mass arrests of hackers were made in Chicago; New Orleans; Sunnyvale, California; Tampa; Atlanta, Washington, D.C.; Los Angeles; and St. Louis. Some of the arrested individuals are noted opponents of the government's policies to control the flow of information on the Internet. Internet users report that some controversial web sites are no longer accessible, although the FBI refused to confirm whether their operators were among those arrested. The inaccessible sites include those of the Libertarian Alliance, USA; Cascadia Green Party; Outer Banks Secessionist Party; Ashcroft for President 2000; Supreme Court, Free Crypto Home Page; First Amendment Enforcement Coalition; United We Stand (Marxist-Leninist); SPAM Prohibition League; Virtual Zapatista, and the Arizona Naturist Home Page. Federal officials stated that the number of arrests totaled more than 900. Critics of the government action claim the number is much higher. An Amnesty International spokesperson in Teheran said she thinks the number may be well over 15,000 but that it was "difficult to get news from America under the present circumstances." The National Security Agency's National Information Warfare Center in Fort Meade, Maryland, reported that the identities of several overseas hackers had been passed to their respective governments for possible prosecution under U.S. law under the mutual law enforcement and extradition provisions of the IIDA. Scotland Yard said it had arrested 17 intruders in the greater London area while Europol was preparing to make several arrests in France, Italy, and Austria. At a press conference at the U.S. Embassy in London, Prime Minister Tony Blair, upon leaving a cabinet meeting, said he was in close communication with President Clinton during "this extraordinary emergency" and that "he fully understood what the Americans were ordering him to do." The government of Burma summarily executed 153 members of the Rangoon Computer Club. In Ottawa, the RCMP said the FBI's Canada Law Enforcement Extension Task Force was investigating several groups in Montreal, Halifax, and Vancouver and expected to make a large number of arrests "soon." The RCMP official admitted that, "because we do not normally get involved in FBI matters on Canadian soil, I cannot give you precise details about the operation." If convicted, the arrested hackers face a maximum penalty of 25 years in prison and/or a $200,000 fine. Freeh said that he anticipated further arrests would be made as federal investigators sifted through more communications records, America On Line profiles, and escrowed encryption keys. The stored keys are used by federal agents to read scrambled e-mail messages sent by hackers and the 12 independent special counsels investigating the administration. Vice President Gore issued a statement in which he said, "I praise the valiant efforts of our federal investigators in isolating and terminating the disruptive actions of individuals and groups who were bent on interfering with our precious national information thoroughfares." Gore said he hoped the government's action would "send a clear signal to others who believe that such activities will go unpunished. The government has a controlling legal authority to address these threats." Gore, an announced candidate for president in 2000, said one of his first acts would be to create a Secretary of Information cabinet post that would regulate the use of electronic information throughout the country. "Just as we created a Department of Defense in 1947 to confront the nuclear threat, we must have a Department of Information in 2001 to face the millennial cyber threat," Gore declared. From wombat at mcfeely.bsfs.org Mon Mar 9 17:42:32 1998 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Mon, 9 Mar 1998 17:42:32 -0800 (PST) Subject: The Filth Dogman of the Surveillance Apocalypse In-Reply-To: <35048609.5EB4@2me.dash> Message-ID: Toto needs to study the bat book. On Mon, 9 Mar 1998, Wilhelm Geiger III wrote: > * In August, two cities debated plans to reduce the amount of dog > poop in municipal parks and on sidewalks. The city of From billp at nmol.com Mon Mar 9 18:04:25 1998 From: billp at nmol.com (bill payne) Date: Mon, 9 Mar 1998 18:04:25 -0800 (PST) Subject: Statsi, sayanim, spiking crypto Message-ID: <35049DD9.52CA@nmol.com> Monday 3/9/98 6:17 PM merata at pearl.sums.ac.ir lawya at lucs-01.novell.leeds.ac.uk sjmz at hplb.hpl.hp.com Guys I just read a printed copy I made of Crypto AG: The NSA's Trojan Whore? http://caq.com/CAQ/caq63/caq63madsen.html starting at http://www.aci.net/kalliste/ fairly carefully. I seized upon Madsen�s statements, 1 the random encryption key could be automatically and clandestinely transmitted with the enciphered message. 2 they may also have been tipped off by Stasi files of the ex-East German regime that found their way to Iran Try MfS agents who went to work for Iran after the Cold War. Then there was the postcard from Tel Aviv I received at Sandia labs which followed-up a yellow piece of paper sent by snail mail asking numbered detailed question about work I was doing at Sandia. I responded back to the postcard, by postcard of course, �Know any sayanim?� No response. It doesn't take at rocket scientist to figure that one out. Let�s all hope for settlement of this unfortunate matter so that we can all move on to more constructive projects. Best bill From jtsr-stock at jtsr-stock.com Mon Mar 9 18:12:26 1998 From: jtsr-stock at jtsr-stock.com (jtsr-stock at jtsr-stock.com) Date: Mon, 9 Mar 1998 18:12:26 -0800 (PST) Subject: JT's Restarants - Excellent Undervauled Investment Opportunity Message-ID: <199803100212.SAA08270@toad.com> To be removed from our mailing list please reply to this message with "REMOVE" in the subject. Recently we wrote you to tell about an excellent investment opportunity in JT's Restaurants (OTC BB: JTSR). Since our last message was sent JTSR has risen in value over 40% (from Feb 17, 1998 to March 6, 1998). This is just the beginning. This is still a ground floor opportunity. If you would like more information about this exciting investment opportunity please visit our web site at http://www.jtsr-stock.com or call 1-888-295-6365 for complete information. The contents of this message have been provided for the review of potential investors only and does not constitute an offering of securities. From die at die.com Mon Mar 9 18:29:04 1998 From: die at die.com (Dave Emery) Date: Mon, 9 Mar 1998 18:29:04 -0800 (PST) Subject: EU plans decryption ban In-Reply-To: Message-ID: <19980309212946.23723@die.com> On Mon, Mar 09, 1998 at 11:26:15PM +0000, Markus Kuhn wrote: > After government attempts to ban unrestricted encryption, we are > now facing a decryption ban > > Industry lobbyist groups have managed to persuade the European > Commission to introduce rather radical new legislation for protecting > pay-TV broadcasters against unauthorized reception by consumers. Not > only the commercial advertising and sale of pirate devices is to be > prohibited (this has already been the case in a number of member > countries and is perfectly acceptable), but also the private possession or > use of clone decoders as well as any private exchange of information about > the security properties of pay-TV encryption systems will become illegal > and punishable under the planned EU conditional access directive. > In the US there is not yet a ban on exchange of information because of the potential first amendment issues, but there are (and have been since the late 1980s) felony level bans with $500,000 fines for each incident on the manufacture, assembly, modification, import, export, sale and distribution of any device or equipment primarily of assistance in the unauthorized decryption of satellite cable programming or direct to home satellite. And unauthorized interception of radio signals including satellite video transmissions that are scrambled or encrypted can be prosecuted under current law as a felony. -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From billp at nmol.com Mon Mar 9 18:48:36 1998 From: billp at nmol.com (bill payne) Date: Mon, 9 Mar 1998 18:48:36 -0800 (PST) Subject: REASONABLENESS Message-ID: <3504A945.1286@nmol.com> Guys The great ANGLO ARMADA is sailing near Iran. And the Armada needs to expend its 'intelligent' weapons for business reasons. Be on the BEST OF BEHAVIOR. best regards bill Monday 3/9/98 6:17 PM merata at pearl.sums.ac.ir lawya at lucs-01.novell.leeds.ac.uk sjmz at hplb.hpl.hp.com Guys I just read a printed copy I made of Crypto AG: The NSA's Trojan Whore? http://caq.com/CAQ/caq63/caq63madsen.html starting at http://www.aci.net/kalliste/ fairly carefully. I seized upon Madsen's statements, 1 the random encryption key could be automatically and clandestinely transmitted with the enciphered message. 2 they may also have been tipped off by Stasi files of the ex-East German regime that found their way to Iran Try MfS agents who went to work for Iran after the Cold War. Then there was the postcard from Tel Aviv I received at Sandia labs which followed-up a yellow piece of paper sent by snail mail asking numbered detailed questions about work I was doing at Sandia. I responded back to the postcard, by postcard of course, "Know any sayanim?" No response. It doesn't take at rocket scientist to figure that one out. Let's all hope for settlement of this unfortunate matter so that we can all move on to more constructive projects. Best bill From afabbro at umich.edu Mon Mar 9 18:48:43 1998 From: afabbro at umich.edu (andrew fabbro) Date: Mon, 9 Mar 1998 18:48:43 -0800 (PST) Subject: Wu-Tang Clan cypherpunk reference Message-ID: "Watch for the wooden soldiers, C-cypher punks couldn't hold us" -- "Triumph," Wu-Tang Clan, -Wu-Tang Forever- This is listed on the Wu-Tang Clan's home page (www.wu-tang.com), so presumably the lyric is accurate. Anyone know what the reference is? -- Andrew Fabbro [afabbro at umich.edu] [andrewf at jesuswept.com] http://www-personal.umich.edu/~afabbro/ 313.647.2713 "We make money the old fashion way. We print it." - DigiCrime From rah at shipwright.com Tue Mar 10 04:15:42 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 10 Mar 1998 04:15:42 -0800 (PST) Subject: DCSB: Adam Shostack; No Silver Bullet -- Digital Commerce and Payment Security Message-ID: --- begin forwarded text X-Sender: rah at pop.sneaker.net Mime-Version: 1.0 Date: Mon, 9 Mar 1998 17:37:24 -0500 To: dcsb at ai.mit.edu, dcsb-announce at ai.mit.edu From: Robert Hettinga Subject: DCSB: Adam Shostack; No Silver Bullet -- Digital Commerce and Payment Security Cc: Adam Shostack , Jeremey Barrett , "Michael S. Baum" Sender: bounce-dcsb at ai.mit.edu Precedence: bulk Reply-To: Robert Hettinga -----BEGIN PGP SIGNED MESSAGE----- The Digital Commerce Society of Boston Presents Adam Shostack Netect, Inc. "No Silver Bullet" Digital Commerce and Payment Security Tuesday, April 7, 1997 12 - 2 PM The Downtown Harvard Club of Boston One Federal Street, Boston, MA The traditional threats that apply to digital commerce systems are the same as the threats against all other commerce systems. But the communications networks that are available to the bad guys make possible and effective attacks that could never work before. Adam Shostack will examine some of these new threats to electronic commerce, some of the potential solutions, and share his vision of the future tools to protect commerce. New attacks against commerce include the automation of knowledge. The pickpocket of old needed to practice for years to learn how to be effective. Today's 14 year olds can download a package with a win95 interface to exploit security holes. The nature of the internet allows them to engage in these attacks anonymously. The anonymous nature of the net also means that people can engage in attacks that have a very small payoff, or a small chance of a large payoff. They also engage in attacks for the thrill of it, costing companies trust and confidence, as well as down time and its associated lost revenue. New methods of dealing with the threats and problems posed by the automation of new attacks will be required. Where 'traditional' security measures, such as firewalls, have failed to deal with the new attacks, there is need to try new approaches. This talk will cover the new breeds of attack, and the new methods of building secure foundations to help busy companies cope. Mr. Shostack is Director of Technology for Netect, Inc, a startup making innovative applications to help cope with the new breed of security problems. He has extensive background in designing, implementing and testing secure systems for clients in the medical, computer, and financial industries. His recent public work includes 'Apparent Weaknesses in the Security Dynamics Client Server Protocol,' 'Source Code Review Guidelines,' and comparisons of freely available cryptographic libraries. Adam was also one of the instructors, along with John Kelsey of Counterpane, and Gary Howland of SecureAccounts, in Ian Goldberg's FC98 Financial Cryptography Workshop, which was held in Anguilla in early March this year. This meeting of the Digital Commerce Society of Boston will be held on Tuesday, April 7, 1997, from 12pm - 2pm at the Downtown Branch of the Harvard Club of Boston, on One Federal Street. The price for lunch is $32.50. This price includes lunch, room rental, various A/V hardware, and the speaker's lunch. ;-). The Harvard Club *does* have dress code: jackets and ties for men (and no sneakers or jeans), and "appropriate business attire" (whatever that means), for women. Fair warning: since we purchase these luncheons in advance, we will be unable to refund the price of your lunch if the Club finds you in violation of the dress code. We will attempt to record this meeting for sale on CD/R, and to put it on the web in RealAudio format, at some future date. We need to receive a company check, or money order, (or, if we *really* know you, a personal check) payable to "The Harvard Club of Boston", by Saturday, April 4th, or you won't be on the list for lunch. Checks payable to anyone else but The Harvard Club of Boston will have to be sent back. Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston, Massachusetts, 02131. Again, they *must* be made payable to "The Harvard Club of Boston", in the amount of $32.50. Please include your e-mail address, so that we can send you a confirmation If anyone has questions, or has a problem with these arrangements (We've had to work with glacial A/P departments more than once, for instance), please let us know via e-mail, and we'll see if we can work something out. Upcoming speakers for DCSB are: May Jeremey Barrett Digital Bearer Certificate Protocols June Michael Baum PKI and the Commercial CA We are actively searching for future speakers. If you are in Boston on the first Tuesday of the month, and you would like to make a presentation to the Society, please send e-mail to the DCSB Program Commmittee, care of Robert Hettinga, . For more information about the Digital Commerce Society of Boston, send "info dcsb" in the body of a message to . If you want to subscribe to the DCSB e-mail list, send "subscribe dcsb" in the body of a message to . We look forward to seeing you there! Cheers, Robert Hettinga Moderator, The Digital Commerce Society of Boston -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.5.3 iQEVAwUBNQRurMUCGwxmWcHhAQFLyQf9H4KUArV/SocXwK6O5aW028g2NsFUp5qU PfZfFn+3paQrsG+9dhKAsDb+GvMYgS4ZADV+s1yZTeQjHShHST4o5WiHqOtd9ALY nWd3F9FDngiD8LuCXXoC4Q8vLEazsFSNSXJG9tCR+OkoJgLZFM3997AO4dNPLm59 u42EAzlt435AlFFvPRiVA3mvKf2eFDbdXMiE8x3vfZvoqSYl33EVH1j4PvUr3BU4 IP01x6Ap+Cs3SBoAFb27O57X7fX6MFascwn+h6Vv/gFxnpTwRXgUK+05Hzeh/ZUf Qe+tKR1cz1GqP7g0H9CHFLxHce0CB6f8izYhTxj6tsD6jB33aUWOFg== =Hdoe -----END PGP SIGNATURE----- ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ To unsubscribe from this list, send a letter to: Majordomo at ai.mit.edu In the body of the message, write: unsubscribe dcsb-announce Or, to subscribe, write: subscribe dcsb-announce If you have questions, write to me at Owner-DCSB at ai.mit.edu --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From jya at pipeline.com Tue Mar 10 04:20:53 1998 From: jya at pipeline.com (John Young) Date: Tue, 10 Mar 1998 04:20:53 -0800 (PST) Subject: BATFC -- Bureau of Alcohol, Tobacco, Firearms and Cryptography Message-ID: <1.5.4.32.19980310122240.006c38bc@pop.pipeline.com> Tim's and Michael's exchanges (with others) are most welcome, and constructively return us again to the most compelling aspect of the encryption debate, the contest between law and technology, one that has impact far beyond cryptography. There are examples of the application of law to control of technology in the President's most recent update of "The National Emergency Caused by the Lapse of the Export Administration Act of 1979": http://jya.com/hd105-191.htm It recounts the activities of the Commerce Department -- mainly BXA -- for the latest 6-month reporting period, and lists as well the cases of penalties imposed for export violations. Some of these have been imposed for alleged violations over 6 years past. They exemplify what Tim and Michael are discussing of the various ways the regulations and laws are imposed according to policy shifts and wind direction of politicians. The report describes the beef up of BXA enforcement programs, and increasing coordination with and training of other countries for export enforcement. All justified by a "national emergency" for which the underlying law to control technology long ago lapsed. The lapse appears to be a deliberate way to avoid having to define ahead of time what technology is to be controlled in order that ad hoc policy and regulations can be devised to fit, deal by deal. This parallels the increase in indecipherable grand jury proceedings, plea bargainings and parole conditions, determined by protected government employees. These, to be sure, appear to be close cousins of the bloated features of legacy technologies, civilian and military. It worth noting that Microsoft and the Justice Department are perfect twins of technology and law monopolies, using brute force and contracts to get their way, both clothed in self-righteousness and both led by charming weirdos, both totally obsessed with each their own mad view of law and technology in the "public interest." Still, there's some public benefit that these disputes are white collar and not homicidal/suicidal battles of NBC warfare, at least not yet here at home. From filaman at blrg.tds.net Tue Mar 10 04:33:47 1998 From: filaman at blrg.tds.net (filaman at blrg.tds.net) Date: Tue, 10 Mar 1998 04:33:47 -0800 (PST) Subject: Do you have a Bulk E Mail Program? Message-ID: <199803101233.EAA12335@toad.com> Regarding Daily Ministry Messages According to Research 50 percent of the U.S. population, or 135 million people, will communicate by email by 2001 and 30 million use email now. You can fully test a Free working version of a fine established professional bulk e mail program that both sends and collects. You can market your product to millions without .32 cent postage stamps required. A million letters would cost you $320,000 just in stamps, plus the time to stuff and address. Bill Gates owner of Microsoft says their will only be two types of businesses by the year 2000. Those that use E Mail and those that went out of business. Give us a try, e mail is the coming thing and I believe you will be pleasently suprised. It's a great tool for daily ministry messages. The product is also free for 10 days so you can download at this site and test it. Check out this website, just click on http://www.mymlm.com/aardvark/home.htm or type it in the heading of your Web Browser and touch enter. From whgiii at invweb.net Tue Mar 10 07:07:43 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Tue, 10 Mar 1998 07:07:43 -0800 (PST) Subject: The Filth Dogman of the Surveillance Apocalypse In-Reply-To: Message-ID: <199803101507.KAA11013@users.invweb.net> In , on 03/09/98 at 06:32 AM, Rabid Wombat said: >Toto needs to study the bat book. >On Mon, 9 Mar 1998, Wilhelm Geiger III wrote: >> * In August, two cities debated plans to reduce the amount of dog >> poop in municipal parks and on sidewalks. The city of Wow a TOTOgram with my name on it. Next thing you know I'll start getting ascii art from Dimitri :) -- --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html --------------------------------------------------------------- Tag-O-Matic: Windows NT: From the makers of Windows 3.1! -------------- next part -------------- A non-text attachment was scrubbed... Name: pgp00001.pgp Type: application/octet-stream Size: 339 bytes Desc: "PGP signature" URL: From mscompia at microsoft.com Tue Mar 10 07:30:26 1998 From: mscompia at microsoft.com (mscompia at microsoft.com) Date: Tue, 10 Mar 1998 07:30:26 -0800 (PST) Subject: Information From The Microsoft Personal Information Center Message-ID: <0108d4829150a38UPIMSSMTPSYS08@msn.com> Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp. Password: cypherpunks If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page. From honig at otc.net Tue Mar 10 09:58:17 1998 From: honig at otc.net (David Honig) Date: Tue, 10 Mar 1998 09:58:17 -0800 (PST) Subject: Sun vs. FUD: Elvis is waiting; Sun puts high-strength encryption software aside Message-ID: <3.0.5.32.19980310095810.007a0100@otc.net> http://dailynews.yahoo.com/headlines/technology/wired/story.html?s=n/reuters /980310/wired/stories/sun_4.html Tuesday March 10 9:58 AM EST Sun puts high-strength encryption software aside SAN FRANCISCO (Wired) - Sun Microsystems, which had hoped to market high-strength encryption software developed by a Russian firm, has put the plans on hold due to ongoing scrutiny by the US Commerce Department, the Wall Street Journal reported Monday. The software, partially based on a Sun security protocol, was developed by a Moscow company called Elvis+, a firm started by former Soviet space scientists in which Sun now owns a 10 percent stake. The deal attracted widespread attention because it appeared to give Sun a way around the Clinton administration's regulation of strong-crypto exports. Sun contended the Elvis+ products fall outside the purview of US government policy. The administration has been reviewing the deal for nine months now. Sun executives, who had hoped to put the encryption software on the market last August, have shelved the plans for the moment, but they remain hopeful, the Journal reported. ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu "I do believe that where there is a choice only between cowardice and violence, I would advise violence." Mahatma Gandhi From weld at skywriting.com Tue Mar 10 10:23:53 1998 From: weld at skywriting.com (Weld Pond) Date: Tue, 10 Mar 1998 10:23:53 -0800 (PST) Subject: EU plans decryption ban In-Reply-To: <19980309212946.23723@die.com> Message-ID: On Mon, 9 Mar 1998, Dave Emery wrote: > In the US there is not yet a ban on exchange of information > because of the potential first amendment issues, but there are (and have > been since the late 1980s) felony level bans with $500,000 fines for > each incident on the manufacture, assembly, modification, import, > export, sale and distribution of any device or equipment primarily of > assistance in the unauthorized decryption of satellite cable programming > or direct to home satellite. There is a law in Pennsylvania that bans the distribution of "plans or instructions" for devices or modifications of devices that can be used for theft of services. Full text at: http://moose.erie.net/~italo/sb0655p0687.html Excerpt: 10 (2) sells, possesses, distributes, gives or otherwise 11 transfers to another[,] or offers, promotes or advertises for 12 sale [any instrument, apparatus, equipment or device 13 described in paragraph (1) of this subsection,] any: 14 (i) unlawful telecommunication device, or plans or 15 instructions for making or assembling the same, under 16 circumstances evidencing an intent to use or employ such 17 [instrument, apparatus, equipment or] unlawful 18 telecommunication device, or to allow the same to be used 19 or employed for a purpose described in paragraph (1) [of 20 this subsection], or knowing or having reason to believe 21 that the same is intended to be so used, or that the 22 aforesaid plans or instructions are intended to be used 23 for making or assembling such [instrument, apparatus, 24 equipment or device.] unlawful telecommunication device; 25 or At the L0pht we distribute a CD that contains plenty of technical data for modifying telecommunications equipment and for building your own from easily obtained parts. We do not ship our CD to Pennsylvania due to this law since we cannot be assured that the intent of the purchaser is not to defraud a telecommunication service provider. Since information can be used for good or bad we are pretty sure that some of the purchasers from Penn will use this information illegally. This goes against everything the L0pht stands for but we do not have the resources to fight this in court. Weld Pond weld at l0pht.com http://www.l0pht.com/~weld From honig at otc.net Tue Mar 10 12:00:48 1998 From: honig at otc.net (David Honig) Date: Tue, 10 Mar 1998 12:00:48 -0800 (PST) Subject: Congressbastards getting a clue Message-ID: <3.0.5.32.19980310120048.007b43b0@otc.net> http://allpolitics.com/1998/03/10/ap/mcdermott.lawsuit/ Summary: History: Florida couple taped some Congressmen (including Gingrich) talking on their cellphones. Gives the tape to another Congressman A, who passes it on to the press. Florida couple has been convicted. News: Now one of the taped Congressmen is suing the Congressman who leaked the tape. When will they learn? Mathematics >> law ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu "I do believe that where there is a choice only between cowardice and violence, I would advise violence." Mahatma Gandhi From jya at pipeline.com Tue Mar 10 18:34:17 1998 From: jya at pipeline.com (John Young) Date: Tue, 10 Mar 1998 18:34:17 -0800 (PST) Subject: GoldMoney Message-ID: <1.5.4.32.19980311023614.006fd3d8@pop.pipeline.com> http://www.goldmoney.com/home.html Essays on the future of money, electronic, digital and "GoldMoney," based on US Patent No. 5,671,364 One or so cypherpunks referenced. From nobody at REPLAY.COM Tue Mar 10 18:40:53 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 10 Mar 1998 18:40:53 -0800 (PST) Subject: CypherPunks -- The Early Years Message-ID: <199803110240.DAA27478@basement.replay.com> Eric Cordian wrote: > > Might I ask why several prominent Cypherpunks have begun reposting > "News of the Weird" through sympatico.ca? Is this some sort of > Pod thing? Close examination of fossil mosquitoes from 40 million years ago show they look just about the same as that one dining on your arm. ============================================== LMBoyd Web Site / U. S. Newspapers / Start Email / Stop Email http://www.LMBoyd.com/postscript.htm From billp at nmol.com Tue Mar 10 19:01:32 1998 From: billp at nmol.com (bill payne) Date: Tue, 10 Mar 1998 19:01:32 -0800 (PST) Subject: do it to them. they deseve it. Message-ID: <3505FE5F.6521@nmol.com> Tuesesday March 10, 1998 3/10/98 E-mail Federico.F.Pena at hq.doe.gov and mail Federico F. Pena The Secretary of Energy United States Department of Energy Washington, D.C. 20585 Dear Secretary Pena: Purpose of this letter is to appeal a denial of a Freedom of Information Act (FOIA) Request. I wrote on Tuesday February 17, 1999 15:11 e-mail and mail Ms. Elva Barfield Freedom of Information Office U. S. Department of Energy Albuquerque Operations Office/OIEA POB 5400 Albuquerque, NM 87185-5400 EBARFIELD at DOEAL.GOV Dear Ms. Barfield: VP Al Gore is in the crypto business. Information SuperSpyWay Al Gore Approved Encryption for China in Return for Campaign Donations by Charles R. Smith Portions of the above document posted on Internet at http://www.us.net/softwar/ and http://www.aci.net/kalliste/ states 1. Gore charged with encryption policy according to PDD-5 and PRD-27 on April 16, 1993. 2. Government officials represent themselves on Al Gore's behalf for RSA patent purchase negotiations in Feb. 1994. 3. RSA chairman Bidzos meets with Chinese officials at the same time as Ron Brown in Oct. 1995. 4. RSA Chairman Bidzos enters into merger negotiations with Security Dynamics, a company backed by Sanford Robertson, in Nov. 1995. 5. VP Gore calls Sanford Robertson from the White House for a donation in Nov. 1995. 6. Robertson delivers $100,000 donation ($80,000 soft - $20,000 directly into the Clinton/Gore campaign) in Jan. 1996. 7. RSA signs deal with China in Feb. 1996. The administration previously prosecuted similar deals but this time does nothing. 8. Justice Dept. approves RSA merger with Security Dynamics in April 1996 for $280 million dollars, netting Sanford Robertson's company a cool $2 million just to write the deal. In 1991 I was in involved with Sandia National Laboratories Comprehensive Test Ban Treaty seismic data authenticator. At that time Sandia director Tommy A Sellers had assumed responsibility for directorship from Robert Clem. Sandia supervisor Tom Wright replaced my supervisor, John Holovka, who was the supervisor for the CTBT seismic data authenticator. Wright brought in Ph.D. Steven Goldsmith to supervise me. Sellars, Wright, and Goldsmith were new to crypto-type projects. Much of this is documented at http://www.jya.com/whp021598.htm. This is evidenced by Sellar's attached SEP 24 1991 memorandum, which Goldsmith help author, addressed to Dr James J Hearn at the National Security Agency. The SEP 24 memorandum contained a number of technical errors. I corrected these errors in my attached December 20, 1991 memorandum. Department of Energy and it predecessors have a well-documented history of not requiring technical expertise for pursuit of interests. Stewart Udall, The Myths of August, writes, Any cover-up must be implemented and enforced by designated agents, and one man emerged in 1953 as the quarterback of the AEC's damage-control effort. His name was Gordon Dunning. Although the personnel charts of the 1950s list him as a low-level "rad-safe" official in the Division of Biology and Medicine, documents demonstrate that he was clothed with authority to manage and suppress information about the radiation released by the testing of nuclear weapons. ... About the time Sellers and Sandia Ombudsman gave me a directed transfer to break electronic locks for the FBI/ERF [engineering research facility], Goldsmith and Wright, certainly with the approval of Sellers, placed a contract with RSA Inc [http://www.rsa.com/], I was told. Ms Barfield, we think the American public needs to know more about RSA's work with Sandia National Laboratories. Therefore, Under the provision of the Freedom of Information Act, 5 USC 552, I am requesting access to: 1 ALL purchase requisitions, including any attached statement of work, issued by Sandia National Laboratories, Los Alamos National Laboratories, or DOE/ALOO between January 1, 1991 and February 17, 1998 to RSA Inc. 2 Copies of all invoices from RSA Inc received by Sandia National Laboratories, Los Alamos National Laboratories, or DOE/ALOO between January 1, 1991 and February 17, 1998 If there are any fees for searching for, or copying, the records I have requested, please inform me before you fill the request. As you know, the Act permits you to reduce or waive the fees when the release of the information is considered as "primarily benefiting the public." I believe that this requests fits that category and I therefore ask that you waive any fees. Your office agreed to waive fees before. This request is surely of "public interest." December 13, 1994 DOE/AL FOIA officer Gwen Schreiner waived fees for the reason, "We have considered your request and have determined that release of the requested records is in the public interest, that disclosure of this information is likely to contribute significantly to public understanding of the operations or activities of the government, that you or the organization you represent have little or no commercial interest in the material contained in the records, that you or the organization you represent have the qualifications and ability to use and disseminate the information, and that the records are not currently in the public domain. A waiver of fees is therefore granted." This waiver of fees was, undoubtedly, issued as a result of former Energy Secretary Hazel O'Leary's Openness initiative. Heart of America paid my way to hear Secretary O'Leary's celebrated whistleblower speech. If all or any part of this request is denied, please cite the specific exemption(s) which you think justifies your refusal to release the information and inform me of your agency's administrative appeal procedures available to me under the law. I would appreciate your handling this request as quickly as possible, and I look forward to hearing from you within 20 working days, as the law stipulates. I received no response to the above FOIA. Therefore I appeal as a result of non-response. As you may be aware (6)(A) Each agency, upon any request for records made under paragraph (1), (2), or (3) of this subsection, shall-- (i) determine within ten days \1\ (excepting Saturdays, Sundays, and legal public holidays) after the receipt of any such request whether to comply with such request and shall immediately notify the person making such request of such determination and the reasons therefor, and of the right of such person to appeal to the head of the agency any adverse determination; and And you may also be aware ------------------------------------------------------------------------- \1\ Under section 12(b) of the Electronic Freedom of Information Act Amendments of 1996 (Pub. L. 104-231; 110 Stat. 3054), the amendment made by section 8(b) of such Act striking ``ten days'' and inserting ``20 days'' shall take effect on October 3, 1997. ------------------------------------------------------------------------- (ii) make a determination with respect to any appeal within twenty days (excepting Saturdays, Sundays, and legal public holidays) after the receipt of such appeal. If on appeal the denial of the request for records is in whole or in part upheld, the agency shall notify the person making such request of the provisions for judicial review of that determination under paragraph (4) of this subsection So I expect a response to this appeal within the time allotted to you by law. Much of this unfortunate matter is appearing on Internet. http://www.jya.com/whp021598.htm http://www.jya.com/cylinked.htm Letter from Bill Payne Regarding Cryptography at Sandia http://www.aci.net/kalliste/ Crypto AG: The NSA's Trojan Whore? http://caq.com/CAQ/caq63/caq63madsen.html NSA, Crypto AG, and the Iraq-Iran War http://www.aci.net/kalliste/speccoll.htm How Secure is America's Nuclear Arsenal? http://www.aci.net/kalliste/nukearse.htm And, of course, we continue to seek settlement. Sincerely, William H. Payne 13015 Calle de Sandias Albuquerque, NM 87111 From brianbr at together.net Tue Mar 10 19:03:07 1998 From: brianbr at together.net (Brian B. Riley) Date: Tue, 10 Mar 1998 19:03:07 -0800 (PST) Subject: BATFC -- Bureau of Alcohol, Tobacco, Firearms and Cryptography Message-ID: <199803110302.WAA08429@mx01.together.net> On 3/10/98 7:22 AM, John Young (jya at pipeline.com) passed this wisdom: >It worth noting that Microsoft and the Justice Department are >perfect twins of technology and law monopolies, using brute force >and contracts to get their way, both clothed in self-righteousness >and both led by charming weirdos, both totally obsessed with each >their own mad view of law and technology in the "public interest." John, would you really refer to Janet Reno as a 'charming weirdo'???? I can think of lost of names, epithets, and descriptions, but that surely would be far down my list. From jya at pipeline.com Tue Mar 10 19:43:14 1998 From: jya at pipeline.com (John Young) Date: Tue, 10 Mar 1998 19:43:14 -0800 (PST) Subject: BATFC -- Bureau of Alcohol, Tobacco, Firearms and Cryptography Message-ID: <1.5.4.32.19980311034505.007435fc@pop.pipeline.com> Brian Riley wrote: >On 3/10/98 7:22 AM, John Young (jya at pipeline.com) passed this wisdom: > John, would you really refer to Janet Reno as a 'charming weirdo'???? I >can think of lost of names, epithets, and descriptions, but that surely >would be far down my list. Brian, that post was a feeble one-time attempt to write straight prose, uninflected, unaccusatory, undiabolical, un-nuts, un-understandable. It took days of agony to arrive at empty perfection, to say nothing with crystal clear aplomb, foreign policy piquant, transparent balderdash cover-up of bald-face lies delivered deadpan grammatically. I been studying James Rubin's disarmingly weird repartee at the State Department press conferences. Today he asked a reporter to define "who's got the con" for foreign policy. (Laughter, the transcript hooted.) "Charming weirdo" is the Secretary of State's and Rubin's demonic auto-epithet for her, emulating homicidal Maggie Thatcher hiding her demure will to slaughter. Swear to god this is the last time I'll try to ape well-mannered civil discourse. You got the con: It's too sicko wacko. Back to incoherent snarl of ignorant brutes chewing leg off for freedom. From nobody at REPLAY.COM Tue Mar 10 20:42:56 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 10 Mar 1998 20:42:56 -0800 (PST) Subject: Dr. Dimentos Tentacles Message-ID: <199803110442.FAA14173@basement.replay.com> bill.stewart at pobox.com wrote: > > Guy -- > First you and Vulis flame each others, and then > you start claiming that VZNuri's postings are really Vulis, > and now you're claiming that postings from Toto's machines > are really Vulis. Perhaps *you're* really Vulis? Bill Frantz is *really* Vulis. Bill Stewart is *really* Toto. Both are charter members, along with Bill Clinton and Bill Gates, of a secret society of people named Bill who plan to form a new world government and declare the Buffalo Bills to be the real Superbowl Champions by an act of legislation. I am truly amazed that a seemingly intelligent group of individuals such as the CypherPunks cannot see the blatantly obvious connections between the Bills and the TMs who are warring for control of our minds. -- Eric Michael Cordian 0+ O:.T:.O:.T:. Mathematical Munitions Division "Forge What Thou Wilt Shall Be The Whole Of The Law" From brianbr at together.net Tue Mar 10 21:04:01 1998 From: brianbr at together.net (Brian B. Riley) Date: Tue, 10 Mar 1998 21:04:01 -0800 (PST) Subject: BATFC -- Bureau of Alcohol, Tobacco, Firearms and Cryptography Message-ID: <199803110503.AAA22078@mx02.together.net> On 3/10/98 10:45 PM, John Young (jya at pipeline.com) passed this wisdom: >Brian Riley wrote: >>On 3/10/98 7:22 AM, John Young (jya at pipeline.com) passed this wisdom: > >> John, would you really refer to Janet Reno as a 'charming weirdo'???? I >>can think of lost of names, epithets, and descriptions, but that surely >>would be far down my list. > >Brian, that post was a feeble one-time attempt to write straight prose, >uninflected, unaccusatory, undiabolical, un-nuts, un-understandable. > >It took days of agony to arrive at empty perfection, to say nothing with >crystal clear aplomb, foreign policy piquant, transparent balderdash >cover-up of bald-face lies delivered deadpan grammatically. > >I been studying James Rubin's disarmingly weird repartee at the State >Department press conferences. Today he asked a reporter to define >"who's got the con" for foreign policy. (Laughter, the transcript hooted.) > >"Charming weirdo" is the Secretary of State's and Rubin's demonic >auto-epithet for her, emulating homicidal Maggie Thatcher hiding her >demure will to slaughter. > >Swear to god this is the last time I'll try to ape well-mannered civil >discourse. You got the con: It's too sicko wacko. Back to incoherent >snarl of ignorant brutes chewing leg off for freedom. ROFLAAMAIBGFOT37thFOAOBDTADW: rollin on floor laffing almost as much as if Bill Gates fell out the 37th floor of an office building due to a defective window. From cashout at ibm.net Wed Mar 11 03:51:45 1998 From: cashout at ibm.net (cashout at ibm.net) Date: Wed, 11 Mar 1998 03:51:45 -0800 (PST) Subject: PLEASE HELP US RETURN OVER $400 BILLION TO ITS RIGHTFUL OWNERS! Message-ID: <199803111149.LAA17434@out5.ibm.net> There is over 400 BILLION DOLLARS IN UNCLAIMED money in North America. We want to help return this money to its rightful owners! To do this we are launching a NATIONAL INFOMERCIAL ON TELEVISION. We are looking for 300 INDEPENDENT AGENTS who will become a part of this infomercial. NO SELLING IS REQUIRED!!! Each Agent will own an exclusive territory and will receive a percentage of the money generated from the television informercial! Your involvement will be very finacially rewarding. Find out more about the opportunity and how you can get involved. Visit our website at http://www.link2web.net/owedmoney/money.html From tonton9 at pp.iij4u.or.jp Wed Mar 11 05:26:05 1998 From: tonton9 at pp.iij4u.or.jp (yoji fujita) Date: Wed, 11 Mar 1998 05:26:05 -0800 (PST) Subject: No Subject Message-ID: <000a01bd4cf1$244876c0$563582d2@fwhc6895> From mscompia at microsoft.com Wed Mar 11 07:10:06 1998 From: mscompia at microsoft.com (mscompia at microsoft.com) Date: Wed, 11 Mar 1998 07:10:06 -0800 (PST) Subject: Information From The Microsoft Personal Information Center Message-ID: <042bf3409150b38UPIMSSMTPSYS08@msn.com> Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp. Password: cypherpunks If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page. From honig at otc.net Wed Mar 11 10:08:52 1998 From: honig at otc.net (David Honig) Date: Wed, 11 Mar 1998 10:08:52 -0800 (PST) Subject: emailed prez. death threat conviction Message-ID: <3.0.5.32.19980311100833.007b1e20@otc.net> http://biz.yahoo.com/upi/98/03/11/general_news/usclinton_2.html Wednesday March 11 5:39 AM EST Teen convicted of Clinton e-mail threats MIDLAND, Mich., March 11 (UPI) _ A 17-year-old high school honors student faces jail after being convicted of sending e-mail death threats to President Clinton. Heidi Sullivan of Midland, Mich., was sentenced Tuesday to eight days in jail and two years probation for sending threats to the White House in January from a computer at Midland High School. Midland County Probation Officer Tom Adams says Sullivan could have received 20 years for threatening the president, but probably got the reduced sentence because of her family's history. [...] ..................... In other news President Might Go Under Knife WASHINGTON (AP) -- Sorry, Bill, it's for your own good. After consulting with his proctologist -- and hearing an appeal in favor of neutering from actress Doris Day -- First Lady Hillary Clinton has decided on the procedure for the President. But the reluctant First Lady reserved the right to change her mind. In announcing Hillary's decision Tuesday, White House spokesman Barry Toiv said Mrs. Clinton was ``inclined'' to allow the procedure. The National Organization of Women, the nation's largest women's rights group, applauded the First Lady's decision, saying she was doing the right thing. ``Neutering or spaying politicians is one of the most important acts a responsible society can take,'' said Martha Armstrong, a society vice president. ``It promotes better physical and behavioral health, and it helps to address the ubiquitous sexual misconduct crises.'' Hillary set no immediate date for putting her husband under the knife, leaving some to wonder whether the 50 year old former Arkansas governor has been told of his fate. ``Bill's a little too young to understand,'' Toiv said. Indeed, the President seemed blissfully unaware of any pending surgery as he played fetch with Buddy, the first dog, on the South Lawn with a green tennis ball Tuesday. White House press secretary Mike McCurry said today the procedure was ``not likely anytime soon given the dispositions and pending indictments.'' Toiv said Mrs. Clinton's decision was driven by concerns for her husband's health. She denied that it was motivated by the encounters Bill has had with Socks the family cat and various White House staff and interns. Dr. Jacqueline Suarez, a proctologist with the Alexandria (Va.) Army Hospital, said neutering can help curb politicians' aggression toward other politicians and tendency to fornicate in unwelcome places. ``Although, if we have people questioning if they should or shouldn't, those health reasons are good reasons to neuter as well, so we'll use them as part of the case for neutering,'' Suarez said. Miss Day, president of the Doris Day Humanitarian League, sent Clinton a letter in December expressing concern that the nation would suffer if he were left intact. Among them was a risk of impeachment in addition to testicular cancer and prostate infections that could lead to problems with urination. In January, McCurry said there were no plans to neuter the President, who had moved into the White House in 1993. However, Clinton physician Connie Mariano has now told Miss Day in a letter that Mrs. Clinton had decided to neuter the president on the advice of White House advisor James Carville. Armstrong said that politicians need not worry about losing their procreative abilities. ``Politicians don't have a real concept of identity or ego. Its all drive for power. Neutering a politician or justice department official will not change his basic personality,'' she said. ``They don't suffer any kind of emotional reaction or identity crisis when neutered.'' Got that, Mr. President? original at http://www.newsday.com/ap/rnmpwh1z.htm ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Beat your algorithms into swords and your virtual machines into spears: let the weak say, I am strong. From toto at sk.sympatico.ca Wed Mar 11 12:46:10 1998 From: toto at sk.sympatico.ca (Toto) Date: Wed, 11 Mar 1998 12:46:10 -0800 (PST) Subject: BATFC -- Bureau of Alcohol, Tobacco, Firearms and Cryptography In-Reply-To: <199803110503.AAA22078@mx02.together.net> Message-ID: <3506E85C.54D9@sk.sympatico.ca> Brian B. Riley wrote: > > On 3/10/98 10:45 PM, John Young (jya at pipeline.com) passed this wisdom: > >Swear to god this is the last time I'll try to ape well-mannered civil > >discourse. You got the con: It's too sicko wacko. Back to incoherent > >snarl of ignorant brutes chewing leg off for freedom. > > ROFLAAMAIBGFOT37thFOAOBDTADW: rollin on floor laffing almost as > much as if Bill Gates fell out the 37th floor of an office building due > to a defective window. Hey, asshole! Thanks for telling *everyone* about our plan... Now I have to contact Blanc Weber and Jeff Sandquist and tell them we have to come up with a new scheme. And *this* time, we're not telling *you* about it! Otot ~~~~ From brianbr at together.net Wed Mar 11 12:50:39 1998 From: brianbr at together.net (Brian B. Riley) Date: Wed, 11 Mar 1998 12:50:39 -0800 (PST) Subject: BATFC -- Bureau of Alcohol, Tobacco, Firearms and Cryptography Message-ID: <199803112050.PAA29056@mx01.together.net> On 3/11/98 2:39 PM, Toto (toto at sk.sympatico.ca) passed this wisdom: >Brian B. Riley wrote: >> >> On 3/10/98 10:45 PM, John Young (jya at pipeline.com) passed this wisdom: >> >Swear to god this is the last time I'll try to ape well-mannered civil >> >discourse. You got the con: It's too sicko wacko. Back to incoherent >> >snarl of ignorant brutes chewing leg off for freedom. >> >> ROFLAAMAIBGFOT37thFOAOBDTADW: rollin on floor laffing almost as >> much as if Bill Gates fell out the 37th floor of an office building due >> to a defective window. > >Hey, asshole! >Thanks for telling *everyone* about our plan... >Now I have to contact Blanc Weber and Jeff Sandquist and tell >them we have to come up with a new scheme. >And *this* time, we're not telling *you* about it! > >Otot >~~~~ I guess I now can consider myself a part of the list. I am have officially and publically been called an asshole by Toto ... the waitng has been killing me! From die at die.com Wed Mar 11 14:26:07 1998 From: die at die.com (Dave Emery) Date: Wed, 11 Mar 1998 14:26:07 -0800 (PST) Subject: BATFC -- Bureau of Alcohol, Tobacco, Firearms and Cryptography In-Reply-To: <199803111530.QAA12576@basement.replay.com> Message-ID: <19980311172718.42774@die.com> On Wed, Mar 11, 1998 at 10:31:09AM -0800, James A. Donald wrote: > -- > > The Cato institute has done studies on comparative > remuneration which shows approximately double the salaries, > accompanied by vastly more security and power. > > At the bottom end, bus drivers and prison guards, this is > strikingly obvious. A muni bus driver makes about as much as > senior engineer in Silicon valley. > At the risk of an irrelevant and stupid digression from the topic of the threat, Is this really true ? The technical people I know who work for the government seem to get salaries that would be low in industry for someone with that background. And I'd be surprised that bus drivers out in silicon valley were really making the $60-95K that ordinary senior engineers designing bus drivers make around here (the NE). If they are, they are getting lots more than other municipal employees such as school teachers with masters degrees. (In fact, I've heard that demand had recently driven salaries in the valley way up and maybe my numbers for engineers are low, especially for software engineers.) There is, of course, that nasty law that classifies engineers as exempt professionals but allows companies to treat them as just cannon fodder workers stuffed into cubicles and treated with little of the respect the term professional would suggest - to be forced to work large amounts of completely uncompensated overtime. Bus drivers (non exempt) do get paid for every minute they are on the job, and many times work schedules are deliberately arranged to guarantee significant amounts of overtime at time and a half, so many bus drivers actually make a significant multiple of their nominal salary for the same hours engineers get base salary and no more. But I do think that Prof. Froomkin is right that a lot of top managers and legal types and others in government whose private sector equivalents get huge salaries do work at a considerable loss. Salaries for top of the heap government employees such as judges and managers of large departments with budgets in the tens or hundreds of millions rarely get more than $150K, whereas similar people would get much more in the private sector. Of course the job security differences are vast, and government workers are one of the very few classes of workers left in the economy who have any actual job security long term at all. -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From die at die.com Wed Mar 11 14:47:00 1998 From: die at die.com (Dave Emery) Date: Wed, 11 Mar 1998 14:47:00 -0800 (PST) Subject: [LEGAL] Crypto as Contraband? In-Reply-To: Message-ID: <19980311174812.30010@die.com> On Sun, Mar 08, 1998 at 11:41:41PM -0500, Declan McCullagh wrote: Qouting worst proposal before congress... > > LEGAL TO USE CRYPTO: "After January 31, 2000, it shall not be > unlawful to use any encryption product purchased or in use prior to > such date." > > At the risk of raising yet another stupid and silly issue, does anybody know how this would apply to crypto (such as PGP) available in source form ? Would only binaries produced by compiling the source before the cutoff date be legal ? Or would compiling the source under a new version of the OS or new OS or even new instruction set (ISA-64 on a Merced for example) merely constitute reasonable use of the existing source product ? How about mechanical translations of the object to another environment or instruction set ? And what level of patches, bug fixes, or actual changes and improvements to the source would be legal if it was legal to compile the source and use the resulting binary after the cutoff ? -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From nobody at REPLAY.COM Wed Mar 11 15:24:19 1998 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 11 Mar 1998 15:24:19 -0800 (PST) Subject: Only In Anonymous... Message-ID: <199803112324.AAA16722@basement.replay.com> Anonymous wrote: > > There's nothing wrong with satire, but people ought to mark it as such, > when posting to a list filled with weak-minded and ideologically > blinded individuals. I've long said the same thing about the purported 'news' stories carried by the mainstream press, but the replies I have received from the news giants merely state that their office gang all had a good laugh over my 'satire'. Until the mainstream press begins marking their articles with such labels/disclaimers as 'half-truth'/'politically-biased'/'government- handout'/'self-serving'/'total-bullshit', etc., then I see no reason to require such labeling by individual netizens who may well be doing nothing more than writing the news of the near-future. You go cut wood, carry water--chop, chop, splash, splash... ZenRacistMonger From dina_102 at hotmail.com Wed Mar 11 15:38:04 1998 From: dina_102 at hotmail.com (dina_102 at hotmail.com) Date: Wed, 11 Mar 1998 15:38:04 -0800 (PST) Subject: Subliminal Sex Message-ID: <0000000000.AAA000@hotmail.com> Do you want to succeed at dating, or you just need a little spark to your relationship or marriage? Well here is the Answer for you! Sensations�, the new Compact Disc that uses proven subliminal techniques to increase your chances of SEXUAL success with the opposite sex.. Simply play it and watch it work!!!! What is Subliminal messaging? - "Subliminal perception is the registration of sensory input without the conscious mind's awareness." *Proven Examples* - In 1957, a cinema executive named James Vicary reported to the press that he managed to increase the sale of popcorn at a theatre by 58% by using subliminal messages embedded in a film. The advertising industry claimed it had developed a whole new methodology which could influence buying behavior in a predictable and controlled fashion. Our Titles - The original that started it all! Sensations� on CD is a collection of eight songs (45 min.) that sound "new age." The tempo of each track is upbeat, sexy, romantic, and pleasing. Yet, each song has a subliminal message built-in, masked by the sound of music. So, the conscious mind has nothing to analyze or criticize. CD only $29.95 Do you want to be a winner? If YES then call toll free 1-800-409-8302 ext. 1256 *TESTIMONIALS* - Dear Sensations�, At first, I didn't think subliminal messaging could change my love life. Hell, I didn't think anything could help me. I tried dating services, blind dates--you name it--to no avail. I bought Sensations� on CD and played it all day on the stereo in my office cubicle. Valerie, an executive assistant that I was interested in, started to hang-out by my desk. When I asked her to lunch, she even said "yes." Well, Valerie and I have been dating for over a month, and when I played Sensations� during our first "romantic" evening at my place, I swore I'd never forget what that CD did for me. Thank you very much! Jim Rushak. Detroit, MI Dear Sensations�, I'd been seeing this lady for over three weeks and we never got beyond "third base."She had just come from a relationship and she said she was nervous about sleeping with another man. I was patient long enough and really wanted to push things to the "next level." That's when I ordered Sensations�.She visited my apartment, and I had it playing on my C.D. player. Instead of me making the first move, she was all over me. Needless to say, I think Sensations� is a "home run!" Scott Helm. Lodi, NJ Dear Sensations�, After spending thousands on new clothes and hundreds on colognes, I finally took the plunge and bought your CD. It was the best $29.95 I ever spent! I was "lucky"with three girls already, after playing Sensations� for each of them on dates. Were they turned-on by my clothes or how I smelled? I'm not kidding myself--it was Sensations that changed my luck. Please let me know when the next volume of your CD comes out. I want it. Bob Theut. Dayton, OH If you have any questions or will like to order Sensations please call 1-800-409-8302 ext.1256 From jya at pipeline.com Wed Mar 11 17:07:17 1998 From: jya at pipeline.com (John Young) Date: Wed, 11 Mar 1998 17:07:17 -0800 (PST) Subject: House of Commons Library on US Sigint in Europe Message-ID: <1.5.4.32.19980312010926.0072ccec@pop.pipeline.com> Simon Hossack has sent us a copy of a letter to Oliver Heald MP (UK) from the House of Commons Library on US signals intelligence in Europe, with focus on Menwith Hill. It is an answer to Mr. Heald's request for information on the charge of US spying in the STOA report as described by Duncan Campbell and Nicky Hager. The letter documents successive parlimentary and journalistic inquiries about the USA/UK 50-years-long arrangement for joint intelligence and HMG's answers. http://jya.com/hoc-ussigint.htm From webmaster at sexlink.net Wed Mar 11 20:01:44 1998 From: webmaster at sexlink.net (webmaster at sexlink.net) Date: Wed, 11 Mar 1998 20:01:44 -0800 (PST) Subject: 5000 FREE Banner Ads For Joining Message-ID: <<3.0.32.19980311142331.webmaster@sexlink.net> THIS MESSAGE IS FOR ADULT WEBMASTERS JOIN SEX LINK NETWORK BANNER ROTATION PROGRAM AND GET 5,000 FREE BANNER ADS! Become part of one of the most sucessful All adult banner exchange programs available today. Do you need more hits... well if you sign up within the next 3 days you will receive an automatic 5,000 banner credits just for joining! Sign up today at http://www.sexlink.net/select.htm What do you have to lose... but 5,000 FREE BANNER ADS! To be removed from this targeted list send e-mail to remove at sexlink.net From bill.stewart at pobox.com Wed Mar 11 22:58:43 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 11 Mar 1998 22:58:43 -0800 (PST) Subject: ANNOUNCE: March Bay Area Cypherpunks Meeting Saturday March 14, 12-6pm Message-ID: <3.0.5.32.19980311225235.0089c660@popd.ix.netcom.com> The March Bay Area Cypherpunks meeting will be held Saturday, March 14th, at Network Associates in Menlo Park. Time - 12 noon hang out, 1-5 program, followed by dinner nearby, various evening parties Agenda: Ian Goldberg's HINDE algorithm Reports from FC98 Anguilla Financial Cryptography conference Reports from Computers, Freedom, and Privacy CFP 98 Open PGP status discussion Work in progress Location: Network Associates, Inc Total Network Security division (formerly PGP, Inc) 4500 Bohannon Drive, Menlo Park Directions to NAI: Take 101 (from North or South) Exit at "Marsh Road/Atherton" Go West (young man) off exit (right exit lane coming south from SF). Turning to the West (away from the Bay / freeway) Get in Left lane immediately. Turn Left at very first light (Scott Drive, not far from freeway exit) (landmark: Shell gas station is on your right as you turn left) Go South on Scott ~2/3 mi (parallel to 101 freeway fence). Pass one Stop sign (do not turn yet). (landmark: Sun Microsystems has an office on the right) Scott curves to right, becomes Bohannon Drive. Turn left into first driveway: "Menlo Oak" Business Park Go straight through parking lot ~2-300 yds Curve 270 degrees around Fountain (effective left turn) #4500 is on left as you curve around fountain. Go down ~50 yds to main lobby entrance (south side of building). Ask reception for Dave Del Torto (call 415.730.3583 cel if any problem). Meeting room is behind reception area through first door on left. Known or Suspected Parties: Sandy's Masquerade in or near Oakland PENSFA at Jim & Heather's in Campbell "It's Green" filk-oriented potluck in San Jose (afternoon/evening) Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From richardh at cwsredlands.com Wed Mar 11 23:03:37 1998 From: richardh at cwsredlands.com (richardh at cwsredlands.com) Date: Wed, 11 Mar 1998 23:03:37 -0800 (PST) Subject: San Bernardino... New Technology !! Message-ID: <199803120703.XAA18282@cygint.cygnus.com> Hello A major business announcement will take place in San Bernardino, California this week !!! If you have ever wanted to be on the INSIDE when such an event was about to occur, E-mail me back for complete details. Once you know what is happening, YOU WILL want to be IN ON IT, even if you can't be there !!! Hit reply, and put "insider details" in the subject line. Thank you & take care, Richard From jya at pipeline.com Thu Mar 12 05:56:50 1998 From: jya at pipeline.com (John Young) Date: Thu, 12 Mar 1998 05:56:50 -0800 (PST) Subject: FBI CALEA Rule for Electronic Surveillance Message-ID: <1.5.4.32.19980312135741.006f2a64@pop.pipeline.com> [Federal Register: March 12, 1998 (Volume 63, Number 48)] [Page 12217-12310] SUMMARY: The FBI is providing the Final Notice of the requirements for actual and maximum capacity for the interception of the content of communications and call-identifying information that telecommunications carriers may be required to effect to support law enforcement's electronic surveillance needs, as mandated in section 104 of the Communications Assistance for Law Enforcement Act (CALEA) (Public Law 103-414, 47 U.S.C. 1001-1010). ---------- For full copy: http://jya.com/fbi031298.txt (685K) Zipped version: http://jya.com/fbi031298.zip (101K) From jkwilli2 at unity.ncsu.edu Thu Mar 12 07:26:23 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Thu, 12 Mar 1998 07:26:23 -0800 (PST) Subject: Protection Commander 1.0 Message-ID: http://www.softcode.se/ Interesting....looks very unsecure though. Ken Williams /-| ORG: NC State Computer Science Dept VP of The E.H.A.P. Corp. |-\ | EML: jkwilli2 at adm.csc.ncsu.edu ehap at hackers.com | | WWW: http://www4.ncsu.edu/~jkwilli2/ http://www.hackers.com/ehap/ | | PGP: http://www4.ncsu.edu/~jkwilli2/pubkey | \-| Chief weapons of UNIX: Fear, surprise and ruthless efficiency. |-/ From billp at nmol.com Thu Mar 12 07:58:29 1998 From: billp at nmol.com (bill payne) Date: Thu, 12 Mar 1998 07:58:29 -0800 (PST) Subject: distribution Message-ID: <35080491.A41@nmol.com> Thursday 3/12/98 7:34 AM Certified - Return Receipt Requested Cynthia McKinney 124 Cannon Building Washington, DC 20515 Office: (202)225-1605 Fax: (202)226-0691 http://www.house.gov/mckinney/ Dear Representative McKinney: PURPOSE of this letter is to ask your help for us to obtain copes of docket sheets from the Tenth Circuit Court of Appeals for cases No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia. All of our legal efforts to obtain these documents, which any citizen has a right to, have failed. REASON you are selected to help is that you appear to be knowledgeable about operation of the current US federal government and willing to speak out in an attempt to solve problems. You appeared Friday February 27, 1998 on PBS, The NewsHour with Jim Lehrer, along with senators Campbell, Hollings, Lott, Shelby Robb and representatives Dana Rohrabacher and Harold Rogers. These senators and congressmen appeared not to support your views because they are either mis- or not well-informed about US involvement in support of Saddam Hussein. Stories supporting your view appear on Internet at NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe http://www.aci.net/kalliste/speccoll.htm and Crypto AG: The NSA's Trojan Whore? by Wayne Madsen http://caq.com/CAQ/caq63/caq63madsen.html Madsen begins It may be the greatest intelligence scam of the century: For decades, the US has routinely intercepted and deciphered top secret encrypted messages of 120 countries But NSA , and as a result the US federal government, apparnetly got caught involved in complicity of deaths of about 500,000 Iranians. This is the subject of a Federal lawsuit seen on Internet at http://jya.com/whpfiles.htm US federal government help of Iraq during the Iraq-Iran war may possibly backfire on innocent US citizens. The Wall Street Journal, March 10, 1998, pp. B1, B9. reports A Peek Inside a Giant Germ Warehouse By Rochelle Sharpe Rockville, Md. -- They keep anthrax bacteria in the basement of a faded red-brick building here. It isn't far from the yellow-fever virus, the botulism bacteria and some of the hundreds of organisms that cause the common cold. In fact, there are samples of 85,000 different fungi, viruses, cells, genes and bacteria here at the American Type Culture Collection, by far the largest of the 450 repositories of biological materials scattered around the globe. ... The ATCC legally shipped 10 vials of anthrax, botulism and other deadly substances to Iraqi scientists in the 1980s -- when the U.S. and Iraq were on much friendlier terms -- all with the Commerce Department's approval. ... http://www.jya.com/btn031198.txt The US federal government apparently intended these bioweapons to be used against the people of Iran. You demonstrated on PBS TV a quality identified by Francis Bacon The contemplation of things as they are, without error or confusion, without substitution or imposture, is in itself a nobler thing than a whole harvest of invention. by your statement about Saddam Hussein on PBS ...our man and our creation... Perhaps after reading the above materials and The Problem of Paradigm Shifts - Terrorism and the Threat From Weapons of Mass Destruction in the Middle East Working Draft Anthony H. Cordesman, Senior Fellow and Co-Director Middle East Studies Program October 22, 1996 http://www.csis.org/mideast/terror.html senators Campbell, Hollings, Lott, Shelby, Robb and representatives Dana Rohrabacher and Harold Rogers MAY NOW understand why you are correct and they are mis- or not well-informed about US involvement with Saddam Hussein. PROBLEM we face with the US court system is that court clerks and judges have committed Title 18 felony violation of law IN WRITING in an attempt to deny us monetary compensation due us for the cases WE WON at the Tenth Circuit on Appeal. But judges awarded victories to the US federal government in violation of Federal Rules of Appellate Procedure. Cases No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia were both won pro se on appeal. We have filed a writ of mandamus with supreme court judge Scalia in an attempt to get the docket sheets for the two above cases. But Scalia will not answer our certified letters. Senator McCain wrote Payne on December 23, 1997 I wanted to take this opportunity of than you for you letter of December 3, 1997. Your situation is in the jurisdiction of Senator Pete Dominici. Therefore, I have forwarded you letter to his attention. William, I hope you situation can be resolved favorably. Lawyers and politicians Dominici and Bingaman are part of a problem not a solution. Dominici and Bingaman have the following agenda University of New Mexico Bureau for Business and Economic Research reported on October 14, 1997: A The Gross State Product of New Mexico is $37.8 billion. B The US Federal government sends $11.3 billion to New Mexico each year. C For each $1 New Mexico sends to Washington, New Mexico gets $2 back. THEREFORE, Representative McKinney, we ask your help to get copies of the docket sheets. Citizens of the US are becoming more upset with the behavior of bureaucrats, the courts [lawyers], and the US federal government. Some Americans have no other way to express their dissatisfaction with US federal government mismanagement of our country except by violence. Frederick Douglass either wrote or said on August 4, 1847 Those who profess to favor freedom, and yet depreciate agitation are men who want crops without plowing up the ground. They want rain without thunder and lightening. Power concedes nothing without a demand. It never did, and it never will. Find out just what people will submit to and you have found out the exact amount of injustice and wrong which will be imposed upon them. These will continue until they are resisted with either words or blows, or with both. The limits of tyrants are prescribed by the endurance of those whom they oppress. We chose to use the words and law to hold government employees accountable. Please encourage Scalia to do his job. Help get us copies of the docket sheets. And even perhaps help investigate further and settle this American tragedy. Sincerely, Arthur R. Morales William H. Payne 1023 Los Arboles NW 13015 Calle de Sandias NE Albuquerque, NM 87107 Albuquerque, NM 87111 Enclosures 1 NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe 2 Crypto AG: The NSA's Trojan Whore? by Wayne Madsen 3 Swiss Radio International Audio tape, 15 May, 18 July 1994 Distribution Ben Nighthorse Campbell administrator at campbell.senate.gov Ernest Hollings senator at hollings.senate.gov Trent Lott senatorlott at lott.senate.gov Richard Shelby senator at shelby.senate.gov Charles Robb Senator_Robb at robb.senate.gov Jim Lehrer newshour at pbs.org From sandfort at crl.com Thu Mar 12 09:15:51 1998 From: sandfort at crl.com (Sandy Sandfort) Date: Thu, 12 Mar 1998 09:15:51 -0800 (PST) Subject: ANNOUNCE: March Bay Area Cypherpunks Meeting Saturday March 14, 12-6pm In-Reply-To: <3.0.5.32.19980311225235.0089c660@popd.ix.netcom.com> Message-ID: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SANDY SANDFORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C'punks, On Wed, 11 Mar 1998, Bill Stewart wrote: > The March Bay Area Cypherpunks meeting will be held Saturday, > March 14th...followed by dinner nearby, various evening parties > ...Sandy's Masquerade in or near Oakland... Guilty as charged, your Honor. The invitation URL is at: http://www.c2.net/~sandy/98mar.htm Be there or be a parallelogram with sides of equal length and equal angles. S a n d y ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From jkwilli2 at unity.ncsu.edu Thu Mar 12 13:41:06 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Thu, 12 Mar 1998 13:41:06 -0800 (PST) Subject: new on Peacefire: TracerLock search monitor service (fwd) Message-ID: Ken Williams /-| ORG: NC State Computer Science Dept VP of The E.H.A.P. Corp. |-\ | EML: jkwilli2 at adm.csc.ncsu.edu ehap at hackers.com | | WWW: http://www4.ncsu.edu/~jkwilli2/ http://www.hackers.com/ehap/ | | PGP: http://www4.ncsu.edu/~jkwilli2/pubkey | \-| Chief weapons of UNIX: Fear, surprise and ruthless efficiency. |-/ ---------- Forwarded message ---------- Date: Thu, 12 Mar 1998 16:10:09 -0500 From: bennett at peacefire.org To: peacefire-broadcast at vorlon.mit.edu Subject: new on Peacefire: TracerLock search monitor service [You are receiving this after signing up for membership in Peacefire at http://www.peacefire.org/join/. To unsubscribe yourself from this list and cancel your Peacefire membership, see unsubscription instructions at the end of this message.] ******************************************************* "They set 'em up. We knock 'em down. And here we are again." -Emily Whitfield, national ACLU spokeswoman, on the Internet censorship bill recently passed in New Mexico Even though the Communications Decency Act was struck down by the Supreme Court in the summer of 1997, New Mexico has just passed their own statewide version of the infamous Internet censorship law. Senate Bill 127, recently signed by the governor of New Mexico, makes it illegal to place information "harmful to minors" on the Internet where a person under 18 would be able to access it. The EFF and the ACLU have said they will fight the law in court; the ACLU has already won lawsuits to overturn similar laws in four other states. If you know someone living in New Mexico, or if you live in New Mexico, we need your help! Peacefire is creating a "civil disobedience" page for Internet users to protest the New Mexico law. By filling out a form on our Web site, a user will be able to click a button and automatically send a Bible verse that mentions sex, or an excerpt on birth control from the plannedparenthood.org Web page, to a Peacefire member under 18 living in New Mexico. These are the type of materials that would violate the Communications Decency Act and New Mexico's S.B. 127. Although the volunteer living in New Mexico can simply delete the messages as they arrive, it will still count as an act of civil disobedience for the user to fill out the form that causes the message to be transmitted. Please help us find someone living in New Mexico who could volunteer to receive the automatic e-mails and delete them. The number of e-mails should be small (less than 10 per day), and they will all have the same identical subject line so they will be easy to recognize and delete. (If the number of e-mails grows beyond that, we can have several volunteers.) More online coverage of the New Mexico law: http://www.news.com/News/Item/0,4,19859,00.html -Bennett --- To leave Peacefire and unsubscribe yourself from this list, send a message to "majordomo at vorlon.mit.edu" with the message body: unsubscribe peacefire-broadcast Please note that the only requirement for being a member of Peacefire is to remain subscribed to peacefire-broadcast, but if you unsubscribe from this list you will no longer be a member. bennett at peacefire.org (615) 421 6284 http://www.peacefire.org From gwb at gwb.com.au Thu Mar 12 15:39:05 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Thu, 12 Mar 1998 15:39:05 -0800 (PST) Subject: Pauline Hanson hits Sydney Message-ID: <1.5.4.32.19980312222322.006f2648@mail.pronet.net.au> Here is an excellent opportunity for Pauline Hanson supporters in New South Wales to come meet and hear Australia's best known politician. Pauline Hanson will be speaking on the failures of successive governments, the dangers facing Australians and the urgent need for our country to change direction and once again prioritise the needs of our people. Tickets will be sold at the door at most venues. Enquiries should be directed to One Nation Manly office - (02) 9976 0283 Her Sydney itinerary: Today (13th March 1998) Speaking on Channel 9s Midday Show. 7.30pm Public meeting at AJC Club in Allison Road, Randwick Tomorrow (Saturday 14th March) 12 noon - Hawkesbury Sportsman's Club, Beaumont Ave North Richmond. (NOTE: This is a luncheon also featuring 2GB Radio personality Brian Wiltshire) 7.30pm - Joan Sutherland Centre, High Str., Penrith Sunday 15th March 2pm - Cessnock Town Hall, Darwin Street, Cessnock 7.30pm - Dural Country Club, 662 Old Northern Road, DURAL Monday 16th March 7.30pm Manly Warringah Leagues Club, Pittwater Road, Brookvale Tuesday 17th March 7.30pm Wyong Multi-Function centre, Healey Str, Wyong Show your support. BE THERE! GWB Scott Balson From joc at pdx.oneworld.com Thu Mar 12 19:46:33 1998 From: joc at pdx.oneworld.com (JO COOPER) Date: Thu, 12 Mar 1998 19:46:33 -0800 (PST) Subject: get me off Message-ID: <199803130345.TAA27091@iceberg.pdx.oneworld.com> Hello- ANYONE!!! Please, my young son subscribed me to this -whatever you are- and I cannot get off- I do not want any e-mail from you. Can I please get instructions as to how to stop this? Thank you From Cindy at mcglashan.com Thu Mar 12 20:03:57 1998 From: Cindy at mcglashan.com (Cindy Cohn) Date: Thu, 12 Mar 1998 20:03:57 -0800 (PST) Subject: Senate Cmte to hear Testimony About Bernstein Case Message-ID: <199803130338.TAA18807@gw.quake.net> The Senate Judiciary Committee's Subcommittee on the Constitution, Federalism, and Property Rights will hear testimony from Cindy Cohn, lead counsel in the Bernstein case on March 17, 1997. The hearing, entitled "Privacy in the Digital Age: Encryption and Mandatory Access," will begin at 10:00 a.m. in Room 226 of the Dirksen Senate Office Building. The Subcommittee is chaired by Senator John Ashcroft of Missouri. Ms. Cohn will discuss the Bernstein case as well as the inherent constitutional problems raised by the proposals for domestic cryptography controls. This will be the first time that the Congressional committees considering proposed cryptography legislation have heard testimony from those directly involved in the legal challenges the current regulations. The government's appeal of the Bernstein case, which was argued on December 8, 1997, is still pending with the 9th Circuit. A decision is expected in the next few months. ****************************** Cindy A. Cohn, Cindy at McGlashan.com McGlashan & Sarrail, P.C. 177 Bovet Road, 6th Floor San Mateo, CA 94402 (650) 341-2585 (tel) (650) 341-1395 (fax) From nobody at REPLAY.COM Thu Mar 12 22:03:15 1998 From: nobody at REPLAY.COM (Anonymous) Date: Thu, 12 Mar 1998 22:03:15 -0800 (PST) Subject: Fortify Message-ID: <199803130603.HAA04734@basement.replay.com> Tthe remarkably hackable nature of Netscape's "weak" crypto has been marveled at here and in the press, but has no one else speculated on how this state of affairs came to be? I, for one, would like to thank the anonymous cypherpunks toiling in the bowels of Netscape. An amazing feat, achieving world-wide distribution of millions of copies of strong crypto, the Feds all unknowing. Does anyone here _not_ think this was the deliberate act of one or more cryptoanarchists? From toto at sk.sympatico.ca Thu Mar 12 22:15:00 1998 From: toto at sk.sympatico.ca (Toto) Date: Thu, 12 Mar 1998 22:15:00 -0800 (PST) Subject: get me off In-Reply-To: <199803130345.TAA27091@iceberg.pdx.oneworld.com> Message-ID: <3508CDBD.6150@sk.sympatico.ca> JO COOPER wrote: > I > cannot get off http://www.studiousanonymous.com/ Studios Anonymous - adult explicit site features: bestiality, transexuals, lesbians, young girls, gays, masturbaters, cocksuckers, ass pounders, beautiful asses, huge tits, dogs, horses, chimps, cows. > Thank you You're welcome From lauke31 at prodigy.com Thu Mar 12 23:12:16 1998 From: lauke31 at prodigy.com (lauke31 at prodigy.com) Date: Thu, 12 Mar 1998 23:12:16 -0800 (PST) Subject: "Make your Mailbox an ATM Machine" Message-ID: <19980313674HAA23717@post.erzwiss.uni-hamburg.de>


 MAKE YOUR MAILBOX YOUR CASH ATM    
                        MACHINE!
                                                                              
           Immediately Make a Copy of this Letter, PRINT IT SAVE
           and READ again. I received this Letter 3 times before I decided
           to try it. I beat up on my self for not joining this group sooner

    ===Add your Name the our Mailing List and start Receiving Cash!===

Greetings:
Hopefully my name is still on the list below. I am a retired attorney and
 about two years ago, a man came to me with a letter. NOTE: This is not 
a chain letter. THIS SERVICE IS 100% LEGAL! (Refer to TITLE 18,
 Section 1302 & 1342 of the U.S. POSTAL and LOTTERY LAWS). 
The letter he brought me is basically the same letter you have in your 
hands. He asked me to verify the fact that this letter was legal to do. 
I told him I would review it and get back to him. When I first read the 
letter my client brought me, I thought it was some kind of off-the wall 
idea to make money. A week and a half later, we met in my office to 
discuss the issue. I told him to make a small change in the letter and it 
would be all right.

I was still curious about the letter, so he told me how it works. 
I thought it was a long shot, so I decided against participating, 
but before my client left, I asked him to keep me updated as to his
result. About two months later he called me to tell me HE HAD 
RECEIVED OVER $800,000.00 IN CASH. I didn't believe him, so 
he asked me to try his idea and find out for my self. I thought about it
for a couple days and decided I didn't really  have anything to lose, 
so I asked him for a copy of the letter.  I followed the instructions
exactly, mailed out 200 copies, and sure enough, the money started
arriving!  It came slowly at first, but after about three weeks, I was 
getting more mail  than I could open in a day. After about  three 
months the money stopped  coming. I KEPT PRECISE RECORDS 
OF THE EARNINGS AND AT THE END, IT TOTALED $868,494.00!

I was earning a good living as a lawyer, but anyone in the legal profession 
will tell you, there is a lot of stress that comes with the job. I told myself
 if  things  work out, I would retire from the practice and play golf. I
decided
to try the letter again, but this time I sent 500 letter out. Well, three
months 
later, I HAD TOTALED $2,344,178.00 ! I just couldn't believe it. I met my 
old client for lunch to find out how it worked. He told me there are quite a 
few similar letters going around. WHAT MAKES THIS ONE DIFFERENT
IS THE FACT THAT THERE ARE SEVEN NAMES INSTEAD OF FIVE 
LIKE MOST OTHERS.  That fact alone results in your name being on far 
more return. The other factor was the help I gave him in making sure the 
whole thing was  perfectly legal, since nobody wants to risk doing something 
illegal.

I'll bet by now you are curious to know what little change I told him to make.
Well, If you sent a letter like this out, to be legal, you need to actually
sell 
something if you expect to receive a DOLLAR. I told him anyone sending 
a dollar  back to him must receive something in return. So, when you send a
dollar to each  of the seven people on the list, you must include a slip of
paper 
with the words:  "Please put me on your mailing list", include your, name,
mailing address, e-mail optional... 

THIS IS THE KEY TO THE PROGRAM!!  THE ITEM YOU WILL RECEIVE
 FOR THE DOLLAR YOU SEND TO THE SEVEN NAMES IS YOUR NAME 
ON THEIR MARKETING LETTER AND THE RIGHT TO EARN THOUSANDS ! !


   Follow the simple instructions below exactly, & in less than three months,
    you will receive over $800,000.00 GUARANTEED!!!!!!!!

1. Immediately send $1.00 to each of the seven people on the list below, 
    wrap a dollar in a note saying, "Please add me to your mailing list" 
    and include your name, mailing address , optional e-mail address.

2. Remove the names in the #1 position on the list and move the rest of
     the names up one position. Then place your name in the #7 position.  
     This is best done by saving this to a text file and editing it yourself
     and saving the new edited copy. Or  typing a new list, (Only the names)
     taping or gluing over  the old ones.  Or by.  Be very careful when you type 
     the address and proof read them.

 
1. G. Paul, 314 Sidney Martin St., Lafayette, LA 70507
2. I.A. Goodspeed, 33080 Brockway St, Union City, CA 94587 
3. M. Alfred, P.O. Box 33366, San Antonio, Texas 78265
4. Ophelia Williams, 1250 E. Alexander St, Lafayette, LA 70501 
5. Ed.. Bronsc, 9824 South Western Avenue  #321, Evergreen Park, IL 60805
6. ABC Sales, 12541A South Western, Box 4, Blue Island, IL 60406
7. S. Andrews, 89 Park Street, Rear Building #2, Montclair, NJ  07042


3. When you have completed the instructions, you have the option of mailing 
    your New Letter out in two ways: (1) by e-mail or  (2)Through the 
    U.S. Postal Service.  Either way will bring big payoffs. This letter has
    been proven perfectly legal for both ways as long as you follow the above
    instructions, because you are purchasing membership in an exclusive 
    mailing list. 

To mail this out over the Internet,.  All you have to do is order several
hundred thousand e-mails from a provider like the one below. Also you can go to the
members directory in AOL and there you can collect thousands of names for 
free.  However, you will need a utility to collect these names from AOL. As 
a Member of AOL, go the Keyword, there is a free software utility under BPS 
software called Power tools. This will allow you to cut and paste e-mails .
 Remember it does not cost anything to mail on the Internet.  Or you can get 
a Mass Mail Network to mail it out in large  volumes for you.  We highly
recommend this one.  They always email more  than you purchase and their 
 address are fresh.  Mail this letter to them with your name and address in
the  Position # 7 above.  A good one to use is:

Global Frontiers Marketing
732-728-0064
They are fair and do a good job of mailing to lots of internet providers.

4. We have a Fresh List of AOL Email address ready to use. These  addresses 
    are downloaded weekly. 50,000 AOL E-mail addresses $7.50; 100,000/ $10.00
    you also get a Free Mailer with and order of 100,000 e-mails
    These addresses are on 3 .5  Disk.
          Ebran Marketing
          9824 South Western
          Suite 321
          Evergreen Park, IL 60805
5. If you are going to use the traditional U.S. Postal Service to do this 
     program, you will want to make copies of this letter at a copy center
      (kinkos copy service) and  order a minimum of  500 names (1000 is best)
       from a mailing list company.

Ebran Marketing, 9824 S. Western Ave, Suite 321, Evergreen Park, IL 60805
     500/ $15.00    1000/ $20.00

These two also have effective lists:
     Avon Distributors ~ P.O. Box B11 ~ Shelly, ID 83274 ~ (800) 992-3866
      DataLine ~ P.O.Box 7348 ~ Omaha, NE 68107 ~ (800)497-2912

(A) While waiting for you list to arrive, place your copies in envelopes, 
stamp, and seal them. DO NOT PUT YOUR RETURN ADDRESS ON
THE ENVELOPES! This will only pique the curiosity of the receiver.
 (B) When your mailing list arrives, place a label on each of your
envelopes and drop them in the mail box. Within 90 days, you will receive
over $800,000.00 in cash !!! * Keep a copy of this letter so you can use
 it a second time. Mail it out again in about six months but mail it to the
addresses you receive with each dollar. It will work again, only much better!

BE SURE TO MAIL $1.00 TO EACH OF THE NAMES ON THE LIST 
ABOVE.  INTEGRITY AND HONESTY WILL MAKE THIS PLAN WORK. 
And together WE WILL ALL PROSPER.

Here's how the system works: Assume for example you get a 7.5% return rate,
which is very conservative. My first attempt was about 9.5% and my second
was over 11%.
1.When you send out 200 letters, 15 people will send you $1.00 = $15.00 
2.Those 15 mail out 200 letters each and 225 people send $1.00 =$225.00
3.Those 225 mail out 200 letters each and 3,375 people send $1.00=$3,375.00
4.Those 3,375 mail out 200 letters each and 50,625 people send
$1.00=$50,625.00 
5.Those 50,625 mail out 200 letters each and 759,372 people send
$1.00=$759,372.00

At this point your name drops off the list...but so far you have 
received $813,612.00

It works every time, but how well depends on how many letters you send
out. In the example above, you mailed out 200 letters, if you had mailed
out 500 letters, you would have received over $2,00,017.
NOW, just think if you send out 50,000 to 100,000 e-mails and you only get
1.5 to a 3% response and each person responding send out another 50,000 to
100,000 with the 1.5 to 3% response.  Now you see you can easily reach the
$800,000 plus with little effort on your part. (Check the Math Yourself)

 With this kind of possible return, you have got to try it.Try it once and you
will do it again!!!!.  Just make sure you send a DOLLAR to each of the seven
 names on the list with a note to be added to their mailing list. Follow the
above
 instructions exactly, you will have SUCCESS!!!!!!

PS: You have read this far, so let me ask you one simple question:
     What do you have to loose?
     Just $7.00, but with a little effort on your part, you can gain over
$800,000

EVERYBODY ON THE LIST NEEDS EVERYBODY'S HELP. 

TRY IT NOW ! ! Place your name on our mailing List by sending your $1.00 
to each of the 7 names above today.

Within about 14 days you will need help counting your $1.00 bills
































Message-ID: <3.0.5.32.19980313094123.007c6b40@otc.net> At 07:03 AM 3/13/98 +0100, Anonymous wrote: >Tthe remarkably hackable nature of Netscape's "weak" crypto has been marveled >at here and in the press, but has no one else speculated on how this state of >affairs came to be? I, for one, would like to thank the anonymous cypherpunks >toiling in the bowels of Netscape. An amazing feat, achieving world-wide >distribution of millions of copies of strong crypto, the Feds all unknowing. >Does anyone here _not_ think this was the deliberate act of one or more >cryptoanarchists? > Not to burst your optimism, but wouldn't good software design dictate maintainable, ie, modifiable code? ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Beat your algorithms into swords and your virtual machines into spears: let the weak say, I am strong. Gosling deliver us from the ropes of backcompatability and mass production. From mgraffam at mhv.net Fri Mar 13 11:14:36 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Fri, 13 Mar 1998 11:14:36 -0800 (PST) Subject: Fortify In-Reply-To: <3.0.5.32.19980313094123.007c6b40@otc.net> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Fri, 13 Mar 1998, David Honig wrote: > Not to burst your optimism, but wouldn't good software design dictate > maintainable, ie, modifiable code? That depends on how you are using the term 'good.' If the purpose of the design is to make a programmer's life easy, then you may be right. On the other hand, if the software calls for a bit of security, like ns does, then I would assume otherwise. Programmers who are serious about making crippleware don't distribute the full executable with a simple branch instruction (going to the cripple routine) to keep the user at bay: they know that it is trivial to modify the code. I would assume that the programmer's at netscape understand this. If they were serious about keeping people from using 128 bit crypto, they would have yanked it completely. Now, I don't think that this was done out of benevolence, mind you. Rather, I think that they are a bit more concerned with producing a good browser and didn't take the time to design a weak-crypto version: they took the easy way out. Netscape wants to make money, and for this I support them. They aren't going to pay programmers to make a product like a weak-crypto browser when it doesn't make them money. They get the minimum job done to bow to ITAR, and they get to work on some new snazzy features for the next version. They make Fortezza-based browsers too, would we call them the servants of Big Brother? Hell no. They are neither freedom fighters nor henchmen of a tyrant: they are businessmen. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "Enlightenment is man's emergence from his self-incurred immaturity. Immaturity is the inability to use one's own understanding without the guidance of another. . .Sapere aude! Have the courage to use your own understanding!" - Immanuel Kant "What is Enlightenment?" -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQCVAwUBNQmEAAKEiLNUxnAfAQEL2QQAhvnV1xLRjXo5YHl+IBwAmBYLzfnPFspP KXNG5cxltO2ImEK094PxC9FPbEqvmHtid/e+kNzJ4lMPVAh+JZ6ALrcynRkjWK8F ZkgDZbqaIorT94w2SJppcxMAVYyJ9oAw94uytcXvPTEXDn2IOdTlpw/3gsTaHEPN ly4Kb1iBhMs= =tgBR -----END PGP SIGNATURE----- From afabbro at umich.edu Fri Mar 13 11:17:25 1998 From: afabbro at umich.edu (andrew fabbro) Date: Fri, 13 Mar 1998 11:17:25 -0800 (PST) Subject: Fortify In-Reply-To: <199803130603.HAA04734@basement.replay.com> Message-ID: On Fri, 13 Mar 1998, Anonymous wrote: > toiling in the bowels of Netscape. An amazing feat, achieving world-wide > distribution of millions of copies of strong crypto, the Feds all unknowing. Netscape distributes both a domestic version and an international version: "Note to customers from countries other than Canada and the United States: Netscape's recent agreement with the U.S. government allows you to download Netscape Communicator client software with strong encryption capabilities that can be accessed only when you connect to particular Netscape servers approved for export. This capability is now built into all Netscape Communicator client products and does NOT require you to fill out an eligibility declaration. U.S. and Canadian citizens and permanent residents may download versions with strong encryption that is ALWAYS enabled (regardless of the 128-bit server connected to) but must still fill out an eligibility declaration before doing so. This option allows you to talk to sites that use a strong version of cryptography to encode sensitive information - such as a credit card number - that you don't want anyone to be able to capture and read as it is transmitted over the Internet. All Netscape products include cryptographic capability. However, if you are a U.S. or Canadian citizen or a legal permanent resident of the United States, you can choose a version with the stronger encryption always enabled. Strong encryption refers to the size of the key used to encrypt the message. Roughly speaking, messages encrypted with strong (128-bit) encryption are 309,485,009,821,345,068,724,781,056 times harder to break than those that use 40-bit encryption. However, some experts estimate that keys much shorter than 128 bits will be safe for the next two decades. The strong U.S./Canada-only encryption version is available in French and English to U.S. and Canadian citizens and to permanent residents of the United States only. Because the U.S. government restricts export of any product using 128-bit encryption, you will be asked to fill out an Eligibility Declaration stating that you are a U.S. or Canadian citizen or a legal permanent resident of the United States before you will be allowed to download the software you've selected. The Eligibility Declaration will be stored in a database and made available to the U.S. government upon request." -- http://home.netscape.com/download/client_options.html#enhanced -- Andrew Fabbro [afabbro at umich.edu] [andrewf at jesuswept.com] http://www-personal.umich.edu/~afabbro/ 313.647.2713 "We make money the old fashion way. We print it." - DigiCrime From StanSquncr at aol.com Fri Mar 13 14:42:29 1998 From: StanSquncr at aol.com (StanSquncr) Date: Fri, 13 Mar 1998 14:42:29 -0800 (PST) Subject: get me off/ME TOO! Message-ID: <1e0ef5b7.3509b602@aol.com> In a message dated 98-03-12 23:17:51 EST, joc at pdx.oneworld.com writes: << Hello- ANYONE!!! Please, my young son subscribed me to this -whatever you are- and I cannot get off- I do not want any e-mail from you. Can I please get instructions as to how to stop this? >> Me too. Take me off of your stinkin' list. Stan and the Sequencers From Cindy at mcglashan.com Fri Mar 13 14:52:20 1998 From: Cindy at mcglashan.com (Cindy Cohn) Date: Fri, 13 Mar 1998 14:52:20 -0800 (PST) Subject: Correction re Senate testimony Message-ID: <199803132231.OAA26445@gw.quake.net> My earlier post was slightly overstated. Phil Karn has testified before Congress numerous times about his legal challenge and has consistently pushed these issues in the legislature. My testimony will be the first time any of the attorneys involved have been asked to discuss the constitutional problems with the cryptography restrinctions. My apologies to Phil. Cindy ****************************** Cindy A. Cohn, Cindy at McGlashan.com McGlashan & Sarrail, P.C. 177 Bovet Road, 6th Floor San Mateo, CA 94402 (650) 341-2585 (tel) (650) 341-1395 (fax) From StanSquncr at aol.com Fri Mar 13 15:26:57 1998 From: StanSquncr at aol.com (StanSquncr) Date: Fri, 13 Mar 1998 15:26:57 -0800 (PST) Subject: Correction re Senate testimony Message-ID: <4e16d544.3509bbac@aol.com> Take me off of this list. Stan From billp at nmol.com Fri Mar 13 18:16:09 1998 From: billp at nmol.com (bill payne) Date: Fri, 13 Mar 1998 18:16:09 -0800 (PST) Subject: taocp v3 p32 Message-ID: <3509E567.2364@nmol.com> Subject: Swiss radio international tape Date: Fri, 13 Mar 1998 17:45:06 -0700 From: bill payne To: taocp at cs.stanford.edu Knuth Hope you got a copy of the tape. I wonder or not whether you knew that NSA ACTIVELY tried to suppress knowledge and research on shift register sequences. And Forth too. Looks like possibly a BAD SCENE ahead. Best, allahu akbar, etc. bill Title: Don Knuth's Home Page : Donald E. Knuth (U+9AD8+5FB7+7EB3), Professor Emeritus of The Art of Computer Programming at Stanford University, welcomes you to his home page. *Frequently Asked Questions *Recent News *Computer Musings --> *Known Errors in My Books *Important Message to all Users of TeX *Help Wanted *Preprints of Recent Papers *Curriculum Vit� *Pipe Organ *Downloadable Graphics *Downloadable Programs *Expecting a check from me? (don't click here) Stanford Computer Science Home Page Thursday 3/12/98 7:34 AM Certified - Return Receipt Requested Cynthia McKinney 124 Cannon Building Washington, DC 20515 Office: (202)225-1605 Fax: (202)226-0691 http://www.house.gov/mckinney/ Dear Representative McKinney: PURPOSE of this letter is to ask your help for us to obtain copes of docket sheets from the Tenth Circuit Court of Appeals for cases No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia. All of our legal efforts to obtain these documents, which any citizen has a right to, have failed. REASON you are selected to help is that you appear to be knowledgeable about operation of the current US federal government and willing to speak out in an attempt to solve problems. You appeared Friday February 27, 1998 on PBS, The NewsHour with Jim Lehrer, along with senators Campbell, Hollings, Lott, Shelby Robb and representatives Dana Rohrabacher and Harold Rogers. These senators and congressmen appeared not to support your views because they are either mis- or not well-informed about US involvement in support of Saddam Hussein. Stories supporting your view appear on Internet at NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe http://www.aci.net/kalliste/speccoll.htm and Crypto AG: The NSA's Trojan Whore? by Wayne Madsen http://caq.com/CAQ/caq63/caq63madsen.html Madsen begins It may be the greatest intelligence scam of the century: For decades, the US has routinely intercepted and deciphered top secret encrypted messages of 120 countries But NSA , and as a result the US federal government, apparnetly got caught involved in complicity of deaths of about 500,000 Iranians. This is the subject of a Federal lawsuit seen on Internet at http://jya.com/whpfiles.htm US federal government help of Iraq during the Iraq-Iran war may possibly backfire on innocent US citizens. The Wall Street Journal, March 10, 1998, pp. B1, B9. reports A Peek Inside a Giant Germ Warehouse By Rochelle Sharpe Rockville, Md. -- They keep anthrax bacteria in the basement of a faded red-brick building here. It isn't far from the yellow-fever virus, the botulism bacteria and some of the hundreds of organisms that cause the common cold. In fact, there are samples of 85,000 different fungi, viruses, cells, genes and bacteria here at the American Type Culture Collection, by far the largest of the 450 repositories of biological materials scattered around the globe. ... The ATCC legally shipped 10 vials of anthrax, botulism and other deadly substances to Iraqi scientists in the 1980s -- when the U.S. and Iraq were on much friendlier terms -- all with the Commerce Department's approval. ... http://www.jya.com/btn031198.txt The US federal government apparently intended these bioweapons to be used against the people of Iran. You demonstrated on PBS TV a quality identified by Francis Bacon The contemplation of things as they are, without error or confusion, without substitution or imposture, is in itself a nobler thing than a whole harvest of invention. by your statement about Saddam Hussein on PBS ...our man and our creation... Perhaps after reading the above materials and The Problem of Paradigm Shifts - Terrorism and the Threat From Weapons of Mass Destruction in the Middle East Working Draft Anthony H. Cordesman, Senior Fellow and Co-Director Middle East Studies Program October 22, 1996 http://www.csis.org/mideast/terror.html senators Campbell, Hollings, Lott, Shelby, Robb and representatives Dana Rohrabacher and Harold Rogers MAY NOW understand why you are correct and they are mis- or not well-informed about US involvement with Saddam Hussein. PROBLEM we face with the US court system is that court clerks and judges have committed Title 18 felony violation of law IN WRITING in an attempt to deny us monetary compensation due us for the cases WE WON at the Tenth Circuit on Appeal. But judges awarded victories to the US federal government in violation of Federal Rules of Appellate Procedure. Cases No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia were both won pro se on appeal. We have filed a writ of mandamus with supreme court judge Scalia in an attempt to get the docket sheets for the two above cases. But Scalia will not answer our certified letters. Senator McCain wrote Payne on December 23, 1997 I wanted to take this opportunity of than you for you letter of December 3, 1997. Your situation is in the jurisdiction of Senator Pete Dominici. Therefore, I have forwarded you letter to his attention. William, I hope you situation can be resolved favorably. Lawyers and politicians Dominici and Bingaman are part of a problem not a solution. Dominici and Bingaman have the following agenda University of New Mexico Bureau for Business and Economic Research reported on October 14, 1997: A The Gross State Product of New Mexico is $37.8 billion. B The US Federal government sends $11.3 billion to New Mexico each year. C For each $1 New Mexico sends to Washington, New Mexico gets $2 back. THEREFORE, Representative McKinney, we ask your help to get copies of the docket sheets. Citizens of the US are becoming more upset with the behavior of bureaucrats, the courts [lawyers], and the US federal government. Some Americans have no other way to express their dissatisfaction with US federal government mismanagement of our country except by violence. Frederick Douglass either wrote or said on August 4, 1847 Those who profess to favor freedom, and yet depreciate agitation are men who want crops without plowing up the ground. They want rain without thunder and lightening. Power concedes nothing without a demand. It never did, and it never will. Find out just what people will submit to and you have found out the exact amount of injustice and wrong which will be imposed upon them. These will continue until they are resisted with either words or blows, or with both. The limits of tyrants are prescribed by the endurance of those whom they oppress. We chose to use the words and law to hold government employees accountable. Please encourage Scalia to do his job. Help get us copies of the docket sheets. And even perhaps help investigate further and settle this American tragedy. Sincerely, Arthur R. Morales William H. Payne 1023 Los Arboles NW 13015 Calle de Sandias NE Albuquerque, NM 87107 Albuquerque, NM 87111 Enclosures 1 NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe 2 Crypto AG: The NSA's Trojan Whore? by Wayne Madsen 3 Swiss Radio International Audio tape, 15 May, 18 July 1994 Distribution Ben Nighthorse Campbell administrator at campbell.senate.gov Ernest Hollings senator at hollings.senate.gov Trent Lott senatorlott at lott.senate.gov Richard Shelby senator at shelby.senate.gov Charles Robb Senator_Robb at robb.senate.gov Jim Lehrer newshour at pbs.org Title: Space Related Applications of Forth Space-Related Applications of Forth Compiled by James Rash NASA Goddard Space Flight Center Greenbelt, Maryland Introduction. The following table presents space-related applications of Forth microprocessors and the Forth programming language, including spacecraft flight system controllers on-board payload experiment controllers ground support systems (e.g., communications controllers and data processing systems) hardware or software used to build or test either flight or ground systems. Developers are requested to supply table updates and corrections, as well as information regarding relevant projects not already included, as appropriate. Please send information, comments, and suggestions to the author of this web page. Authorization for release of the information is the responsibility of the contributor. Please notify the author concerning any non functional URLs, links, or contact information in the table. Further information on Forth, including the ANSI standard (ANS Forth): Forth Interest Group Maryland Forth Interest Group: http://www.bcpl.lib.md.us/~nbuck/fig.html --> Taygeta Notice: Nothing appearing in these pages is to be construed as an endorsement by NASA. The information may be changed or withdrawn at any time without notice. The author has obtained the information from sources believed to be reliable, and has attempted to ensure accuracy, but makes no guarantees or representations of any kind. Copying, using, and distributing the table is authorized, provided it is kept intact, properly attributed, and accompanied by this Notice. DEVELOPER MISSION DESCRIPTION FURTHER INFORMATION (note: remove blanks from email addresses given below) Ball Aerospace (click on "Aerospace" link) Advanced Composition Explorer (ACE) Star Scanner instrument & control software, using Harris RTX 2000 Forth microprocessor � Ball Aerospace Advanced X-Ray Astronomical Facility (AXAF) Software to control the Science Instrument selection and focus mechanisms, using Harris RTX 2010 Forth microprocessor � Ball Aerospace Advanced X-Ray Astronomical Facility (AXAF) Software to operate precision CCD Aspect Camera, using Harris RTX 2010 Forth microprocessor � Ball Aerospace Earth Observing System (EOS) Scanning mirror controller for the Thermal Imaging Radiometer (TIR), using Harris RTX 2010 Forth microprocessor � Ball Aerospace Midcourse Sensor Experiment (MSX) - SDIO Star Tracker instrument & control software, using Harris RTX 2000 Forth microprocessor � Ball Aerospace Military aircraft Star Tracker instrument & control software, using Harris RTX 2000 Forth microprocessor � Ball Aerospace Miniature Seeker Technology Integration (MSTI) Star Tracker instrument & control software, using Harris RTX 2000 Forth microprocessor � Ball Aerospace Near Earth Asteroid Rendezvous (NEAR) Star Tracker instrument & control software, using Harris RTX 2000 Forth microprocessor � Ball Aerospace Shuttle Star Tracker instrument & control software, using Harris RTX 2000 Forth microprocessor � Ball Aerospace Submillimeter Wave Astronomy Satellite (SWAS) Star Tracker instrument & control software, using Harris RTX 2000 Forth microprocessor � Ball Aerospace X-ray Timing Explorer (XTE) Star Tracker instrument & control software, using Harris RTX 2000 Forth microprocessor � California Institute of Technology (Caltech) Advance Composition Explorer (ACE) Cosmic Ray Isotope Spectrometer (CRIS) instrument controller hardware (RTX2010) and software in Forth Walter Cook at wrc@ thor.srl.caltech.edu California Institute of Technology (Caltech) Advance Composition Explorer (ACE) Solar IsotopeSpectrometer (SIS) instrument controller hardware (RTX2010) and software in Forth Walter Cook at wrc@ thor.srl.caltech.edu Johns Hopkins University Applied Physics Laboratory (JHU/APL) USAF DMSP Magnetometer instrument control � JHU/APL USAF DMSP Special Sensor Ultraviolet Spectrographic Imager (SSUSI), 5 missions over 15 years using Harris RTX 2010 Forth microprocessor � JHU/APL Advanced Composition Explorer (ACE) satellite ULEIS (Ultra Low Energy Isotope Spectrometer), using embedded Harris RTX 2010 Forth microprocessor � JHU/APL CASSINI spacecraft Magnetospheric Imager (MIMI) using Harris RTX 2010 Forth microprocessor � JHU/APL HILAT Magnetometer instrument control � JHU/APL Hopkins Ultraviolet Telescope (HUT) Instrument control, on-line data analysis, telemetry � JHU/APL MAGSAT Attitude Control Processor � JHU/APL "Polar Bear" (Polar Beacon & Auroral Research Satellite) Magnetometer instrument control � JHU/APL US Navy LONARS High precision navigation receiver using Loran-C Real time data processing & sensor control software � JHU/APL Near Earth Asteroid Rendezvous (NEAR) Command & Telemetry Processor, Multi-Spectral Imaging System, Infrared Spectrograph and Magnetometer, X-ray/Gamma-ray Spectrometer, and Laser Rangefinder, all using the Harris RTX 2010RH Forth microprocessor � Los Alamos National Laboratory Advanced Composition Explorer (ACE) satellite Solar wind data processing unit, using Harris RTX 2010 Forth microprocessor � McDonnell Douglas Shuttle - Electrophoresis Operations in Space (1986) Pharmaceutical purification process control software Robert Wood at rwood@ mdc.com McGill University International Microgravity Laboratory (IML-1) (Shuttle mission STS-42) Space Adaptation Syndrom Experiment management and data acquisition for four out of seven life science experiments Luc Lefebvre at lefebvre@ medcor.mcgill.ca NASA/GSFC Compatibility Test Van (CTV) Dual channel PCM simulator system software � NASA/GSFC Compatibility Test Van (CTV): Landsat, HST, GRO, COBE, UARS, etc., Wallops, Data Evaluation Lab Programmable Data Formatter III system software � NASA/GSFC CRAF/CASSINI MASSACQ Flight Instrument Test/Calibration System � NASA/GSFC Marine Optical Buoy (MOBY) Command and data acquisition system written in Forth Mark Yarbrough at yarbrough@ mlml.calstate.edu NASA/GSFC Massively Parallel Processor (MPP) Image processing software � NASA/GSFC NCC Mission Operations Support Area (MOSA) ITR (Intelligent Transmitter/Receiver) -- Interface board for MOSA (formerly Mini-NOCC) Front End Thomas Sardella at Thomas.E.Sardella.1@ gsfc.nasa.gov NASA/GSFC Shuttle Solar Backscatter Ultra Violet (SSBUV) ozone calibration instrument with 8 successful Shuttle bay flights Small Payload Accommodation Module (SPAM) interface controller software written in Forth Bob Caffrey at Robert.T.Caffrey.1@ gsfc.nasa.gov NASA/GSFC Shuttle Solar Backscatter Ultra Violet (SSBUV) Instrument Interface Electronics Module (IIEM) software written in Forth John T. (Tom) Riley at john.t.riley.1@ gsfc.nasa.gov NASA/GSFC Shuttle Ozone Limb Sounder Experiment (SOLSE) A "Hitchhiker Junior", to fly summer '97 -- instrument controller written in Forth (ditto) NASA/GSFC Limb Ozone Retrieval Experiment (LORE) A small independent instrument within SOLSE -- instrument controller written in Forth (ditto) NASA/GSFC Ultraviolet Imaging Telescope (UIT) on Space Shuttle Astro-2 mission Dedicated Experiment Processor (DEP) written in Forth Peter Chen at chen@ uit.gsfc.nasa.gov NASA/GSFC Small Spacecraft Technology Initiative (SSTI) (Lewis Research Center/TRW) Goddard Electronics Module (GEM) data acquisition processor using Harris RTX-2010 Jay T. Miller at jay.t.miller.1@ gsfc.nasa.gov NASA/GSFC ACE (JHU/APL) Spacecraft Loads & Acoustic Monitor (SLAM) simultaneous data acquisition and downlink subsystem using Harris RTX-2010 (ditto) NASA/GSFC Wideband Transport Frame Formatter (WTFF) Virtual channel processor & system controller for the Advanced Orbiting Systems (AOS) Testbed using Harris RTX 2000 Forth microprocessor Jose Bentancort at Jose@ tsi-telsys.com NASA/JSC Shuttle, IML-1 Krug Life Sciences Microgravity Vestibular Investigations � NASA/JPL Shuttle Imaging Radar (SIR-B) Command & control software � NASA TOPEX Portion of Ground Support Equipment software � Orbital Sciences Corporation ORBCOMM Experimental Package OXP-1 on Pegasus Flight & experiment software � Orbital Sciences Corporation ORBCOMM Experimental Package OXP-1 on Pegasus Flight & experiment software � Orbital Sciences Corporation (formerly Fairchild Space & Defense) USAF Multimission Modular Spacecraft (MMS) Multiplex Data Bus Monitor/Recorder test equipment using Harris RTX2000 microprocessor and firmware written in Forth Mark A. Mowen at markmowen@ fsd.com Orbital Sciences Corporation ORBCOMM-X Telemetry, flight control support � Orbital Sciences Corporation USAF APEX Data management and power control software � Orbital Sciences Corporation SeaStar Sea WiFs data management and power control software � Orbital Sciences Corporation/Hercules Pegasus Telemetry & flight control � Radio Amateur Satellite Corp. (AMSAT-DL (Germany)) AMSAT OSCAR 10, OSCAR 13, OSCAR 21, and (in development) Phase 3-D amateur radio satellites Integrated Housekeeping Unit (including navigation, attitude control, telemetry and telecommand tracking, payload control, power management, health & safety, and propulsion control) and Ground Support Equipment, all using the Forth-like language IPS (Interpreter for Process Structures). OSCAR 21 used the Harris RTX2000 microprocessor. � Swedish Space Corp./JHU/APL Freja Magnetometer experiment control Lawrence Zanetti at zanetti@ jhuapl.edu University of California Galileo Magnetic Field Experiment instrument control � University of Wisconsin Wisconsin Ultraviolet Photo-Polarimeter Experiment (WUPPE) Instrument control � US Navy SPINSAT Portion of ground support equipment software � USSR Baikonur Cosmodrome Telemetry data analysis & retrieval workstations � Vertex Communications Corporation Satellite earthstation antenna systems 7210 Monopulse Antenna Control System on Motorola 68030 platform sales@ vcsd.com Last revised: 4 March 1998 Name Mail Code Responsible management official Sylvia Sheppard 588 Author James Rash at james.rash@ gsfc.nasa.gov 588 For reference purposes, this page is located at URL: http://groucho.gsfc.nasa.gov/forth From StanSquncr at aol.com Fri Mar 13 19:20:10 1998 From: StanSquncr at aol.com (StanSquncr) Date: Fri, 13 Mar 1998 19:20:10 -0800 (PST) Subject: taocp v3 p32 Message-ID: In a message dated 98-03-13 21:49:06 EST, billp at nmol.com writes: << Subj: taocp v3 p32 Date: 98-03-13 21:49:06 EST From: billp at nmol.com (bill payne) Sender: owner-cypherpunks at toad.com To: taocp at cs.stanford.edu, lawya at lucs-01.novell.leeds.ac.uk, merata at pearl.sums.ac.ir, wir at monkey-boy.com, cypherpunks at toad.com, ukcrypto at maillist.ox.ac.uk, cyberia-l at listserv.aol.com CC: merata at pearl.sums.c.ir, lawya at lucs-01.novell.leeds.ac.uk, sjmz at hplb.hpl.hp.com, wmadsen at explorerer.csc.com File: taocpv3p.mim (29360 bytes) DL Time (28800 bps): < 1 minute This message is a multi-part MIME message and will be saved with the default filename taocpv3p.mim -------------------- Subject: Swiss radio international tape Date: Fri, 13 Mar 1998 17:45:06 -0700 From: bill payne To: taocp at cs.stanford.edu Knuth Hope you got a copy of the tape. I wonder or not whether you knew that NSA ACTIVELY tried to suppress knowledge and research on shift register sequences. And Forth too. Looks like possibly a BAD SCENE ahead. Best, allahu akbar, etc. bill ----------------------- Headers -------------------------------- Return-Path: Received: from relay31.mx.aol.com (relay31.mail.aol.com [172.31.109.31]) by air16.mail.aol.com (v40.7) with SMTP; Fri, 13 Mar 1998 21:49:06 -0500 Received: from toad.com (toad.com [140.174.2.1]) by relay31.mx.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id VAA06784; Fri, 13 Mar 1998 21:48:59 -0500 (EST) Received: (from majordom at localhost) by toad.com (8.7.5/8.7.3) id SAA10873 for cypherpunks-unedited-outgoing; Fri, 13 Mar 1998 18:16:09 -0800 (PST) Received: from portal.dx.net (portal.dx.net [199.190.65.2]) by toad.com (8.7.5/8.7.3) with ESMTP id SAA10868 for ; Fri, 13 Mar 1998 18:16:02 -0800 (PST) Received: from nmol.com ([206.162.11.2]) by portal.dx.net (8.8.7/8.8.7) with SMTP id VAA24071 for ; Fri, 13 Mar 1998 21:17:24 -0500 (EST) X-ROUTED: Fri, 13 Mar 1998 19:21:06 -0500 X-TCP-IDENTITY: Billp Received: from billp [206.162.11.158] by nmol.com with smtp id BDAJDCFG ; Fri, 13 Mar 1998 19:09:52 -0500 Message-ID: <3509E567.2364 at nmol.com> Date: Fri, 13 Mar 1998 19:04:46 -0700 From: bill payne X-Mailer: Mozilla 3.03 (Win95; I) MIME-Version: 1.0 To: taocp at cs.stanford.edu, lawya at lucs-01.novell.leeds.ac.uk, merata at pearl.sums.ac.ir, wir at monkey-boy.com, cypherpunks at toad.com, ukcrypto at maillist.ox.ac.uk, cyberia-l at listserv.aol.com CC: merata at pearl.sums.c.ir, lawya at lucs-01.novell.leeds.ac.uk, sjmz at hplb.hpl.hp.com, wmadsen at explorerer.csc.com Subject: taocp v3 p32 Content-Type: multipart/mixed; boundary="------------66B76F3BBA4" Sender: owner-cypherpunks at toad.com Precedence: bulk >> Unsubscribe me from this list. Stan From y0                                   at aol.com Sat Mar 14 08:04:47 1998 From: y0                                   at aol.com (y0                                   at aol.com) Date: Sat, 14 Mar 1998 08:04:47 -0800 (PST) Subject:   Message-ID: <199803141603.KAA30350@marki.compu.net>

- Click -


Click here!!
From jo.dfr.567a at msn.com Sat Mar 14 08:55:23 1998 From: jo.dfr.567a at msn.com (jo.dfr.567a at msn.com) Date: Sat, 14 Mar 1998 08:55:23 -0800 (PST) Subject: 68 Million Email Addresses - $99 Message-ID: <> 68 MILLION EMAIL ADDRESSES FOR ONLY $99 You want to make some money? I can put you in touch with over 60 million people at virtualy no cost. Can you make one cent from each of theses names? If you can you have a profit of over $600,000.00 This offer is not for everyone. If you can not see the just how excellent the risk / reward ratio in this offer is then there is nothing I can do for you. To make money you must stop dreaming and TAKE ACTION. **************************************** PACKAGE A 68,000,000 email addresses on CD These name are all in text files ready to mail!!! $99.00 **************************************** PACKAGE B 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. $ 139.00 **************************************** PACKAGE C THE WORKS 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. AND Over 500 diferent Business Reports now being sold on the internet for up to $100 each. You get full rights to resell these reports. With this package you get the email addresses, the software to mail them AND ready to sell information products. AND ...... . a collection of the 100 best money making adds currently floating around on the internet. $ 189 **************************************** SEVERAL WAYS TO ORDER !!! IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!! 1) WE ACCEPT: AMERICAN EXPRESS OR VISA <> MASTERCARD TYPE OF CARD AMX / VISA / MC??_______________ EXPIRATION DATE ___________________________ NAME ON CREDIT CARD________________________ CREDIT CARD #________________________________ BILLING ADDRESS ____________________________ CITY_________________________________________ STATE________________ZIP_____________________ PHONE INCLUDE AREA CODE___________________ EMAIL ADDRESS______________________________ WE WILL BILL selected amount to your account plus the following shipping costs SHIPPING COST OF 3.85 FIRST CLASS MAIL SHIPPING COST OF 15.00 24 HOUR EXPRESS MAIL / FEDERAL EXPRESS SALES TAX (7.25%) added to CA residents >>> Send correct amount in cash, check or money order to: >>> ELECTRIC EMAIL >>> 702 Mangrove Avenue, Suite 151 >>> Chico, CA 95926 2) Send the same above requested credit card information to above address. 3) Fax the same above credit card information to 530-895- 8470 4) Call phone # 530-876-4291. This is a 24 hour phone number to place a CREDIT CARD order. 5) FAX A COPY of your signed check to 530-895-8470. This is an EXCELLENT way to order without a credit card! Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider. Copyright 1998 All rights reserved Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. Amendment I, The US Constitution :-) From jo.dfr.567a at msn.com Sat Mar 14 08:55:23 1998 From: jo.dfr.567a at msn.com (jo.dfr.567a at msn.com) Date: Sat, 14 Mar 1998 08:55:23 -0800 (PST) Subject: 68 Million Email Addresses - $99 Message-ID: <> 68 MILLION EMAIL ADDRESSES FOR ONLY $99 You want to make some money? I can put you in touch with over 60 million people at virtualy no cost. Can you make one cent from each of theses names? If you can you have a profit of over $600,000.00 This offer is not for everyone. If you can not see the just how excellent the risk / reward ratio in this offer is then there is nothing I can do for you. To make money you must stop dreaming and TAKE ACTION. **************************************** PACKAGE A 68,000,000 email addresses on CD These name are all in text files ready to mail!!! $99.00 **************************************** PACKAGE B 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. $ 139.00 **************************************** PACKAGE C THE WORKS 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. AND Over 500 diferent Business Reports now being sold on the internet for up to $100 each. You get full rights to resell these reports. With this package you get the email addresses, the software to mail them AND ready to sell information products. AND ...... . a collection of the 100 best money making adds currently floating around on the internet. $ 189 **************************************** SEVERAL WAYS TO ORDER !!! IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!! 1) WE ACCEPT: AMERICAN EXPRESS OR VISA <> MASTERCARD TYPE OF CARD AMX / VISA / MC??_______________ EXPIRATION DATE ___________________________ NAME ON CREDIT CARD________________________ CREDIT CARD #________________________________ BILLING ADDRESS ____________________________ CITY_________________________________________ STATE________________ZIP_____________________ PHONE INCLUDE AREA CODE___________________ EMAIL ADDRESS______________________________ WE WILL BILL selected amount to your account plus the following shipping costs SHIPPING COST OF 3.85 FIRST CLASS MAIL SHIPPING COST OF 15.00 24 HOUR EXPRESS MAIL / FEDERAL EXPRESS SALES TAX (7.25%) added to CA residents >>> Send correct amount in cash, check or money order to: >>> ELECTRIC EMAIL >>> 702 Mangrove Avenue, Suite 151 >>> Chico, CA 95926 2) Send the same above requested credit card information to above address. 3) Fax the same above credit card information to 530-895- 8470 4) Call phone # 530-876-4291. This is a 24 hour phone number to place a CREDIT CARD order. 5) FAX A COPY of your signed check to 530-895-8470. This is an EXCELLENT way to order without a credit card! Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider. Copyright 1998 All rights reserved Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. Amendment I, The US Constitution :-) From potnoodle at fastnet.co.uk Sat Mar 14 09:40:22 1998 From: potnoodle at fastnet.co.uk (simon) Date: Sat, 14 Mar 1998 09:40:22 -0800 (PST) Subject: ANSWERS Message-ID: <199803141738.RAA22094@ns0.fast.net.uk> have you got a hacker and if you have would you mind if you could send over to me? WE ARE DESIGNING A HACKING SYSTEM FOR WORLD WIDE USE AND WONDERED IF YOU COULD HELP IN THE DESIGNING OF IT IF SO PLEASE SEND AN E-MAIL TO US AND WE WILL SEND YOU SOME VALUABLE OTHER HACKING SOFTWARE From cutey-jared at mailcity.com Sat Mar 14 10:37:22 1998 From: cutey-jared at mailcity.com (Jared) Date: Sat, 14 Mar 1998 10:37:22 -0800 (PST) Subject: New Website is up!! Message-ID: New Web page up at HTTP://WWW.INSTANTWEB.COM/~SALEM/ CHECK IT OUT!! THANKS!! -CypherPunks Get your FREE, private e-mail account at http://www.mailcity.com From jya at pipeline.com Sat Mar 14 15:50:49 1998 From: jya at pipeline.com (John Young) Date: Sat, 14 Mar 1998 15:50:49 -0800 (PST) Subject: time to export RSA and demand to be prosecuted? (Re: Cypherpunks Crypto_Legal Assistance Fund) Message-ID: <1.5.4.32.19980314235201.00690500@pop.pipeline.com> Declan wrote: >If anyone chooses to try this act of civil disobedience, let me know and >I'll write about it. But be warned: the Department of Commerce has >approximately 60 special agents who enforce violations of export rules. >These are federal police officers, stationed in field office around the >U.S., with badges and arrest power, trained at FLETC in Georgia. They don't >have a sense of humor about these things. Well, yes, that's what BXA flaunts, but I wonder if the encryption regs are a high priority compared to the cases which are actually pursued which deal with truly threatening technology that every congressperson loves to fearfully hate. Yapping Chihuahua crypto is not up there yet, I suspect. True, there's a batch of agents being trained to work specifically on encryption, and with the total of crypto exports now exceeding $half a billion, it may be cost and politically effective to set an example by pounding one or two neo-crypto-Zimmermanns, especially as the year's hearings rumble, troll and slumber. Still, Adam's signature RSA-taunt has been on our Web site for months, terminating each of his exemplary stream of messages on low perfidy in high places, to no effect on BXA's eagle eyeball. Adam's 3-liner was also once part of Peter Junger's legal filings (DoJ downloaded the evidence) until we were ordered to excise the tiny terrible Perl so that Peter's noble bite of the hand of god would be clearly his stiletto fangs and not confused with Sir Adam Bulldog's ass ripper. Now, Declan, what would a crypto-miscreant need to do to actually get BXA's fierce kennel of crypto bloodhounds' attention, to make it truly worth everybody's headline read, money, politics, talents and teeth? By Tuesday, when Cindy Cohn sticks her head in the beast's mouth. From StanSquncr at aol.com Sat Mar 14 17:29:51 1998 From: StanSquncr at aol.com (StanSquncr) Date: Sat, 14 Mar 1998 17:29:51 -0800 (PST) Subject: Remove me. Message-ID: Declan wrote: >If anyone chooses to try this act of civil disobedience, let me know and >I'll write about it. But be warned: the Department of Commerce has >approximately 60 special agents who enforce violations of export rules. >These are federal police officers, stationed in field office around the >U.S., with badges and arrest power, trained at FLETC in Georgia. They don't >have a sense of humor about these things. Well, yes, that's what BXA flaunts, but I wonder if the encryption regs are a high priority compared to the cases which are actually pursued which deal with truly threatening technology that every congressperson loves to fearfully hate. Yapping Chihuahua crypto is not up there yet, I suspect. True, there's a batch of agents being trained to work specifically on encryption, and with the total of crypto exports now exceeding $half a billion, it may be cost and politically effective to set an example by pounding one or two neo-crypto-Zimmermanns, especially as the year's hearings rumble, troll and slumber. Still, Adam's signature RSA-taunt has been on our Web site for months, terminating each of his exemplary stream of messages on low perfidy in high places, to no effect on BXA's eagle eyeball. Adam's 3-liner was also once part of Peter Junger's legal filings (DoJ downloaded the evidence) until we were ordered to excise the tiny terrible Perl so that Peter's noble bite of the hand of god would be clearly his stiletto fangs and not confused with Sir Adam Bulldog's ass ripper. Now, Declan, what would a crypto-miscreant need to do to actually get BXA's fierce kennel of crypto bloodhounds' attention, to make it truly worth everybody's headline read, money, politics, talents and teeth? By Tuesday, when Cindy Cohn sticks her head in the beast's mouth. From ualdv8 at sk.sympatico.ca Sat Mar 14 17:33:20 1998 From: ualdv8 at sk.sympatico.ca (Six) Date: Sat, 14 Mar 1998 17:33:20 -0800 (PST) Subject: In Your EAR... Message-ID: <350B306B.1B7C@sk.sympatico.ca> In Your EAR, Shit-For-Brains ---------------------------- In continuation of a tradition begun on Dec. 7, 2041 A.D. EARMonger InterpretPrizes would like to extend an invitation to those who wish to participate in a clear violation of the U.S. EAR regulations of your current time period. The StarShip CowBoy, descended from the lineage of the Author, would be more than happy to ensure that your violation of EAR regulations extends not only across the physical and political geographically-based space continuum, but also across a range of the time continuum which begins before EAR was an unborn seed in the mind of The RAT, continues throughout its journey from the mind, through the digestive system, its physical manifestation as droppings from The RAT, its further evolution through the reproductive systems of various insects and vermin, right up to the time that The RatFucker returned it to its rightful place, placing it back in the mind of The Rat, as a seed placed in The Rat's EAR. "The more things change, the more they remain insane..." ~ The Author To participate, one only need to send the following: print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 To: ravage at ssz.com CC: cypherpunks at cyberpass.net, frissell at panix.com Jim Choate writes: > Perhaps it's time, in regards testing crypto law, to do exactly what > Tim May proposes - premeditated actions intended to force either a > clear refusal to prosecute on the part of the government or else a > clear abstinance on their part to prosecute. > > It's obvious that no individual has the legal where withal who is > also willing to do this. Some of the people on the list are lawyers, perhaps they could do it and represent themselves, or represent others. Duncan Frissell has some opinions on this I think. If I recall his previous statements on this topic have included that Phil Zimmermann ought to hire a troupe of dancing elephants to make a noise and force the Feds to prosecute. (Duncan considered the Feds would loose). On a practical matter of what to export... may I suggest exporting this: print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 To: Adam Back CC: cypherpunks at cyberpass.net References: 1 , 2 At 21:27 +0000 3/14/98, Adam Back wrote: >Peter Junger got an official decision from the US commerce department >that this was not exportable under the EAR regulations. > >Do we have a volunteer? If anyone chooses to try this act of civil disobedience, let me know and I'll write about it. But be warned: the Department of Commerce has approximately 60 special agents who enforce violations of export rules. These are federal police officers, stationed in field office around the U.S., with badges and arrest power, trained at FLETC in Georgia. They don't have a sense of humor about these things. -Declan FLETC / Georgia Department of Commerce From StanSquncr at aol.com Sat Mar 14 18:18:37 1998 From: StanSquncr at aol.com (StanSquncr) Date: Sat, 14 Mar 1998 18:18:37 -0800 (PST) Subject: A little Paranoid, PUNKS? Message-ID: <758c3e85.350b3a58@aol.com> In a message dated 98-03-14 21:03:56 EST, ualdv8 at sk.sympatico.ca writes: << -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGP for Business Security 5.5 mQENAzZsmI4AAAEIANHHMhV7V8WqPO6RjjfhZbeY/e6hsjAjKckU7YAYPhHiJfqG xw5+PgVjRPhIpXEE8ksmzZBzyH5KLW5GKFJZoD6YvVUSuzm+Gpxv+G78sBDBljUt BUoaB0XM4HSjEuqZtRtva+l+MAr3tFrK8FSdCsSgjQa8oOT5yFE76hgOGOkXGDKC HAISINKdduNsp4PU6HiNoKMdYpCCvK5u08lQFcByare2yaYmawYLmCzheCWLv9F/ kvnFtXCjup/pQNcOVeb/FkDx42l4vMwiWTH+AvrsjsV1njUIi9DTmcmD4doPlzBS qgbvQiTa16T2E4wJlnmATuW3QdwuBbdT2FSgj3MABRG0F0Vhck1vbmdlciA8ZW1A ZGV2Lm51bGw+iQEVAwUQNmyYjgW3U9hUoI9zAQHjNgf+KIDuWoBvfUj4H1twHvYU +IeDWIApLDnHkR7tsalLi9jY345iAolt3a/CiYxXPtjy9yedSaKoPasuvQk2cZ6e LZZwgEfDYj1GvjLC9D1rSItLLl6aDqYfhN2D2wgnB4mJssx1NP9zLQRf8aJkbDnl BMy3kfTr6ANmwe1hRGFWiuLkhnEtKzc9TFxBtx+4bx66rBBTzSUBfynH35bCLHLw hVzWGc5A0F18LG2WRLbGa/LcEXjp35jHyrJV73t2gUwVjH5qGa0B5O0dpvK9yDR9 wutFrmuhRgfqHO5Tclp470dkQFJv6HHMrSYyjRFFtyC9A+5Fvd1WkW7oLRAUxZmm HQ== =wU9D -----END PGP PUBLIC KEY BLOCK----- -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGP for Business Security 5.5 mQGiBDSLZQsRBADXuA1EJfGhAFVBUP7O6RsBa3EwKKjS19cQlg83nXoo1Pueh4p0 DhD5Mi2V/y4LpWRSRTBpsi54tnC/KQOjze2e6lKS/ERD8R+0umbnqQEiuBamskx/ SsiEWkhHSY2JPxkffPs4IBxCt9IKjCT//iIRIstbwfS0XHkH1s9euuueRwCg/zxp 7ON8OfcMyWWgk/2E2BGC+mUD/RMq7ijYM10gUCn/F5kTZHrDGs9899XTTE1OBd7n FdLesISWPPjyroMTKaa8D6gW6zMpyuA5UMxPVNwoTUzM+N4qh7dzgOL3Zf4WgZoh 6dcdCuZ+fu5Sjni3BgWqnxWweC1+yDcXwp8WD/OcXkGshWr5pdAX2b8tzNw5tHMh dx4RBACEq9R81h8/s0oDuwaRXfyIWLyInGy+QyTdG+UbojFXR3cBMJFy8AVhRXd/ Jqn4JLRSegEZlSaYhjkS8LYrIj2Hxf4Bc/KaAzgl5DYeDsOcRcx6AXAneIr34KAq VNL9H+HyphRbkbWpiBgFT4lDcjbDGZ5pVYEG1gzRG6SmnP4XkbQXRWFyTW9uZ2Vy IDxlbUBkZXYubnVsbD6JAEsEEBECAAsFAjSLZQsECwMBAgAKCRAkfjoNeUg+6vco AKCf9cP91P4G+qSgOTV06ttt13TTPQCcCpNhZ0gpvUeQp/tJ963CH+8oJce5Ag0E NItlCxAIAPZCV7cIfwgXcqK61qlC8wXo+VMROU+28W65Szgg2gGnVqMU6Y9AVfPQ B8bLQ6mUrfdMZIZJ+AyDvWXpF9Sh01D49Vlf3HZSTz09jdvOmeFXklnN/biudE/F /Ha8g8VHMGHOfMlm/xX5u/2RXscBqtNbno2gpXI61Brwv0YAWCvl9Ij9WE5J280g tJ3kkQc2azNsOA1FHQ98iLMcfFstjvbzySPAQ/ClWxiNjrtVjLhdONM0/XwXV0Oj HRhs3jMhLLUq/zzhsSlAGBGNfISnCnLWhsQDGcgHKXrKlQzZlp+r0ApQmwJG0wg9 ZqRdQZ+cfL2JSyIZJrqrol7DVekyCzsAAgIIAL0fd6dD7q1m9wDlyMXczadMUJIi N6utCxDkxknURZhiGSBiRRDC1+5gvg1T896UijVN1gGviZs3PHAkwVnbZwM2I6cn 2hSF8MnJMDjI5pxPGCX/ABcUPUUSXOtWOWR/pMpbj4NvV6UClwVtMNK8s1E9B6+u 0is1FHjzQC0jxSbvpHJKuX2iQjkvtO+0BdkxCe7JO3ID5h4bb8W8Tdw4hjsQVeBm b+M8bDqKOxsBMqHp2ydvx/x1qEHhrCxMDPPRSfPHj1MJSTQB1T2Nt0/7yL6D14m6 h1mF3vV3ajsfKEDCRU0pyy7meqkXPABYrnFLLnHUCmtZatOK7q6IBDpPlD+JAEYE GBECAAYFAjSLZQsACgkQJH46DXlIPuopoACfSBsIgXRfMGJ9Tbuj03vHhEj8hRcA nj19dKu1fTDXtbSAJ7sEK+NeRE/t =uqgm -----END PGP PUBLIC KEY BLOCK----- >> From tm at dev.null Sat Mar 14 18:22:48 1998 From: tm at dev.null (TruthMonger) Date: Sat, 14 Mar 1998 18:22:48 -0800 (PST) Subject: time to export RSA and demand to be prosecuted? (Re:Cypherpunks Crypto_Legal Assistance Fund) In-Reply-To: <1.5.4.32.19980314235201.00690500@pop.pipeline.com> Message-ID: <350B53E8.B54@dev.null> John Young wrote: > Now, Declan, what would a crypto-miscreant need to do to actually get > BXA's fierce kennel of crypto bloodhounds' attention, to make it truly > worth everybody's headline read, money, politics, talents and teeth? What we are talking about, in terms of 3-lines of legally unexportable code, is 'Dick Wars'. If one were to make certain that a wide range of members of Congress, Senators, BXA and Department of Commerce officials, etc., were to receive an email with a Subject: "I'm Pissing In Your EAR" and a message body providing details of their crypto-miscreantizing, then the inappropriate authorities would be hard-pressed to ignore the stream (pardon the pun) of ridicule that would result in their tyrannical, unconstitutional bluff being called. Richard Monger Nuclear Pississist and Master Baiter From nobody at REPLAY.COM Sat Mar 14 19:38:57 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 14 Mar 1998 19:38:57 -0800 (PST) Subject: A little Paranoid, PUNKS? Message-ID: <199803150338.EAA10482@basement.replay.com> StanSquncr wrote: > Subject: A little Paranoid, PUNKS? Dimitri? Is that you, Dimitri? From nobody at REPLAY.COM Sat Mar 14 19:39:34 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 14 Mar 1998 19:39:34 -0800 (PST) Subject: (no subject) Message-ID: <199803150339.EAA10507@basement.replay.com> Information Security wrote: > > > Guy -- > > > First you and Vulis flame each others, and then > > > you start claiming that VZNuri's postings are really Vulis, > > > and now you're claiming that postings from Toto's machines > > > are really Vulis. Perhaps *you're* really Vulis? > > > > Bill Frantz is *really* Vulis. > > Bill Stewart is *really* Toto. > > What are you trying to say? > > A point in every direction is like a point in no direction at all? Sometime ago there was a post to the list which made more sense than all of the other finger-pointing posts, combined, which have proclaimed this-or-that entity to be a tentacle/testicle of one or another of the list members. The post was by someone claiming to be the "only" real member of the cypherpunks list. It told how he had, being a lonely loser whom no one would communicate with, started the cypherpunks mailing list and posted to it under several personas, hoping to generate interest and have other people join the list. It seems that his efforts began to escalate and take on a life of their own, and he eventually had developed all of the personas that currently existed on the list, and that no one else had ever actually joined the list, at all. "In reality, we talk only to ourselves, but sometimes we talk loud enough that others may hear us." Kahil Gibran, The Prophet 2-2 From nobody at REPLAY.COM Sat Mar 14 19:55:30 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 14 Mar 1998 19:55:30 -0800 (PST) Subject: In Your EAR... Message-ID: <199803150355.EAA12419@basement.replay.com> Other possible destinations can be found at: http://cgibin.erols.com/ivsw/presspg1.htm StarShip CowBoy wrote: > Suggestions for final destinations for your illegal and > prosecutable communication: > ~To yourself, at both U.S. and foreign email server sites. > ~To your immediate family members at U.S. and foreign email > server sites. > ~To foreign embassies of U.S. allies. > ~To foreign embassies of U.S. enemies. > ~To U.S. embassies in foreign countries. > ~To foreign government email addresses, with instructions > for delivery to individuals presently incarcerated for > terrorist crimes. > ~To anywhere you damn well please... From nobody at REPLAY.COM Sat Mar 14 19:58:16 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 14 Mar 1998 19:58:16 -0800 (PST) Subject: In Your EAR... Message-ID: <199803150358.EAA12782@basement.replay.com> Six wrote: > > Suggestions for final destinations for your illegal and > prosecutable communication: Full list at: http://www.bxa.doc.gov/Text/1_denial.txt U.S. DEPARTMENT OF COMMERCE BUREAU OF EXPORT ADMINISTRATION Table of Denial Orders Currently in Effect (Revised March 6, 1998) TABLE OF DENIAL ORDERS CURRENTLY IN EFFECT (a) Contents This table lists orders that currently deny export privileges in whole or in part. Orders are published in full in the Federal Register as cited in the column entitled, "Federal Register Citation." (2) Publication of orders. New or amended denial orders are published in the Federal Register as they are issued, and their issuance announced in Export Administration Bulletins. Although diligent efforts have been made to ensure the accuracy of the information in this table, the Federal Register is the authoritative source for denial orders. (3) Table: This table is updated as new orders are promulgated and existing orders expire. The table does not appear in the Code of Federal Regulations. Paper copies of this table are available from: Office of Export Services P.O. Box 273 Washington, D.C. 20044 (b) Effect of Denial Orders Section 787.12 of the Export Administration Regulations (15 CFR 787.12) makes it unlawful, without prior specific authorization from Export Administration, for any person to: (1) Apply for, obtain, or use any license, Shipper's Export Declaration, bill of lading, or other export control document relating to an export or reexport of commodities or technical data by, to, or for another person then subject to an order revoking or denying his export privileges or then excluded from practice before the Bureau of Export Administration, or (2) Order, buy, receive, use, sell, deliver, store, dispose of, forward, transport, finance, or otherwise service or participate; (i) in any transaction which may involve any commodity or technical data exported or to be exported from the United States. (ii) in any reexport thereof, or (iii) in any other transaction which is subject to the Export Administration Regulations, if the person denied export privileges may obtain any benefit from or have any interest in, directly or indirectly, any of these transactions. (3) A denial order applies not only to the persons or firms named in the order, but may also, after notice and opportunity for comment, be made applicable to other persons with whom the respondent(s) may then or thereafter be related by ownership, control, position of responsibility, affiliation, or other connection in the conduct of trade or related services. (See Section 788.3(b) of the Export Administration Regulations (15 CRF 788.3(b))). (4) Some denial orders have different restrictions than those noted above. Summaries of the export privileges that each order denies are printed in the column headed "Export Privileges Affected". The exact scope of the denial is set forth in the applicable Federal Register Notice(s). If you have questions about the scope of a particular denial order, you may contact the Office of Enforcement Support, U.S. Department of Commerce, Room 4065, 14th Street and Constitution Ave., N.W., Washington, D.C. 20230, Telephone (202) 482 4255, Fax (202) 482-0971. Federal Name and Address Effective Expiration Export Privileges Register Date Date Affected Citation Abelairas, 6/5/95 6/5/05 General 60 F.R. 31140 Amancio J. and validated a.k.a. Gonzalez, licenses, all Jesus commodities, 6486 S.W. 9th any destination, Miami, Florida also exports 33144 to Canada and d.b.a Estrella Del Caribe Import and Export Inc., 5529 S.W. 9th Street Miami, Florida 33144 Ace, Ian 8/8/97 8/8/17 Standard 62 F.R. 43503 8/14/97 with addresses at 4 Mimosa Way Pinelands South Africa A. Rosenthal (PTY) Ltd. P.O. Box 3721 13 Loop Street Cape Town South Africa and A. Rosenthal (PTY) Ltd. P.O. Box 44198 65 7th Street Denmyr Building 2104 Linden South Africa ADT Analog and 9/10/81 Indefinite General 46 F.R. 46154 Digital Technik, and validated 9/17/81 8019 Niederseeon, licenses, all 46 F.R. 19290 House 21, commodities, 3/30/81 Federal Republic any destination, of Germany also exports to Canada. See: Bruchausen, Werner J. Aeriotechnics 4/11/83 5/31/01 General 47 F.R. 18403 (Pte) Ltd. and validated 4/29/82 and Claypro licenses, all 48 F.R. 16527 (Pte) Ltd. commodities, 4/18/83 Suite 606, any destination, 6th Floor also exports Colombo Court to Canada. and 4E See: Kwik, Richard Dayson Road Singapore Agnese, Andree 7/11/85 Indefinite General 50 F.R. 29244 22 Rue du and validated 7/18/85 11 November 1918 licenses, all Pantin commodities, France any destination, also exports to Canada. See: Agnese, Rodolphe Agnese, Helene 7/11/85 Indefinite General 50 F.R. 29245 37 Rue de and validated 7/18/85 la Quintinie licenses, all Paris 75015 commodities, France any destination, also exports to Canada. See: Agnese, Rodolphe Agnese, Rodolphe 3/15/90 3/15/00 General 55 F.R. 10641 individually and and validated 3/22/90 d/b/a Development licenses, all Engineering commodities, and Electronics any destination, 37 Rue de also exports la Quintinie to Canada. 75010 Paris France Agnese, Saba 7/11/85 Indefinite General 50 F.R. 29244 a/k/a Saba Ambaye and validated 7/18/85 37 Rue de licenses, all la Quintinie commodities, Paris 75015 any destination, France also exports to Canada. See: Agnese, Rodolphe Alex Goh 9/10/93 9/10/13 See: Goh, 58 F.R. 48821 Sian Lake 9/20/93 Ali Reza 11/9/93 7/26/99 General 58 F.R. 60842 Foyuzi Yousefi and validated 11/18/93 P.O. Box 1341 licenses, all and commodities, 38 Firouzkh any destination, Tajresh, also exports Tehran, Iran to Canada. Alkadi, Essam 2/20/98 2/20/01 Standard 63 F.R. 10188 P.O. Box 201 3/4/98 Dammam 31411 Saudi Arabia Al-Kadi. Essam 2/20/98 2/20/01 Standard 63 F.R. 10188 P.O. Box 201 3/4/98 Dammam 31411 Saudi Arabia Almori, Robert 10/8/87 Indefinite General 52 F.R. 38495 80-82 Rue and validated 10/16/87 Saint Dominique licenses, all Paris 7, France commodities, any destination, also exports to Canada. Ambaye, Saba 7/11/85 Indefinite General 50 F.R. 29244 a/k/a Saba Agnese and validated 7/18/85 37 Rue de licenses, all la Quintinie commodities, Paris 75015, any destination, France also exports to Canada. See: Agnese, Rodolphe American 4/23/90 4/23/05 See: Tai, 55 F.R. 18147 Semiconductor, Philip T.J. 5/1/90 Inc. Los Gatos, California American 6/26/95 6/26/05 General 60 F.R. 34504 Technology Trading and validated 7/3/95 Group licenses, all 44 Montgomery St. commodities, Suite 500 any destination, San Francisco, also exports California 94104 to Canada. Amiri, Reza 9/25/93 9/25/13 General 56 F.R. 58552 Panjtan and validated 11/20/91 and a/k/a licenses, all 57 F.R. 21057 Amiri, Ray commodities, 5/18/92 and individually any destination, 57 F.R. 24242 with an address also exports 6/8/92 and at: to Canada. 57 F.R. 57155 13165 12/3/92 and E. Essex Dr. 58 F.R. 31361 Cerritos, 6/2/93 and California 58 F.R. 51610 and d/b/a 10/4/93 Ray Amiri 60 F.R. 8221 Computer 2/13/95 Consultants now a/k/a CCC Inc. with addresses at: and Heinrichstrasse 9-11 D-6000 Frankfurt 1, Germany and c/o Pars Hafezeh Mirdamad Avenue, Mohsseni Square, Farnaz Street Tehran, Iran Annexfield, Ltd. 12/14/84 Indefinite General 49 F.R. 49666 152 Budbrooke Rd. and validated 12/21/84 Warwick, licenses, all United Kingdom commodities, any destination, also exports to Canada See: O'Hara, Daniel J. Appelberg 6/19/89 6/19/04 See: Appelberg, 54 F.R. 26816 Financial Lennart 6/26/89 Services Saltajobaden, Sweden Appelberg, 6/19/89 6/19/04 General 54 F.R. 26816 Lennart (Lennert) and validated 6/26/89 individually licenses, all and d/b/a commodities, Appelberg any destination, Financial also exports Services to Canada. Filip Manssonsvag 1, S-13300 Saltajobaden, Sweden Applied Systems 12/14/84 Indefinite General 49 F.R. 49666 Methods and validated 12/21/84 and Technology licenses, all (ASMAT) commodities, Rochford, Essex any destination, United Kingdom also exports to Canada. See: O'Hara, Daniel J. ATC Lab 12/5/89 12/5/99 See: Schmidt, 54 F.R. 51048 Electronic A.S.S. 12/12/89 Service, Segelflygsgatan 35, 122 52 Enskede, Sweden Attia, Ben H. 10/30/97 10/30/12 Standard aka Attia, Adnan 1614 Nine Island Boulevard Miami Beach, FL 33134 dba General Polyphase, Inc. 15 rue de Kamel Attaturk 1001 Tunis, Tunisia Avomair Ltd. 12/14/84 Indefinite General 49 F.R. 49666 a/k/a and validated 12/21/84 Microcircuit licenses, all Technology commodities, 3 Featherby Way any destination, Purdey's also exports Industrial to Canada. Estate See: O'Hara, Rochford, Daniel J. Essex, United Kingdom Barbarits, Bruno 5/3/88 5/3/08 General 53 F.R. 16441 individually and validated 5/9/88 and d/b/a licenses, all Cosmotrans AG commodities, a/k/a any destination, Cosmotrans Ltd. also exports P.O. Box 30978 to Canada Fracht West See: Wirth, Hans Building Office 274 CH 8058 Zurich, Switzerland and Cosmotrans USA, Inc. JFK International Airport Jamaica, New York Behrmann, 1/23/92 5/10/00 General 57 F.R. 3613 Symone Morris and validated 1/30/92 11 Goldfinch Ct., licenses, all #505 commodities, Toronto, Canada any destination, also exports to Canada. Belgium 3/5/91 3/5/01 See: Sanders, 56 F.R. 10537 Trading Marcel 3/13/91 Company Lokeren S.A. Sijpstratt 6 9101 Lokeren, Belgium Berg, H. Leonard 5/12/94 1/29/02 General 59 F.R. 27531 750 Kappock Street and validated 5/27/94 Apartment 103 licenses, all Bronx, New York commodities, and any destination, at the time the also exports order was issued to Canada incarcerated at: U.S. Bureau of Prisons Low Security Correctional Institution-Allenwood White Deer, Pennsylvania Beta Computer 6/13/95 6/13/05 General 60 F.R. 32300 Trading Pte. and validated 6/21/95 Limited licenses, all One Rockor Canal commodities, Road any destination, Sim Lin Square also exports # 06-67 to Canada Singapore, 0718 (See Waldemar, Znamierowski and Prandecki, Paul Bin Wu 9/7/93 9/7/03 See: Wu, Bin 59 F.R. 47302 Virginia Beach, 9/15/94 Virginia Bose, Sidhartha 6/16/95 6/16/05 General 60 F.R. 32940 a/k/a/ Dr. Bose and validated 6/26/95 individually and licenses, all d.b.a. commodities, Perfect Technologies, any destination, LTD. also exports 212 Golders to Canada Green Road London, NW11 9BY England and Ragunathan, Thirunavkkarasu individually and d.b.a. W.K. Agencies and as Computer Focus Services PTE. LTD. with an address at 18 Jalan Kechil, #06-22 Eastern Mansion Singapore 1543 Bose, Dr. 6/16/95 6/16/05 See Bose, Sidhartha 60 F.R. 32940 6/26/95 Brandstetter, Herbert 6/15/87 6/15/07 General 52 F.R. 23325 c/o Scan Trade and validated 6/19/87 Handelsgesellschaft licenses, all m.b.H. commodities, Wiednerhauptstrasse 135 any destination, A-1050 Vienna, also exports Austria to Canada. Brero, Mario 6/26/95 6/26/00 General 60 F.R. 34505 Apt. 87 and validated 7/3/95 Route de Bougy 1170 licenses, all Aubonne, Vaud commodities, Switzerland any destination, also exports to Canada. Brownhill, David 9/11/95 10/6/03 General 60 F.R. 48961 13 Robin Road and validated 9/21/95 Northcliff Ext. 12 licenses, all Johannesburg, South Africa commodities, any destination, also exports to Canada. Bruchhausen, 3/24/81 Indefinite General 46 F.R. 19290 Werner J. and validated 3/30/81 D8019 Niederseeon licenses, all Federal Republic commodities, of Germany any destination, also exports to Canada. Burger, Peter 3/25/93 3/25/13 General 58 F.R. 18368 individually and and validated 4/9/93 as agent for licenses, all Helling KG commodities, 54 Sylvesteralle any destination, 22000 also exports Hamburg 54, to Canada. Germany and Int'l. Business Connections 11 rue Aldringen 1-2960 Luxembourg, Luxembourg Butcher, Brian A. 3/21/86 3/21/06 General 51 F.R. 10418 a/k/a and validated 3/26/86 Brian A. licenses, all Moller-Butcher commodities, c/o Contel Equipment any destination, 5 Bear Court also exports Danshill East to Canada. Industrial Estate See: M.E.S. Basingstroke, Equipment, Inc. Hampshire England Caesar 12/19/90 12/19/05 General 55 F.R. 53016 Electronics, Inc. and validated 12/26/90 40C, Corbin Avenue licenses, all Bayshore, New York commodities, any destination, also exports to Canada CAE Services 5/29/91 5/29/11 General 56 F.R. 25654 Lowengasse 2A and validated 6/5/91 A-1030 Vienna, licenses, all Austria commodities, any destination, also exports to Canada. See: Kovar, Alexander Callaghan, 1/23/92 7/20/00 General 57 F.R. 3614 Maryanne E. and validated 1/30/92 39 Congress St. licenses, all Warwick, Rhode Island commodities, any destination, also exports to Canada. Carlson, Paul C. 3/5/85 3/5/00 General 50 F.R. 9699 P.O. Box 3125 and validated 3/11/85 Brockton, licenses, all 50 F.R. 18281 Massachusetts commodities, 4/30/85 and any destination, 87 Springhill Avenue also exports Bridgewater, to Canada. Massachusetts See: Contel Equipment CCC Inc. 9/25/93 9/25/13 See: Amiri, Reza 57 F.R. 57155 Frankfurt, Germany 12/3/92 and c/o Pars 58 F.R. 31361 Hafezeh 6/2/93 and Tehran, Iran 58 F.R. 51610 10/4/93 and 60 F.R. 8221 2/13/95 Chan, Anthony 12/6/84 Indefinite General 49 F.R. 48591 a/k/a and validated 12/13/84 Chan Sum-Tai Anthony licenses, all c/o Shuttle commodities, Long Co., Ltd. any destination, Ka Wah Bank also exports Center Building to Canada. 19th Floor See: Wysh Data 232 Des Voeux Road Systems, Ltd. Hong Kong Central Chan Sum-Tai Anthony 12/6/84 Indefinite See: Wysh Data 49 F.R. 48591 a/k/a Systems, Ltd. 12/13/84 Anthony Chan c/o Shuttle Long Co. Ltd. Ka Wah Bank Center Building 19th Floor 235 Des Voeux Road Hong Kong Central Chemco 8/7/89 8/26/98 See: Walaschek, 54 F.R. 8582 Seigburger Peter; 3/1/89 Strasse 223 Colimex; 54 F.R. 33253 5000 Cologne 21, Far-Trade 8/14/89 and Federal Republic Pharma- 56 F.R. 57875 of Germany Vertrieb 11/14/91 GmbH Chua Tok Peng 9/10/93 9/10/13 See: Tok Peng 58 F.R. 48821 Chua 9/20/93 From StanSquncr at aol.com Sat Mar 14 20:11:14 1998 From: StanSquncr at aol.com (StanSquncr) Date: Sat, 14 Mar 1998 20:11:14 -0800 (PST) Subject: (no subject) Message-ID: <49796d70.350b549b@aol.com> In a message dated 98-03-14 23:01:01 EST, nobody at REPLAY.COM writes: << Sometime ago there was a post to the list which made more sense than all of the other finger-pointing posts, combined, which have proclaimed this-or-that entity to be a tentacle/testicle of one or another of the list members. The post was by someone claiming to be the "only" real member of the cypherpunks list. >> Who was it, a "nobody?" :-) From StanSquncr at aol.com Sat Mar 14 20:24:29 1998 From: StanSquncr at aol.com (StanSquncr) Date: Sat, 14 Mar 1998 20:24:29 -0800 (PST) Subject: Read about a REAL "Punk!" Message-ID: <458a4c61.350b57d6@aol.com> Absolute Proof - Rush is a Liar! First let's define 'liar' (from pages 670-671 of 'Merriam Webster's Collegiate Dictionary, 10th Edition') "Liar - one that tells lies" That was easy, now it's a little more confusing, because of the number of definitions (4). The first two I will leave out, as they pertain to how you might 'lie' down, or where a golf ball may 'lie'. The 3rd is the verb, and is inapplicable. I will use the 4th definition, the noun. (4) "Lie (noun)- 1: a: an assertion of something known or believed by the speaker to be untrue with intent to deceive b: an untrue or inaccurate statement that may or may not be believed true by the speaker 2: something that misleads or deceives 3: a charge of lying" By combining the two definitions, (4:1:a) 'Liar - one that tells assertions of somethings known or believed by the speaker to be untrue with intent to deceive' (4:1:b) 'Liar - one that tells untrue or inaccurate statements that may or may not be believed true by the speaker' (4:2) 'Liar - one that tells somethings that mislead or deceive' (4:3) 'Liar - one that tells charges of lying' I think that regular readers will now concede that subsense (4:1:b) proves that his many 'errors' can be classified as lies, and (4:2) certainly fits Rush! But for the sake of proof, I will now document more than one lie, with complete disreguard as to whether Rush knew they were lies at the time he said them, to prove it by subsense (4:1:b). These examples from FAIR (Fairness & Accuracy In Reporting). Please e-mail FAIR (at fair-report at fair.org - it will be returned via e-mail) for the complete FAIR report on Rush Limbaugh, so you can see how Limbaugh responds to FAIR's reports of his lies (Limbaugh's so-called response (that he lauded so loudly (at the time)) is included also, as well as FAIR's counter-response). LIMBAUGH: On California contractor C.C. Myers completing repairs 74 days early on the earthquake-damaged Santa Monica Freeway: "There was one key element that made this happen. One key thing: The governor of California declared the [freeway] a disaster area and by so doing eliminated the need for competitive bids.... Government got the hell out of the way." (TV show, 4/13/94) "They gave this guy [Myers] the job without having to go through the rigmarole...of giving 25 percent of the job to a minority-owned business and 25 percent to a woman." (TV show, 4/15/94) REALITY: There was competitive bidding: Myers beat four other contractors for the job. Affirmative action rules applied: At least 40 percent of the subcontracts went to minority or women-owned firms. Far from getting out of the way, dozens of state employees were on the job 24 hours a day. Furthermore, the federal government picked up the tab for the whole job (L.A. Times, 5/1/94). LIMBAUGH: "There's no such thing as an implied contract." (Radio show, quoted in FRQ, Spring/93) REALITY: Every first year law student knows there is. LIMBAUGH: "Ladies and gentlemen, we now know why there is this institutional opposition to low tax rates in the liberal wing of the Democratic Party. It's because [low tax rates] are biblical in nature and in root. When you can trace the lowering of tax rates on grain from 90 percent to 20 percent giving seven fat years during the days of Pharaoh in Egypt, why then you are tracing the roots of lower taxes and rising prosperity to religion.... You can trace individual prosperity, economic growth back to the Bible, the Old Testament. Isn't it amazing?" (Radio show, 6/28/93) REALITY: Amazingly wrong. Genesis 41 is about the wisdom of INSTITUTING taxes, not cutting them. After Pharaoh had a dream that prophesied seven fat years to be followed by seven lean years, Joseph advised him to "appoint officers over the land, and take up the fifth part of the land of Egypt in the seven plenteous years...and lay up corn under the hands of Pharaoh." In other words, a 20 percent tax on the grain harvest would put aside food for use during the famine. Pharaoh took Joseph's advice, and Egypt avoided hunger during the famine. LIMBAUGH: "It has not been proven that nicotine is addictive, the same with cigarettes causing emphysema [and other diseases]." (Radio show, 4/29/94) REALITY: Nicotine's addictiveness has been reported in medical literature since the turn of the century. Surgeon General C. Everett Koop's 1988 report on nicotine addiction left no doubts on the subject; "Today the scientific base linking smoking to a number of chronic diseases is overwhelming, with a total of 50,000 studies from dozens of countries," states Encyclopedia Britannica's 1987 "Medical and Health Annual." LIMBAUGH: "Most Canadian physicians who are themselves in need of surgery, for example, scurry across the border to get it done right: the American way. They have found, through experience, that state medical care is too expensive..." (Told You So, p. 153) REALITY: "Mr. Limbaugh's claim simply isn't true," says Dr. Hugh Scully, chair of the Canadian Medical Association's Council on Healing & Finance. "The vast majority of Canadians, including physicians, receive their care here in Canada. Those few Canadians who receive health care in the U.S. most often do because they have winter homes in the States--like Arizona and Florida -- and have emergent health problems there." Medical care in Canada is hardly "too expensive"; it's provided free and covered by taxes. LIMBAUGH: "There are more American Indians alive today than there were when Columbus arrived or at any other time in history. Does this sound like a record of genocide?" (Told You So, p. 68) REALITY: According to Carl Shaw of the U.S. Bureau of Indian Affairs, estimates of the pre-Columbus population of what later became the United States range from 5 million to 15 million. Native populations in the late 19th century fell to 250,000, due in part to genocidal policies. Today the U.S.'s Native American population is about 2 million. LIMBAUGH: "Women were doing quite well in this country before feminism came along." (Radio show, quoted in FRQ, Summer/93) REALITY: Before feminism, women couldn't even vote. LIMBAUGH: "Anita Hill followed Clarence Thomas everywhere. Wherever he went, she wanted to be right by his side, she wanted to work with him, she wanted to continue to date him.... There were no other accusers who came forth after Anita Hill did and said, 'Yeah, Clarence Thomas, he harassed me, too.' There was none of that." (TV show, 5/4/94) REALITY: Hill could not have continued to date Thomas, since they never dated. Two other women, Sukari Hardnett and Angela Wright, came forth in the Thomas case with similar charges. LIMBAUGH: On Whitewater: "I don't think the New York Times has run a story on this yet. I mean, we haven't done a thorough search, but I--there has not been a big one, front-page story, about this one that we can recall. So this has yet to create or get up to its full speed--if it weren't for us and the Wall Street Journal and the American Spectator, this would be one of the biggest and most well kept secrets going on in American politics today." (TV show, 2/17/94) REALITY: The New York Times BROKE the Whitewater story on March 8, 1992, in a front-page story by Jeff Gerth that included much of the key information known today. The investigative article ran over 1700 words. LIMBAUGH: Quotes President James Madison: "We have staked the future...upon the capacity of each and all of us to govern ourselves, to control ourselves, to sustain ourselves according to the Ten Commandments of God." (Told You So, p. 73) REALITY: "We didn't find anything in our files remotely like the sentiment expressed in the extract you sent to us," David B. Mattern, the associate editor of The Madison Papers, told the Kansas City Star (1/16/94). "In addition, the idea is entirely inconsistent with everything we know about Madison's views on religion and government." LIMBAUGH: "And it was only 4,000 votes that--had they gone another way in Chicago--Richard Nixon would have been elected in 1960." (TV show, 4/28/94) REALITY: Kennedy won the 1960 election with 303 electoral votes to 219 for Nixon. Without Illinois' 27 electoral votes, Kennedy would still have won, 276-246. LIMBAUGH: On Iran-contra special prosecutor Lawrence Walsh: "This Walsh story basically is, we just spent seven years and $40 million looking for any criminal activity on the part of anybody in the Reagan administration, and guess what? We couldn't find any. These guys didn't do anything, but we wish they had so that we could nail them. So instead, we're just going to say, 'Gosh, these are rotten guys.' They have absolutely no evidence. There is not one indictment. There is not one charge." (TV show, 1/19/94) REALITY: Walsh won indictments against 14 people in connection with the Iran- contra scandal including leading Reagan administration officials like former Secretary of Defense Caspar Weinberger and former national security advisers Robert McFarlane and John Poindexter. Of the 14, 11 were convicted or pleaded guilty. (Two convictions were later overturned on technicalities--including that of occasional Limbaugh substitute Oliver North) LIMBAUGH: Explaining why the Democrats wanted to "sabotage" President Bush with the 1990 budget deal: "Now, here is my point. In 1990, George Bush was president and was enjoying a 90 percent plus approval rating on the strength of our victories in the Persian Gulf War and Cold War." (Told You So, p. 304) REALITY: In October 1990, when the budget deal was concluded the Gulf War had not yet been fought. LIMBAUGH: On the Gulf War: "Everybody in the world was aligned with the United States except who? The United States Congress." (TV show, 4/18/94) REALITY: Both houses of Congress voted to authorize the U.S. to use force against Iraq. LIMBAUGH: On Bosnia: "For the first time in military history, U.S. military personnel are not under the command of United States generals." (TV show, 4/18/94) REALITY: That's news to the Pentagon. "How far back do you want to go?" asked Commander Joe Gradisher, a Pentagon spokesperson. "Americans served under Lafayette in the Revolutionary war." Gradisher pointed out several famous foreign commanders of U.S. troops, including France's Marshall Foch, in overall command of U.S. troops in World War 1. In World War 2, Britain's General Montgomery led U.S. troops in Europe and North Africa, while another British General, Lord Mountbatten, commanded the China-Burma-India theatre. LIMBAUGH: Limbaugh frequently denies that he uses his show for political activism: "I have yet to encourage you people or urge you to call anybody. I don't do it. They think I'm the one doing it. That's fine. You don't need to be told when to call. They think you are a bunch of lemmings out there." (Radio show, 6/28/93) REALITY: Just an hour after making the above claim, he was--as usual--sending his troops to the trenches: "The people in the states where these Democratic senators are up for reelection in '94 have to let their feelings be known.... These senators, you let them know. I think Wisconsin's one state. Let's say Herb Kohl is up in '94. You people in Wisconsin who don't like this bill, who don't like the tax increases, you let Herb Kohl know somehow." And in summation, Rush is a liar (proven by (4:1:b), 'Merriam Webster's Collegiate Dictionary, 10th Edition", page 670-671)! Readers should judge on their own, whether you think this proves that Rush knew about these lies in advance and/or had an intent to deceive when he told these lies (as it's impossible to prove ones state of mind). I believe he did (on both accounts), so therefore I believe there's ample evidence to show Rush a liar by subsense 4:1:a, and 4:2 also! Readers should also judge whether they think that (many of) his lies are attempts at changing history. Stanley Rosenthal From StanSquncr at aol.com Sat Mar 14 22:21:29 1998 From: StanSquncr at aol.com (StanSquncr) Date: Sat, 14 Mar 1998 22:21:29 -0800 (PST) Subject: And ANOTHER REAL "Punk!" (or two) Message-ID: <169bc590.350b7340@aol.com> Subj: TAKE STOCK(man, Please!)! Date: 06/19/96 I start with Article 6, section 3 of the Constitution of the United States of America - "3 The Senators and Representatives before mentioned, and the members of the several State Legislatures, and all executive and judicial officers, both of the United States and of the several States, shall be bound by oath or affirmation, to support this Constitution; but no religious test shall ever be required as a qualification to any office or public trust under the United States." And now, from the *real* "liberal" media, the Houston Press, June - 13-19 - 1996 issue - -------------------------- (TOC description - Stalking Stockman - Truth was the first casualty when I visited Steve Stockman's combined home and political sweatshop. By Tim Fleck) {Quote - "We're not afraid of anything." - An unidentified whiny-voiced Stockmanite. Photos - a picture of the headline of an article in the Houston Chronicle of 6-7-96 - "CHARGES SOUGHT AGAINST REPORTER Trespassing Alleged At Stockman's House", a picture of Tim Fleck walking up to Stockman's house, caption - "Knock, knock, who's there? Fleck cautiously approaches the threshhold of the Stockman compound.", and a picture of a sign that says "God Bless You! Congressman Stockman") INTO THE DEN OF STOCKMANIA The Truth About My Alleged "Invasion" Of The Friendswood Congressman's One- Stop Political Sweatshop And Homestead By Tim Fleck For just a moment, it seemed as if there might be at least one good man laboring at Congressman Steve Stockman's political sweatshop-cum-residence when I dropped in last week for an unannounced visit. Several raps on the front door had summoned a lanky young African-American volunteer named Booker T. Stallworth. Despite being confronted by a stranger with a press I.D. card clipped to his shirt pocket and a bulky Sony tape recorder and microphone slung over his shoulder, Stallworth flashed an all-American smile and graciously motioned me in. Judging by the fallout generated by those two or three steps forward, I might just as well have landed on the front lawn of Stockman's Friendswood home in a black helicopter. Once inside, my rather limited tour of the Stockman compound lasted about two minutes before I was ordered out by an officious young Stockmanite who refused to identify himself and displayed a distinct aversion to cameras. No physical contact, shouting or foul language occurred during the brief encounter. Yet within two hours of my visit, Stockman's Capitol Hill office began spewing press releases at taxpayers' expense that accused me of trespassing and forcing my way into the congressman's residence and physically assaulting his campaign workers. "This is outrageous!" Stockman was quoted as huffing in one "updated" release (headlined "Stockman Stalked by Trespassing Reporter"). "I have called the Harris County Sheriff's Department, the Capitol Hill police and the [U.S. House] Sergeant-at-Arms' office. I am pressing charges for trespass and assault and battery." Stockman's office even suggested that I had terrorized the congressman's wife, Patti Bullock Stockman, assuring the world that she "was unharmed" after my visit. That insinuation was especially outlandish, given that I never laid eyes on Patti Stockman (who, incidentally, has a $58,000-a-year job at the Johnson Space Center that presumably would have required her presence on that weekday afternoon). Stockman himself hastily caught a plane back from D.C. "to address the emergency," according to his congressional flack Cory Birenbaum, and while in flight called a talk-radio station in Beaumont to beat the drums about the alleged home invasion. Birenbaum told another reporter that Stockman already had complained to Friendswood police, one of whom, the spokesman related, declared that he "would have shot the son of a bitch dead." But the chief of the Friendswood force told another local reporter that his department hadn't heard from Stockman. The Stockman press releases alerted area media outlets, whose reporters were soon sorting through the lies produced by the Stockman propaganda machine and writing their own stories about the incident. Birenbaum tried to peddle one whopper that I had crashed the Stockman-Newt Gingrich rally at a Galleria-area (StanNote! outside of Stockman's district) hotel last month by falsely claiming to be a reporter with the Associated Press. The only problem with that was that the A.P. reporter and I had both bantered with Birenbaum at the event, and clearly identified ourselves to him. I had received a press credential to the rally after displaying my Houston police press I.D., which bears the name *Houston Press* in large, hard-to-miss letters. The lies continued later, when volunteer Stallworth filed a complaint with the Harris County Sheriff's Department falsely claiming that I had pushed him and shouted and screamed during my visit. (The recording I made of the incident shows the conversation never broke a sonic sweat.) The sheriff's department punted the complaint to the district attorney's office, where Johnny Holmes' top assistant, Don Sticklin, was investigating at press time. In retrospect, Stallworth's dissembling probably explains what a seemingly nice guy like him was doing hanging with the Stockman gang. By inviting me into Stockman's political nest, though, Stallworth did prove that he hadn't absorbed a central tenet of the political consulting business. Photographer Nicole Fruge' and I drove to Friendswood to do some on-the-scene investigation of Political Won Stop, a business registered in Brazoria County that operates out of Stockman's residence and has received $126,000 in payments from the congressman's campaign since January. One of the listed principals of the firm, Chris Cupit, just happens to be the Republican nominee for tax assessor-collector of Jefferson County, a position that has been vacated by Democrat Nick Lampson, who is now running for Congress against Stockman. Cupit apparently has no official campaign office of his own in Jefferson County, raising questions about whether resources from his and Stockman's campaigns are being comingled in the rather cozy spaces of the Whitman Way residence. That would be a violation of federal election law. And *The Hill*, a D.C. based weekly that covers Congress and first reported on the Political Won Stop operation, has questioned whether Stockman's campaign keeps the appropriately legal "arms-length" distance from the consultants, whose phone number is the same as Stockman's and who presumably use the facilities available to others in the Stockman household. *Press* calls to the house and Cupit and partner Jason Posey (who had identified himself as a Stockman "volunteer" to *The Hill*) went unreturned, so the only option seemed to be an on-site inspection. After I followed Stallworth into the living room of the Stockman domicile, I met several volunteers who claimed Cupit was not there. But the 1995 Saturn that was reposing in Stockman's driveway at the time is registered to Cupit. The front of the intensely claustrophobic house, where windows might otherwise be found, is sealed by planking, and the only vista to the street is a pinhole in the worn wooden front door. It hardly seems a residence fitting for a U.S. congressman, even one whose employment history prior to his 1994 election was rather spotty. The living room, cluttered with campaign signs and literature, opens on the right into a garage office, where Political Won Stop apparently does its work. A hallway on the left presumably leads to some sort of sleeping quarters, where Patti may or may not have been crouching in fear while I was in the front room. Upon my entry, Stallworth summoned a dark-haired young man from the garage office, who proved far less friendly. "You'll have to leave," he announced in a rather whiny, nasal voice. (The following day, the *Press* called Chris Cupit at his home in Groves and discovered that he possess a whiny, nasal voice identical to that of the man who ordered me out of Stockman's residence. But perhaps everybody who works for Stevie whines. On the phone, Cupit flatly denied being present at Stockman's house during my visit. Before we could ask what his car was doing in Stockman's Driveway, Dupit said he had to go but promised to call us back shortly. He never did, of course.) At the Stockman compound, the Cupit sound-alike denied that Political Won Stop operated out of the house, but tried to change the subject when I reminded him that Stockman's own campaign finance filings list the company as based there. "I know, but we have rights, too, and you've got to honor our rights," he whined. He seemed especially terrified that photographer Fruge', who was just outside the front door with her camera, might get a shot of his face. He tried to close the front door, and another volunteer then slammed it shut and pressed his back against it, barring any exit. I asked the head whiner what he was so afraid of. "We're not afraid of anything," he insisted, rather unconvincingly. After being ordered once more to leave, I replied, Well, fine, open the door. And don't hide too much. You guys are pathetic." And with that, my alleged "invasion" of the congressman's castle was over. Minutes later, several young Stockman volunteers drove up, and I asked them to locate Chris Cupit for me. Once inside the house, they didn't come back out before Fruge' and I departed. Fruge' took a few more shots of Fort Stockman from the street while I went to interview neighbors. Birenbaum would later claim she took photos through the windows of the Stockman abode. The problem with that particular lie is that there are no windows accessible from the front yard to take photos through. A woman who lives next door to Stockman seemed surprised to learn that the bustling political office also housed a U.S. Congresseman and his wife. "No, I do not know him," said Hanan Zadeh, when asked if she had had the pleasure of meeting Steve Stockman. Zadeh - who, unlike the boys next door, did not hesitate to identify herself - seemed unperturbed by the continuous stream of people coursing in and out of Stockman's alleged residence. "We know this is just temporary for election time," she explained. "It's not a problem." But depending on how the money paid by Stockman to Political Won Stop is actually used, it could be a big problem for the Freshman Prince of Friendswood in the not-so-distant future. -------------- "We're not afraid of anything." They certainly aren't afraid of *god*! Stan ============ Subj: It's Cupit, Ma'am, Not Stupid! Date: 07/21/96 More from the "Liberal Media", from the 'Houston Press' June 20-26, 1996 these are pieces of - --------------------- The Insider - compiled by Tim Fleck TALES OF CUPIT (RHYMES WITH STUPID) The squirrelly adventures of Congressman Steve Stockman's frat-house band of consultants who call themselves Political Won Stop seem to know no limits. *The Hill*, a Congress-covering weekly in the nation's capital, first revealed that Stockman's re-election campaign had paid more than $126,000 to the consultancy, which is owned by 26-year-old Chris Cupit and 25-year old Jason Posey and is listed on the congressman's campaign disclosures as having the same Whitman Way address as stockman's combination home and election headquarters just outside Friendswood. More recently, *The Hill* reproted that the address Political Won Stop used on its DBA filing in Brazoria County is a rental beach house at Surfside. Always up for a summer jaunt to the Gulf, The Insider motored down to Surfside over the weekend to discover that the rent house, which is named the Hide-a-Way and sits just down the road from the Money Pit, was vacent. On our return, we talked to the owner of the Hide-a-Way, Houstonian Diane Hensley, who rented the house in the off-season to Cupit from last fall to early spring. Hensley, a Stockman supporter and unsuccessful legislative candidate this year, says she's known Cupit for two years and isn't surprised he listed the home as his place of business. The Hide-a-Way certainly is an appropriately named location for a business run by the secrecy-obsessed Cupit, the Stockman operative and GOP nominee for Jefferson County tax collector-assessor whom we encountered on our unannounced visit to Stockman's home/campaign office two weeks ago. Cupit refused to identify himself and hid his face when a *Press* photographer approached. It's apparently typical behavior from Cupit, judging by the account of an advertising sales type who tried to sell the Stockman campaign some bumper stickers two days before we ventured into the grip of Stockmania. The salesman says he contacted the Stockman headquarters "and got ahold of a man who wouldn't identify himself except by his first name, Chris." It took the salesman two weeks to get an appointment with the mysterious Chris, and only under circumstances that seem lifted from a spy novel. "He would not give me the address of his headquarters," recounts the salesman, "and he asked if I would meet him on the parking lot of the Burger King in Baybrook Mall." (Stockman's home/office is located in a subdivision behind the mall.) When the salesman finally rendezvoused with "Chris," the Stockman flunky again refused to give his last name but expressed interest in the batch of see-through, peel-off "Stockman for Congress" stickers the salesman had brought along to demonstrate. Chris refused to allow the salesman to put one of the stickers on his car and instead insisted they be handed over for future inspection, presumably by the congressman. At one point, Chris displayed a trace of envy by allowing that he wished he could afford the see-through numbers for his own campaign. The salesman is still chuckling over the encounter. "I'm in my early seventies, and I've done business in Houston for over 35 years. It's the first time I ever made a sales pitch on the parking lot of a Burger King!" (He was later shown a photo of Chris Cupit and positively identified the stealth candidate as the phantom of the Burger King.) Their meeting was two weeks ago, and now the salesman can't get through to Chris. "The guy who answers the phone, who's a nitwit, says, 'What is this regarding?' Then he says, 'I don't know if he's here.' I say, 'Come on, kid, you're in a house and you don't know who comes through the front door?' " Cupit also hasn't acquired much name identification in Beaumont, the seat of the county where he wants to be the head tax collector. When The Insider went on a Beaumont call-in show last week to debunk the false claims by Stockman that we had assaulted his campaign workers and terrorized his wife, the radio host, Jack Piper, was unfamiliar with Cupit and his candidacy. During Piper's show, we played an audio tape of our encounter with the Stockmanites at the congressman's home, wheich included our repeated question, "Is Chris Cupit here?" Afterward, a hard-of-hearing pro-Stockman caller rang up to chastise the liberal media for "calling people stupid." Why, she asked, did we have to call them stupid? Piper had to gently correct her: "It's Cupit, ma'am, not stupid." ========== Subj: Fleck Gets an 'E' (of the 'RWLTPC') (one whos job it is to destroy anyone or anything that goes against the 'RWLTPC') ! ----- >From the Houston Press, July 4-10 issue, Letters section - ----- The Stockman Welcome Mat Having read the latest in your series of articles and "exposes" on Congressman Steve Stockman, I have a few questions and observations for you: Do you expect Stockman or his staff to welcome you into his home with open arms when everything you've ever written about him has been decidedly negative? Your stories and the tone of your paper are antything but objective. You can't abide or report objectively on anything or anyone who is Republican, nor can you ever report anything unfavorable on a Democrat. You went to Stockman's place with your mind made up as to what you were going to write. You refer to all his staffers as whiny. To me, you are the ultimate whiner. Jerry King Houston ========== Subj: More 'Take Stock(man), PLEASE!' >From the Houston Chronicle, 7-21-96 - ------ STOCKMAN MOURNS DEATH OF 'SUPPORTER' Alan Bernstein, Politics U.S. Rep. Steve Stockman of Friendswood did not immediately try to put a self- serving political spin on last week's TWA jetliner tragedy. He waited almost two days. On Friday afternoon, reporters received a news release on Stockman's congressional stationery. It expresses the congressman's deep sorrow that Houston victim's rights advocate Pam Lychner was killed in the explosion and crash off Long Island. The document, an official communication from Stockman's publicly funded operation in Washington, D.C., was headlined "STOCKMAN SUPPORTER DIES IN TWA TRAGEDY/ VICTIMS' ADVOCATE MADE TV AD FOR STOCKMAN." With direct quotes from Stockman, the news release lauded Lychner for her criminal justice reform work. "Pam was a friend who will be dearly missed by my wife Patti and I," said Stockman's written words. "Pam Lychner did a campaign television ad for me in 1992. I got to know her and her story. She was a woman of uncommon courage and inner strength and that is how I will remember her." Stockman's top aide, Cory Birenbaum, said the news release was not a political exploitation of a grim event. "We are just trying to point things out that affect" the congressman, Birenbaum explained. "It's simply to regret the fact that a personal friend of his passed away." To say the least, written statements from Stockman and Birenbaum have been controversial lately. In June, another official news release from Stockman carried the headline "STOCKMAN STALKED BY TRESPASSING REPORTER." It told Stockman's version of a visit to his home and campaign headquarters in Friendswood by a reporter for the Houston Press, at a time when Stockman was in Washington. Stockman sought criminal charges against the reporter. The district attorney's office refused to file the charges. The reporter then filed a libel suit against Stockman. Birenbaum was the focus of national publicity recently for a private letter he wrote to a Texas Monthly reporter after the magazine ran an unflattering profile of Stockman. The letter said the writer got her magazine job "for reasons I would refuse to speculate upon in polite society. Hope your knees have healed up nicely." Birenbaum said he meant that the writer had to beg for employment, not that she performed a sex act. ... From nobody at REPLAY.COM Sat Mar 14 23:33:44 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 14 Mar 1998 23:33:44 -0800 (PST) Subject: get me off/ME TOO! Message-ID: <199803150655.HAA05046@basement.replay.com> Dumbass, if you didn't have the brain cells to understand what this list is about, don't play with your mommy's computer and e-mail account. Open a dos prompt and type "FDISK/U" and all your troubles will be over. (what a fucked up band name) [SNIP] >Me too. Take me off of your stinkin' list. > >Stan and the Sequencers > From nobody at REPLAY.COM Sun Mar 15 00:23:29 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 15 Mar 1998 00:23:29 -0800 (PST) Subject: New Website is up!! Message-ID: <199803150745.IAA11699@basement.replay.com> Considering the one-line content of the Web page, this appears to have been a troll, perhaps aimed at gathering an instant snapshot database of IP addresses/domains/reverse lookups of people with an interest in crypto. Don't go there. 'Scuse me, someone's knocking at my door... NO CARRIER ----- Original Message ----- To: cypherpunks at toad.com, coderpunks at toad.com, cryptography at c2.net Date sent: Sat, 14 Mar 1998 10:17:45 -0700 From: "Jared" Copies to: cypherpunks-announce at toad.com Subject: New Website is up!! Organization: MailCity (http://www.mailcity.com:80) Send reply to: "Jared" New Web page up at HTTP://WWW.INSTANTWEB.COM/~SALEM/ CHECK IT OUT!! THANKS!! -CypherPunks Get your FREE, private e-mail account at http://www.mailcity.com From nobody at REPLAY.COM Sun Mar 15 01:44:11 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 15 Mar 1998 01:44:11 -0800 (PST) Subject: Killing Stan the Right Way Message-ID: <199803150944.KAA24525@basement.replay.com> Tim May wrote: > When you have been on the list longer, and when you go back and read the > messages from the early years of the list, you will understand that it has > never been the "Cypherpunk Way" to do the work others can do for themselves. That's right. After glancing through some of the early posts to the cypherpunks list one realizes that many of them had to walk ten miles to get to a computer--always uphill and often in a blinding snowstorm. That was back in the days when Americans still knew how to make a big, high-powered car, but cypherpunks didn't use them to get to their computers because they weren't namby-pamby momma's boys like those godless commie A(h)OLs who get their peckers hammered on the cypherpunks list and then complain because they can't get off. Has anyone seen my shoes? I can't find my shoes... From whgiii at invweb.net Sun Mar 15 02:15:20 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Sun, 15 Mar 1998 02:15:20 -0800 (PST) Subject: For Your Entertainment (Was: Re: New Website is up!!) In-Reply-To: Message-ID: <199803151008.FAA09540@users.invweb.net> In , on 03/14/98 at 12:17 PM, "Jared" said: >New Web page up at HTTP://WWW.INSTANTWEB.COM/~SALEM/ >CHECK IT OUT!! The below is for your entertainment only!! I am not responsible for any mailbombs, plug pulling, or much worse faits that all spamers truly deserve. Well after doing a little investigation I was able to track down our "friend" here After looking at the source code at the url above I found: src="http://www.geocities.com/Area51/Corridor/1037/hacker.gif" After looking at the source code at this URL: http://www.geocities.com/Area51/Corridor/1037 and mailto:montanajack at hotmail.com and which brings us to Jalawoh Studios: Ph: 1-619-588-1716 Fax: 1-619-590-2493 Mailing Address: Jalawoh Studios, 676 Grape St., El Cajon, Ca. 92021-5813 a division of Internet, Inc. (a delaware corporation) Non-authoritative answer: Name: www.jalawoh.com Address: 209.41.45.82 [rs.internic.net] Jalawoh Studios (JALAWOH-DOM) 676 Grape St El Cajon, Ca 92021 US Domain Name: JALAWOH.COM Administrative Contact: Antonio, Manuel (MA3191) jalawoh at 10MB.COM (619)590-2493 Technical Contact, Zone Contact: Hostmaster, Rapidsite Inc (HRI-ORG) hostmaster at RAPIDSITE.NET 561-994-6684 Fax- 561-994-6617 Billing Contact: Antonio, Manuel (MA3191) jalawoh at 10MB.COM (619)590-2493 Record last updated on 25-Aug-97. Record created on 25-Aug-97. Database last updated on 14-Mar-98 04:13:01 EST. Domain servers in listed order: NS.NAMESERVERS.NET 207.158.192.61 NS2.NAMESERVERS.NET 207.158.192.91 -- --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html --------------------------------------------------------------- Title: FBI's Ten Most Wanted Fugitives FBI's TOP 10 WANTED LIST Tattooman Tattooman Conjuror Conjuror !--> |Oracle| |Oracle| RSnake Rsnake Mantis Mantis Photon Rain Photon Rain FBI's Ten Most Wanted 

Fugitives Spikeman Spikeman Transmitt Transmitt Snake Plisken Snake Plisken Anon Anon Sgt Rock Sgt Rock � The FBI is offering rewards for information leading to the apprehension of Ten Most Wanted Fugitives. Check each fugitive page for the specific amount. Freedom Knights - El Fuckero - FBI Whores - Technotronic's Place Copyright '98 IVAll rights ReservedHacking, Inc. The page Title: real aliens roswell new mexico 1947 Saucer Crash, Roswell 1947 Note the Aliens around the craft and the N.M. State Trooper in the background, upper right corner. �The Story � �Zeta Reticula The untold story of what really happened 50 years ago in Roswell New Mexico 1947. � j a l a w o h . s t u d i o s all rights reserved 1997 �Autopsy Report �Control Panel �Area51 Tours �Our Statistics �Anti Gravity �Free Aliens �Read E-mail �Add URL Note: ...this page designed to be viewed in as low as 640X480 video resolution...in recognition of the many older machines globally still in use... Zetan 3000i: Phaser Processor 12 Terra byte Ram Hyper Light Modem Infinity Hard Drive !! coming soon !! make contact Internet Link Exchange Member of the Internet Link Exchange Free Home Pages at GeoCities SD Link Member This page hosted by Get your own Free Home Page Tag-O-Matic: Dogs crawl under gates, software crawls under Windows! -------------- next part -------------- A non-text attachment was scrubbed... Name: pgp00002.pgp Type: application/octet-stream Size: 339 bytes Desc: "PGP signature" URL: From 57290970 at worldnet.att.net Sun Mar 15 09:18:18 1998 From: 57290970 at worldnet.att.net (57290970 at worldnet.att.net) Date: Sun, 15 Mar 1998 09:18:18 -0800 (PST) Subject: Extreme Profits! Simple Business Message-ID: <199803131739.EML03624@apamobordol.com> * Comapany Pays you $20 a signup! Pay one time $39 to Join! Pay Checks Twice a Week! This Is Instant Cash!!!!! Just get 12 Friends to your Free Self Replicating Web Site! 12 x $20 = $240 How long will it take you? I'm doing 3 per day! 3 members x 7 days x $20 = $420 Week! ALL OVER THE NET! How would you like to make a weekly Pay Check? "WEEKLY" Every time I look in the mail box another Ad-Net commission check is there, and each time it gets Bigger and Bigger! You get a FREE self-replicating web-site! Company projections are 50,000 new distributors by April! Already people under me in my downline have received up to 20 people in spillover in only 2 weeks!!! If you have not joined, you need to do so Now!!! This is the "Grand-daddy" of all MLM Lead Programs. Over 500,000 networkers either know or they have heard of this company. Cost is ONLY $39 ONE-TIME Out-of-Pocket! Reply with "money" in the subject for info and to signup. From remove at pinkxxx.com Sun Mar 15 10:11:07 1998 From: remove at pinkxxx.com (remove) Date: Sun, 15 Mar 1998 10:11:07 -0800 (PST) Subject: 100% FREE SITE for ADULTS ONLY! Message-ID: <8154564_58873704> *** REMOVAL instructions are located at the bottom of this email *** This ADULT NEWS FLASH is intended for MATURE AUDIENCES ONLY! Visit this year's ADULT PORN PRESS "FREE ADULT SITE OF THE YEAR" 300+ FREE PICS! 300+ FREE VIDEOS ROTATING DAILY! HARDCORE PUZZLE GAMES AND MORE! THIS NEW SITE IS 100% FREE, CUM NOW! http://www.pinkxxx.com/CREAMERS/ Thank you for your support! Suzie. *** REMOVAL instructions *** This mailing list is filtered through http://remove-list.com As well, to be removed from our internal mailing list please REPLY typing REMOVE in the SUBJECT BOX. You will NOT be emailed again about this matter. We represent an ebusiness network of private adult entertainment organizations trying to keep the word "FREE" a REALITY on this virtual world. From nobody at REPLAY.COM Sun Mar 15 11:53:26 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 15 Mar 1998 11:53:26 -0800 (PST) Subject: time to export RSA and demand to be prosecuted? (Re:Cypherpunks Crypto_Legal Assistance Fund) (fwd) Message-ID: <199803151953.UAA17769@basement.replay.com> Jim Choate wrote: > True, but since it is unethical and criminal in that it puts others in harms > way without their prior permission it isn't reasonable. To do something like > this really would put the part in the same boat as those they were > attempting to defeat - a pot calling the kettle black. Jim, Decoded the message from your post and will tell our friends in Las Vegas to release the _real_ anthrax as soon as possible. It looks like the feds are going to hang the Olympic Park bombing on rudolph, so it seems you have nothing to worry about. A. Nanny Mass p.s. - I agree with the point of your post, although I didn't really understand it. From coderpunks at toad.com Sun Mar 15 11:55:52 1998 From: coderpunks at toad.com (HappyHacker) Date: Sun, 15 Mar 1998 11:55:52 -0800 (PST) Subject: Webpage just recreated... Message-ID: <350B43C500000747@mail.uep.com> hello everyone, I am happyhacker. i sent you all an email yesterday about my new site being up at HTTP://WWW.INSTANTWEB.COM/~salem/ and some of you replied about it not being up! Well, it is NOW up! so please go and enjoy it! thanks!! HappyHacker CypherPunks From buzzreg at central.cnet.com Sun Mar 15 14:41:39 1998 From: buzzreg at central.cnet.com (buzzreg at central.cnet.com) Date: Sun, 15 Mar 1998 14:41:39 -0800 (PST) Subject: Welcome to Builder buzz! Message-ID: <199803152241.OAA23425@toad.com> Welcome, cypherpunks. You have registered as a provisional user for Builder Buzz. To become a full member, please email the following member code line back to us, so we can confirm your email address. With most email programs, you can simply reply to this message. (If your email program doesn't include the previous message in its replies, you may need to cut and paste the member code line into the reply message.) MEMBER CODE: 52ce L3N9gKa0 Thank you for joining us, and we look forward to having you visit often and participate completely in the Builder Buzz conversations! Regards, Dan Shafer master builder and Builder buzz host From StanSquncr at aol.com Sun Mar 15 14:44:06 1998 From: StanSquncr at aol.com (StanSquncr) Date: Sun, 15 Mar 1998 14:44:06 -0800 (PST) Subject: get me off/ME TOO! Message-ID: <9af5281a.350c596f@aol.com> In a message dated 98-03-15 02:54:47 EST, A real "nobody" writes: << Dumbass, if you didn't have the brain cells to understand what this list is about, don't play with your mommy's computer and e-mail account. Open a dos prompt and type "FDISK/U" and all your troubles will be over. >> Look Nobody, I don't think that even ONE cypherpunk (other than yourself) is stupid enough to think I would do it. << (what a fucked up band name) >> Yes, that's why we changed it from the "Nobodies" to "Nobody's Business" {BIG GRIN] Stan Rosenthal, Nobody's Business - http://members.aol.com/StanSquncr/home.html PS: 'Stan and the Sequencers' opens for the Brave Combo, March 27, at the FabSat in Houston, Be There Or Be Square (and if you're a Liberatarian or a Republican, you can be there AND be square!) From StanSquncr at aol.com Sun Mar 15 14:44:30 1998 From: StanSquncr at aol.com (StanSquncr) Date: Sun, 15 Mar 1998 14:44:30 -0800 (PST) Subject: Nobody's Business Message-ID: In a message dated 98-03-15 05:10:13 EST, nobody at REPLAY.COM writes: << That was back in the days when Americans still knew how to make a big, high-powered car, but cypherpunks didn't use them to get to their computers because they weren't namby-pamby momma's boys like those godless commie A(h)OLs who get their peckers hammered on the cypherpunks list and then complain because they can't get off. >> It's always easy to tell who's nerves I touch, notice the "McCarthyism" - " ... commie ... ", you guys can't hide, you're too fucking stupid. Register and vote against Conservatives, Liberatarians and Republicans. And Nobody, call yourself for what you are, a "DittoHead" (ie: a "stupid, fucking moron"). Oh, but the REAL name for joker's such as "nobody"? He's a member of the "Know-nothing" movement. Look it up in a Dictionary. << Has anyone seen my shoes? I can't find my shoes... >> That's because you're a "stupid fucking moron." Stan From validate at wbs.net Sun Mar 15 14:46:12 1998 From: validate at wbs.net (WebChat Broadcasting System) Date: Sun, 15 Mar 1998 14:46:12 -0800 (PST) Subject: Validation Code for WBS Access (cypherpunks, 46910009) Message-ID: <199803152246.OAA20806@webchat1.wbs.net> THANKS FOR JOINING US, cypherpunks! For full access to WBS using this handle you must validate your account. To do so, please complete either of the following two options: < Option #1 > Reply to this email without altering the subject line. This WILL NOT WORK if the subject line of your reply email is altered in any way. Some email serving software changes the subject line automatically. If you are unsure whether yours does or does not, follow the validation instructions in option #2. < Option #2 > Go to the WBS Validation Page at < http://wbs.net/validate.html > and enter your account information exactly as shown below. Handle: cypherpunks Password: cypherpunks Validation #: 46910009 PASSWORDS ARE CASE SENSITIVE (e.g. if your password is "bob", entering "BOB" in any password field on WBS will not work) If you've decided you don't want this handle, you can delete it by doing the following: Go to the WBS Identity, User Editing at < http://wbs.net/cgi-bin/user_edit.cgi > Select "delete one of your handles" , then scroll down and enter the handle and password exactly as shown below and click "login". Repeat on next page and click "delete". Handle: cypherpunks Password: cypherpunks Thanks for being a part of the greatest community on earth! By validating your account you acknowledge having read the WBS system rules at < http://wbs.net/wbs/rules.html > and agree to abide by them. If you do not believe you registered this handle on WBS, someone may have accidentally entered your email address - or - someone may be using your email address without your permission. Registration to WBS is free and harmless and unless you follow the directions above to validate the account, it will remain inactive and unusable. Why don't ya check us out? < http://wbs.net > From Ray_Paradis at bigfoot.com Sun Mar 15 15:04:44 1998 From: Ray_Paradis at bigfoot.com (Ray Paradis) Date: Sun, 15 Mar 1998 15:04:44 -0800 (PST) Subject: New Forum In Town Message-ID: <001e01bd5066$a9ba7f60$890dadce@crc3.concentric.net> Grand opening of the Webmasters Club. Webmasters Club is your forum to discuss anything and everything related to building and maintaining a web presence. * Notice * We are looking for moderators if you are interested please email me. From Spdrcr7719 at aol.com Sun Mar 15 15:10:55 1998 From: Spdrcr7719 at aol.com (Spdrcr7719) Date: Sun, 15 Mar 1998 15:10:55 -0800 (PST) Subject: Too Hot!!! Message-ID: <6f8cdd6f.350c5ebf@aol.com> This really is a blast. With all these movies coming out about virtual reality, it's amazing to actually have a virtual reality program like this for your own computer. The Virtual Girlfriend and Virtual Boyfriend are artificial intelligence programs for your IBM PC or compatible and also for MACINTOSH. You can watch them, talk to them, ask them questions, tell them secrets, and relate with them. Watch them as you ask them to take off different clothes and guide them through many different activities. Watch and participate in the hottest sexual activities available on computer, including: several sexual positions, using many unique toys, even bringing in multiple partners. This is no doubt one of the most realistic, sexually stimulating computer games available. They will remember your name, birthday, your likes and your dislikes. Every time you start the program, they say different things, and act differently. Each time, they have a different personality. With the VGA digital graphics, the Virtual Girlfriend and Virtual Boyfriend software have some of the hottest, sexiest graphics out there. You can actually hear their voice as they talk to you. This is the first adult software title that was designed for both heterosexual and homosexual people. We would like you to try the actual full copy out before it is put on the market this spring. It will be sold for 1/7 of the actual price (only $7.95) until we can get back some information on what people think of the program before it hits the stores. Please give it a try and write back any comments. Thank you. Virtual Girlfriend and Virtual Boyfriend are artificial intelligence programs, meaning they are completely interactive. It would be just like if you were talking to someone. You can actually have simple conversations. Their attitudes change with the different things you say, so you can say things that will upset them, and then say things that will please them. The more you play/talk with them, the more you learn what they can do, and what they like to do. It's easy to install and instructions are easy to follow. ~~~~~~~~~~~~~~~~~~~Special Offer~~~~~~~~~~~~~~~~~~~ *Get two more new and exciting adult games for an additional $13.45* ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Here are two of the best adult games ever!! This is to inform you about the new adult game that VCS Magazine rated "The best game of "97" and gave an "Outstanding ****" (4 stars). "The Search for Paradise is no doubt one of the greatest XXX adult games available". The first game where it is as much fun as it is a turn on! Travel the world to every continent, every country you can think of, and meet some of the most beautiful women in existence. These women will treat you like a king and obey your every command. Any sexual wish you can think of, these women know it all. There is a certain paradise for every guy out there, and this game will have them all. This game uses real models, digital video, and digital sound to make it as realistic as possible. You will feel like you're in the same room as the girl you're talking to!!! The last adult game we are going to inform you about is the newly released "Club Celebrity X". Imagine being in a club with some very beautiful, well known, ACTUAL celebrities that with skill, will be making you breakfast in bed the next day. These girls you have seen on television, magazines, and billboard ads, and now they are on your computer, begging for action. Each girl you will recognize and you won't believe your eyes when you got them in your own bedroom. This game is hot, and once you start playing, you won't be able to stop. ****************************************************************************** ********** (((((((((LIMITED TIME ONLY)))))))) T00 H0T!! for Virtual girlfriend.... These were too sexually graphic to include in VG and VB. These are some of most arousing & attractive models ever put in one collection. You MUST be 18 or over to purchase & not easily offened. ****************************************************************************** *********** *Required: 386 or better, 4 meg ram or better, Windows 3.1 or higher (Win95 is fine), sound card or CD-rom are optional. Games are given either on CD-rom or compressed 3.5" diskettes. Required is VGA graphics, and a hard drive. Macintosh requires at least 4 meg of ram. They will run on any IBM or MACINTOSH compatible. If you are interested and would like to order a copy, then you can read the mailing instructions below. Games come in an unmarked package and are sent out at most 4 days after the order is received. You are not put on any mailing lists whatsoever, guaranteed. ~At your request, the programs can come with a password protection utility that only allows the program to run when the correct password is entered.~ To order, please send to: C&M PROMOTIONS 6185 Magnolia Ave. Suite# 360 Riverside CA, 92506 Phone # 1-888-341-1643 Please fill out the following form and mail it to the address above. (Feel free to write out the order form by hand, if you wish). ________________________________________________________ __________________________ (Cut here)_________________________ send to: C&M Promotions 6185 Magnolia Ave. #360 Riverside CA, 92506 Your Name __________________________________ Date ___________ Address _____________________________________________________ City ____________________________ State ___ Zip Code ____________ Phones: Home ___________________E-mail Address _______________ Do you use a? IBM__ MACINTOSH __ Would you like? 3.5 Disks__ CD ROM__ ( ) Virtual Girlfriend..............................................................$7.95 ( ) Virtual Boyfriend.............................................................$7.95 ( ) Both Virtual Girlfriend and Boyfriend................................$13.95 ( ) The Search for Paradise & Club Celebrity X......................$13.45 ( ) Too HOT for VG & VB....................................................$17.50 ( ) Everything!!! The Search for Paradise, Club Celebrity X and Virtual Girlfriend and Virtual Boyfriend.......................$21.90 (ADD) S&H.......$2.00 *money order or check* Amount enclosed?________ ~Please indicate year of birth___________ Code:8053 From kevlar at smartlink.net Sun Mar 15 16:12:46 1998 From: kevlar at smartlink.net (Kevlar) Date: Sun, 15 Mar 1998 16:12:46 -0800 (PST) Subject: Welcome to Builder buzz! In-Reply-To: <199803152241.OAA23425@toad.com> Message-ID: <3.0.5.32.19980315161152.007b4780@mail.smartlink.net> Has anyone tried this out yet? Is it some lame scam to get alot of e-mail addresses? The lack of information about what the hell "Builder Buzz" makes me wonder... At 02:37 PM 3/15/98, you wrote: >Welcome, cypherpunks. > >You have registered as a provisional user for Builder Buzz. To become a full >member, please email the following member code line back to us, so we can >confirm your email address. With most email programs, you can simply reply to >this message. (If your email program doesn't include the previous message in >its replies, you may need to cut and paste the member code line into the reply >message.) > > MEMBER CODE: 52ce L3N9gKa0 > >Thank you for joining us, and we look forward to having you visit often and >participate completely in the Builder Buzz conversations! > >Regards, >Dan Shafer >master builder and Builder buzz host > > From tcmay at got.net Sun Mar 15 09:19:03 1998 From: tcmay at got.net (Tim May) Date: Mon, 16 Mar 1998 01:19:03 +0800 Subject: RTFM In-Reply-To: <279b5b66b1c8ac3768a7bfc174f33a21@anon.efga.org> Message-ID: At 7:12 AM -0800 3/15/98, Anonymous wrote: >I wish Schneier indicated _how_ one makes compressible ciphertext. I am >certainly no expert here. Have much reading to do! Offhand, there are many ways to "pad out" ciphertext so as to make it more compressible by standard compression algorithms. -- duplicate every character several times, right after it first appears. This clearly lets a compressor find "compression patterns." True, it looks pretty obvious to a human eyeball, but it shows the theme. -- insert sonnets from Shakespear. Same as above. -- generally, lower the entropy by duplication, insertion, lengthening. >> There have been hundreds of articles and comments here and on other mailing >> lists about this. Not that your ideas are not welcome, just to let you know >> why it's likely your ideas won't be met with a rush of excitement. You >> might try finding these old analyses and seeing what you can add. >> > >A polite "no amatuers allowed in the clubhouse." How does TCM expect the >newcomers to learn, if no one will share their accumulated knowledge? That >is the reason I signed up for this list - to _learn_. Not a "no amateurs allowed." Not at all. Just an obvious comment that one cannot expect those of us who've been on the list for years to rewrite and rewrite and rewrite the same essays. Search engines will turn up much discussion. If newcomers are too lazy to read Schneier, to read the FAQs, to read some of the many thousands of articles so conveniently accessible with search engines, I have no sympathy for them. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From info at 209.116.211.250 Mon Mar 16 04:44:31 1998 From: info at 209.116.211.250 (info at 209.116.211.250) Date: Mon, 16 Mar 1998 04:44:31 -0800 (PST) Subject: 5 Times Book Value Investment NTXA Message-ID: <199606141234.IAA02622@209.116.211.250> NTXA => National Tax and Acounting See For your self http://quote.yahoo.com/q?s=ntxa&d=v4 This stock holds an estimated book value of $1.24 Per share If standards of investment apply this stock should easily hold at 5 times book to an expected market valuation of over $6 per share. "THEN and NOW" An investment of $100.00 in Mcdonalds in 1955 would NOW be worth over $1 million today. No one knew THEN. See For your self http://quote.yahoo.com/q?s=ntxa&d=v4 PRESS RELEASE INFO ============================================================ Monday January 19, 8:31 am Eastern Time Company Press Release http://biz.yahoo.com/bw/980119/national_t_1.html National Tax Accounting Inc. to Merge with World Arts Centre Inc. ------------------------------------------------------------------------------------------------------------------ Monday October 27 8:28 AM EST Company Press Release National Tax Accounting Inc. to Acquire National Tax Filing Service Inc. of Daytona Beach, Florida http://biz.yahoo.com/bw/97/10/27/ntxa_y0004_1.html ------------------------------------------------------------------------------------------------------------------ Monday August 11 2:42 PM EDT Company Press Release National Tax Accounting Inc. to Acquire Two New Affiliates: Express Tax Inc. and Michael K. Zimmerman CPA, PA http://biz.yahoo.com/bw/97/08/11/ntxa_1.html ------------------------------------------------------------------------------------------------------------------ Thursday May 29 8:10 AM EDT Company Press Release National Tax Accounting begins trading publicly http://biz.yahoo.com/bw/97/05/29/ntxa_y0004_1.html ------------------------------------------------------------------------------------------------------------------ The contents of this message have been provided for the review of potential investors only and does not constitute an offering of securities. Call Your Broker or if you need a broker go to the following address. http://www.yahoo.com/Business_and_Economy/Companies/Financial_Services/Investment_Services/Brokerages/Full_Service/ From jtsr-stock at jtsr-stock.com Mon Mar 16 06:55:33 1998 From: jtsr-stock at jtsr-stock.com (jtsr-stock at jtsr-stock.com) Date: Mon, 16 Mar 1998 06:55:33 -0800 (PST) Subject: JT's Restarants(JTSR) - Excellent Undervauled Investment Opportunity Message-ID: <199803161455.GAA28370@toad.com> You have been carefully selected to receive the following as a person obviously interested in this subject based upon your previous internet postings, or visits to one of our affiliate web sites. If you have received this message in error, please accept our apology as a responsible e-mailer, and reply with the word REMOVE in the subject line. You will be automatically excluded from future e-mailings. Thank you for your consideration and help in making the Internet spam-free. ***** Visit http://www.jtsr-stock.com or call 888-295-6365 For Complete Information. **** NEWS FLASH **** 2/20/98 Analysts correct - JT's Stock price up 40% from Feb. 17, 1998 to Feb. 20, 1998 - JT's is still the "Ground Floor Oppoprtunity" - The growth remains ahead. Who said opportunity only knocks once. JT's Restaurants is growing by leaps and bounds. Under valued stock situation presently $3.00 per share. Analysts predict stock will reach $5 to $6 this spring and could go up to $10.00 by end of 1998. Stock symbol JTSR on OTC BB. "THEN and NOW" An investment of $100.00 in Mcdonalds in 1955 would NOW be worth over $1 million today. No one knew THEN. Visit us at http://www.jtsr-stock.com or call 1-888-295-6365. The contents of this message have been provided for the review of potential investors only and does not constitute an offering of securities. From jya at pipeline.com Mon Mar 16 07:13:35 1998 From: jya at pipeline.com (John Young) Date: Mon, 16 Mar 1998 07:13:35 -0800 (PST) Subject: The Law Where There Is No Land Message-ID: <1.5.4.32.19980316151508.006865fc@pop.pipeline.com> NYT reports today on the battle to fit old law to cyberspace, "The Law Where There Is No Land," featuring several eminent posters here, with a poster pix of Cindy Cohn attacking Bernstein's evil foes, laptop scythe slashing, Xena backflipping effortlessly. Flip to: http://jya.com/newlaw.htm From sherman at cs.umbc.edu Mon Mar 16 08:21:44 1998 From: sherman at cs.umbc.edu (Dr. Alan Sherman) Date: Mon, 16 Mar 1998 08:21:44 -0800 (PST) Subject: videotapes of encryption policy forum at UMBC Message-ID: For those of you who missed the two-part forum on encryption policy at UMBC, a videotape of each event is available in the CSEE library in the ECS building at UMBC. The first event featured John Gilmore (EFF) and Fritz Fielding (former NSA); the second featured Barry Smith (FBI). http://www.cs.umbc.edu/events These tapes are for viewing at UMBC only and are not available for general distribution nor copying. Dr. Alan T. Sherman Associate Professor, Computer Science sherman at cs.umbc.edu From manager at musicblvd.com Mon Mar 16 10:59:38 1998 From: manager at musicblvd.com (http://MusicBLVD.com) Date: Mon, 16 Mar 1998 10:59:38 -0800 (PST) Subject: Music Boulevard Deals Message-ID: <3.0.32.19980316102741.00b8eb5c@207.67.22.140> Music Boulevard celebrates March Madness with discounts throughout the store! Score huge savings on your favorite music and, now through March 31, take an additional $3 off your purchase when you follow the URL below: http://www.musicblvd.com/3pointer March Madness In-Store Specials: * Essential CDs On Sale! Thousands of must-have discs are just $9.99 each. * Buy three, we�ll ship for free! For a limited time, Music Boulevard will pick up the shipping tab for any U.S. order of 3 items or more. * Celebrate Women's History Month with our tribute to the first ladies of song. Favorite female artist discographies are on sale now! * Our Soundtracks Cineplex sale features this year's Oscar-nominated soundtracks, past winners, and tons of music from the movies you love. * Collect the best of the best! Greatest hits collections from your favorite artists are now on sale. * The Allman Brothers Band�s Live at the Fillmore February 1970 is on sale now, but only on Music Boulevard! You won�t find this rare CD in stores. * On Sale now - new albums from superstar artists like Madonna, Eric Clapton, Loreena McKennitt and Pearl Jam plus recent favorites from Celine Dion, Savage Garden, Will Smith, and the soundtracks to Titanic and The Wedding Singer! Hurry, your additional $3 discount will expire on March 31! Visit http://www.musicblvd.com/3pointer/ today! Thanks for shopping at Music Boulevard! ****************************************************************************** Now through April 10th, visitors to N2K�s Classical Insites can enter to win a luxurious Opera weekend in New York, including round-trip airfare, hotel, and tickets to see Puccini's Madama Butterfly! Enter today for your chance to win: http://www.classicalinsites.com/opera101 ****************************************************************************** TO UNSUBSCRIBE: To unsubscribe from this mailing list, send an email to: remove-musicblvd at sparklist.com and you will be automatically removed from this list. From MSDNFlashEditor_000037 at news.newswire.microsoft.com Mon Mar 16 14:13:15 1998 From: MSDNFlashEditor_000037 at news.newswire.microsoft.com (MSDNFlash Editor) Date: Mon, 16 Mar 1998 14:13:15 -0800 (PST) Subject: Special MSDN Update - Visual J++ 6.0 Message-ID: <199803162213.OAA01009@toad.com> A Twice-Monthly Newsletter for the Microsoft Developer Community Visit us today on the World Wide Web at: http://www.microsoft.com/msdn/ Microsoft Announces Visual J++ 6.0 Technology Preview We wanted you to be one of the first to know about the launch of Visual J++ 6.0 Technology Preview. Microsoft Visual J++ 6.0 is the fastest way to harness the productivity of Java language and the power of Windows to build and deploy high-performance, data-driven client and server solutions. Two-way visual design tools combined with the Windows Foundation Classes (WFC) for Java, advanced cross-language and remote debugging capabilities, scalable data access, and one-button application deployment simplify the development of feature rich Windows and Web applications, components, and middle-tier business objects. For more product information and free download, visit http://www.microsoft.com/visualj/ How to use this mailing list You received this email newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this newsletter, or subscribe to a variety of other informative newsletters, by returning to the Personal Information Center, http://register.microsoft.com/regwiz/personalinfo.asp and changing your subscription preferences. Alternatively, please send a reply to this email with the word "unsubscribe" as the first line in the body of the message From tm at dev.null Mon Mar 16 15:56:03 1998 From: tm at dev.null (TruthMonger) Date: Mon, 16 Mar 1998 15:56:03 -0800 (PST) Subject: Prologue 7/0 -- SPACE ALIENS HIDE MY DRUGS Message-ID: <350DD687.3A05@dev.null> Prologue 7/0 -- SPACE ALIENS HIDE MY DRUGS ------------------------------------------ Bureau42 wrote: The unifying presence of CJ Parker seems to have disappeared, and the Circle of Eunuchs is in chaos. This is what's left - the cryptic saga, "Space Aliens Hide My Drugs!" I can only wonder what, if anything, this malarchy means. But it's occasionally amusing if nothing else. the bureau42 staff ----- Subject: A.Word.A.Day--chaos Date: Mon, 16 Mar 1998 00:07:19 -0500 From: Wordsmith To: linguaphile at wordsmith.org chaos (KAY-os) noun 1. A condition or place of great disorder or confusion. 2. A disorderly mass; a jumble. 3. Often Chaos. The disordered state of unformed matter and infinite space supposed in some cosmogonic views to have existed before the ordered universe. 4. Obsolete. An abyss; a chasm. [Middle English, formless primordial space, from Latin, from Greek khaos.] "But chaos is a condition of creativity, says Zarathustra - `one must have chaos in one, to give birth to a dancing star.'" Nietzsche, Friedrich Wilhelm, Thus Spake Zarathustra: Part 1. ----- [Note from the Editor: CJ Parker, having had previous experience in playing a woman's role during his stint on 'Baywatch', has gone to ground recently, as have many other members of the Circle of Eunuchs, by re-entering the World of Myth, replacing the Parker woman in the TV series, 'The Pretender' (who died in a plane crash while giving Ron Brown the details of BadBillyC's sexual assault on her). This rather bizarre chain of events was precipitated by a warning he received regarding the return of Adolf Hitler to power, using the same Dimlluminati (The lights are on, but nobody's home...) process which was used to sweep Ronnie RayGuns into power as the chief leader of the Freeh(ee-hee) World. Those who have noticed the stunning blitzkrieg assault of a small college basketball team, Valparaiso, on their opponents in the NCAA tournament currently taking place, may have noticed the striking resemblance of Bryce Drew, their star player, to the child actor who was the main protagonist in the TV series, 'The Wonder Years.' This is no coincidence--they are, in fact, one and the same person. The diabolical process used to implant a respectable, patriotic image of Ronnie RayGuns in the mind of the American people, through the then-developing psychedelic opiate of Cinema/Television, is, in the present case, being extended to reinforce the image of the 'Wonder Boy' in an increasingly global environment, by extending the actor/ image persona into the sports arena--beginning at the college level. ("Win one for the Gipper...") The 'miracle shot' by Bryce Drew to lift the obscure college team to victory over Mississippi was a staged event which required several 'takes' before being successfully captured on film. The scene was shot in the same TV studio in which the original 'moon landing' was filmed. The same choreographers were used who worked on The Oklahoma City Players last major production, the bombing of the Murrah Federal Building. When asked for comment, a former Detroit Piston player who is now the owner of an NBA franchise, but wishes to remain anonymous, said, "If Bryce Drew and Ronald Reagan were black, they would have been just another pair of average actors." Knowledgeable individuals following the Reptilian Nazi conspiracy to emerge from their secret bunkers underneath the AdamAntArctic and Mule Shoe, Texas, recognize this quote as proof that the next step in this diabolical plot is to put the third clone (TV child- actor, college basketball player...-->...) of Adolf Hitler into place as the new 'white hope', replacing Larry Byrd as a member of the Boston Celtics. This shrewd move will help draw together, into a common cause, Fundamentalist Christians, White Supremacists, and East-coast factions of the Irish Republican Army. Circle of Eunuchs members attempting to expose this grand scheme of the Evil One have come under heavy attack recently. Dr. Dimitri Vulis KOTM, who was thrown out of the only CoE meeting he attended, had his InterNet account pulled shortly after putting up web site images of Bryce Drew, of Drew's alleged 'coach/father' and of Adolf Hitler. (Guess who Bryce *really* looks the most like...?) A forth clone of Hitler (rumored to be operating under the code name of 'Lucky Green' and involved in an incestuous relationship with his aunt, E. Christ--currently operating under the alias of Anne R. Christ) is being prepared, within the bowels of the crypto-community, to emerge as the future leader of the New World Order--in the position of Information Monitor/Director of the United Statism of Mind.] ----- Subject: Re: Freedom. (fwd) From: Jim Choate To: cypherpunks at ssz.com (Cypherpunks Distributed Remailer) Forwarded message: > From: Mark Rogaski > Subject: Re: Freedom. > Date: Sun, 15 Mar 1998 23:39:56 -0500 (EST) > : > It's typical of prisoners that they begin to associate with their captors at some > point. Eventualy there is no difference. Congratulations, you've reached that point. > > Equating adaptability for guilt is a shaky bridge and not handled well by > blanket judgements. Actualy it's neither. It's a facet of human nature involved in the survival mechanism. Further, there is no judgement involved, it's an easily verifiable quality of human psychology that prisoners begin to associate with their captors after a short period. What it is in this context is the recognition that prisoners of a political system will after a fashion begin to accept that system. Just look at the cry by many to return to the socialist system after the fall of the CCCP in 1990. ____________________________________________________________________ Those who suppress freedom always do so in the name of law and order. John. V. Lindsay The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- ----- As a consequence the search for a quantitative theory of evolution based at the genetic level, which has been such an obsession for neo-Darwinism ever since the work of Fisher, Haldane and Wright, has been misdirected. As Depew and Weber has expressed it 'natural selection at the level of individuals and the notion of fitness used to measure it, is itself poised on the edge of chaos' (Depew and Weber, 1995): 'The fitness of various sorts of organisms is not necessarily, or even probably, enhanced by superiority in a single trait... In fact, the emergence of the ability to take advantage in resource competitions of an indefinitely number of often infinitesimally small differences creates degrees of freedom, in both the technical and the ordinary senses, well beyond what can be achieved by merely chemical and physical systems. It also creates more variables and interactions among them than can be tracked. It is impossible, then, to reduce the components of fitness to any single language or system of variables' (ibid, 471). The number of possible solutions for selection to scrutinise, and the subtlety of the communicational interactions, will tend to produce a no-win situation. As a result selection cannot really �measure� the stakes of single players (individuals, demes, or species) in the game, but it could still influence the choice of the game itself. Plays, not players, are selected for. ~Jesper Hoffmeyer Biosemiotics: Towards a New Synthesis in Biology European Journal for Semiotic Studies, Vol. 9 No. 2, 1997, pp 355-376. ----- It was the work of Jesper Hoffmeyer, in the field of Biosemiotics, which led to the development of an artificial life/intelligence form capable of self-development/evolution, at Sandia Laboratories--by Reptilian Nazis. Their Cyborg technology had reached the point where it could finally be mass-produced when Bill Payne, a Sandia-NISTA employee, downloaded all the relevant technological files to a fellow Circle of Eunuchs member operating clandestinely within the bowels of a secret government laboratory (code-named 'Lost Alamo' by CoE psychophants). Although the Reptilian Nazis sent the Shadow back in time to eliminate the threat of the Circle of Eunuchs, by eliminating the Author in a sleazy motel room in southern Saskatchewan, the Circle of Eunuchs, taking advantage of the Trei Transponder technology developed by the CypherPunks, made contact with the resident of a Home For The Criminally Insane, in the same era, and used Biosemiotic theory to transfer biological communication-information to a digital implant he had received as part of a government experiment designed to control the minds of the members of the CypherPunks Distributed Remailer lists. The resulting events have long been the basis for certain mythologies concerning the Mythical Circle of Eunuchs, with the basic theme of the CoE reality being mirrored from time to time in the mythology- substitute of the era--Literature/Cinema/Television. (e.g. - Animal Farm, 1984, War of the Worlds, Terminator (I & II), X-Files, Pretender, Millennium, Journey to the East, The Magus, etc.) ---- The Bureau42 statement, "The unifying presence of CJ Parker seems to have disappeared, and the Circle of Eunuchs is in chaos." was an alert to CoE members to pay special attention to a commincation which ultimately came from a CoE collective known as 'WordSmith': "But chaos is a condition of creativity, says Zarathustra - `one must have chaos in one, to give birth to a dancing star.'" Nietzsche, Friedrich Wilhelm, Thus Spake Zarathustra: Part 1. The issue of chaos/creativity versus order/statism has pitted the Circle of Eunuchs against the New World Order on a battleground that encompasses NWO Anti-Christ/Artificial-Intelligence against CoE Anarchist/Biosemiotic-CodeWriting. It is a battle in which the meatspace Army of God forces must be countered by cyberspace Army of Dog troops. "DogMongers write biosemiotic code." ~ Bubba Hughes ----- The InterNet is fast becoming the global battleground for control of the future biosemiotic evolution, not only of humankind, but of universal intelligence, itself. ----- Darwin was right in seeing selection as the central process in animate nature, but for more than hundred years Darwinists have resisted taking the full consequence of this insight. It is now necessary to take this consequence and admit the obvious: That selective processes presupposes interpretations (with the implied possibility of misinterpretation). Thus, to the extent selection is a natural process, semiosis is a natural process - semiosis goes on all the time and at all levels of the biosphere. It may be feared that such a position will put biology outside the safe range of natural science, since interpretation seems to presuppose the existence of some kind of subject-ness. This risk, however, must be confronted through a thorough analysis of the implications, rather than evaded by repression. ~Jesper Hoffmeyer Biosemiotics: Towards a New Synthesis in Biology European Journal for Semiotic Studies, Vol. 9 No. 2, 1997, pp 355-376. ----- The war between the forces of freedom and the forces of repression takes place in many arenas. In the arena of expression of the life force, it is manifest in the battle between the forces of free speech and the forces of censorship. The evolution of the InterNet is the evolution of Biosemiotic Information-Communication. The term umwelt refers to the phenomenal worlds of organisms, the worlds around animals as they themselves perceive them. "Every action" wrote Uexk�ll "that consists of perception and operation imprints its meaning on the meaningless object and thereby makes it into a subject-related meaning-carrier in the respective umwelt" (Uexk�ll, 1982 [1940]) The Medium Is The Message Information Exchange Is The CornerStone Of Evolution Evolution Is The Creativity of Chaos Becoming Manifest ----- The number of possible solutions for selection to scrutinise, and the subtlety of the communicational interactions, will tend to produce a no-win situation. As a result selection cannot really �measure� the stakes of single players (individuals, demes, or species) in the game, but it could still influence the choice of the game itself. Plays, not players, are selected for. In the last decade the trend towards semiotisation of nature discussed here has manifested itself at still new levels. Thus, in evolutionary biology, neo-Darwinism has been seriously challenged by a set of ideas referred to as infodynamics (Brooks and Wiley, 1986; Weber, et al., 1989; Weber and Depew, 1995; Goodwin, 1989; Salthe, 1993). Infodynamics in the words of Stanley Salthe 'subsumes thermodynamics and information theory, essentially animating the latter by means of the former' (Salthe, 1993, 6). The general idea as originally suggested by Dan Brooks and Ed Wiley is that information capacity (disorder) increases spontaneously in developing systems, being produced along with physical entropy as the system grows and differentiates. Since such self-organisation is a prevalent property of our universe, natural selection should not be seen as the dominating force of evolution, but rather as playing the more modest role of pruning down the novelty that is constantly and autonomously being generated by the requirements of the second law of thermodynamics. Prigogine got the Nobel-price for his work on the thermodynamics of irreversible systems and most importantly in this context he showed that in so-called dissipative structures, i.e. systems far from thermodynamic equilibrium, ordered states may sometimes arise spontaneously out of disordered states. Our universe according to Prigogine is inherently creative. Due in large part to this revolution in our understanding of thermodynamics modern cosmology now sees our world as a self-organising place, a view which has perhaps most forcefully been unfolded in the recent work of Stuart Kauffman (Kauffman 1991, 1993). ~ Jesper Hoffmeyer ----- As CP-CoE neobyte Jim Choat points out, we become Sheeple who blindly follow our captors through the operation of our inborn survival mechanism. "It's a facet of human nature involved in the survival mechanism. Further, there is no judgement involved, it's an easily verifiable quality of human psychology that prisoners begin to associate with their captors after a short period." The only hope for Netizens to resist becoming Digital Sheeple behind the ElectroMagnetic Curtain which the forces of censorship/repression are striving to put in place is for each member of the coming Army of Dog to mark their meatspace and cyberspace territory and refuse to go gently into the night when the Oppressor attempts to scare them into submission with a mountain of laws and regulations which promise unjust persecution for imaginary offenses. A Global InterNet Army of individuals committed to freedom must strive to create a maximum entropy within which the chaos of semiotic evolution can break the digital chains which the Statist Oppressors are seeking to use to bind and repress access to information, global communication, free speech/expression, and the evolution of the Universal Life Energy, itself. ----- Current CoE mythology indicates that CJ Parker, fleeing his safehouse in Bienfait, Saskatchewan, after his dog Baby was shot by an FBI sniper as the Canadian Mounties closed in on him to enforce a "Dog at large." charge which was trumped up in an attempt to get him to inform on other CoE and CypherPunks members, left behind a note to his wannabe persecutors which indicated that he was willing to fight to the death, in both meatspace and cyberspace, if his only alternative was to live in a world where CypherBroads were required, by law, to wear panties. (This bit of information originated with his nephew, Human Gus-Peter, and is thus viewed with skepticism by some of the more mature/aged/ rotting members of the Circle of Eunuchs.) ---- Lock & Loll Rock & Road Chop & Chop ZenRacistMonger From billp at nmol.com Mon Mar 16 19:17:57 1998 From: billp at nmol.com (bill payne) Date: Mon, 16 Mar 1998 19:17:57 -0800 (PST) Subject: alluhu alkbar, sadness, and friendliness Message-ID: <350DEAFC.4727@nmol.com> Monday 3/16/98 8:03 PM Merat A second postcard went to you Saturday 2/14. Curiosity prompts me to ask if it or the previous made it to shiraz. best bill Thursday 3/12/98 7:34 AM Certified - Return Receipt Requested Cynthia McKinney 124 Cannon Building Washington, DC 20515 Office: (202)225-1605 Fax: (202)226-0691 http://www.house.gov/mckinney/ Dear Representative McKinney: PURPOSE of this letter is to ask your help for us to obtain copes of docket sheets from the Tenth Circuit Court of Appeals for cases No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia. All of our legal efforts to obtain these documents, which any citizen has a right to, have failed. REASON you are selected to help is that you appear to be knowledgeable about operation of the current US federal government and willing to speak out in an attempt to solve problems. You appeared Friday February 27, 1998 on PBS, The NewsHour with Jim Lehrer, along with senators Campbell, Hollings, Lott, Shelby Robb and representatives Dana Rohrabacher and Harold Rogers. These senators and congressmen appeared not to support your views because they are either mis- or not well-informed about US involvement in support of Saddam Hussein. Stories supporting your view appear on Internet at NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe http://www.aci.net/kalliste/speccoll.htm and Crypto AG: The NSA's Trojan Whore? by Wayne Madsen http://caq.com/CAQ/caq63/caq63madsen.html Madsen begins It may be the greatest intelligence scam of the century: For decades, the US has routinely intercepted and deciphered top secret encrypted messages of 120 countries But NSA , and as a result the US federal government, apparnetly got caught involved in complicity of deaths of about 500,000 Iranians. This is the subject of a Federal lawsuit seen on Internet at http://jya.com/whpfiles.htm US federal government help of Iraq during the Iraq-Iran war may possibly backfire on innocent US citizens. The Wall Street Journal, March 10, 1998, pp. B1, B9. reports A Peek Inside a Giant Germ Warehouse By Rochelle Sharpe Rockville, Md. -- They keep anthrax bacteria in the basement of a faded red-brick building here. It isn't far from the yellow-fever virus, the botulism bacteria and some of the hundreds of organisms that cause the common cold. In fact, there are samples of 85,000 different fungi, viruses, cells, genes and bacteria here at the American Type Culture Collection, by far the largest of the 450 repositories of biological materials scattered around the globe. ... The ATCC legally shipped 10 vials of anthrax, botulism and other deadly substances to Iraqi scientists in the 1980s -- when the U.S. and Iraq were on much friendlier terms -- all with the Commerce Department's approval. ... http://www.jya.com/btn031198.txt The US federal government apparently intended these bioweapons to be used against the people of Iran. You demonstrated on PBS TV a quality identified by Francis Bacon The contemplation of things as they are, without error or confusion, without substitution or imposture, is in itself a nobler thing than a whole harvest of invention. by your statement about Saddam Hussein on PBS ...our man and our creation... Perhaps after reading the above materials and The Problem of Paradigm Shifts - Terrorism and the Threat From Weapons of Mass Destruction in the Middle East Working Draft Anthony H. Cordesman, Senior Fellow and Co-Director Middle East Studies Program October 22, 1996 http://www.csis.org/mideast/terror.html senators Campbell, Hollings, Lott, Shelby, Robb and representatives Dana Rohrabacher and Harold Rogers MAY NOW understand why you are correct and they are mis- or not well-informed about US involvement with Saddam Hussein. PROBLEM we face with the US court system is that court clerks and judges have committed Title 18 felony violation of law IN WRITING in an attempt to deny us monetary compensation due us for the cases WE WON at the Tenth Circuit on Appeal. But judges awarded victories to the US federal government in violation of Federal Rules of Appellate Procedure. Cases No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia were both won pro se on appeal. We have filed a writ of mandamus with supreme court judge Scalia in an attempt to get the docket sheets for the two above cases. But Scalia will not answer our certified letters. Senator McCain wrote Payne on December 23, 1997 I wanted to take this opportunity of than you for you letter of December 3, 1997. Your situation is in the jurisdiction of Senator Pete Dominici. Therefore, I have forwarded you letter to his attention. William, I hope you situation can be resolved favorably. Lawyers and politicians Dominici and Bingaman are part of a problem not a solution. Dominici and Bingaman have the following agenda University of New Mexico Bureau for Business and Economic Research reported on October 14, 1997: A The Gross State Product of New Mexico is $37.8 billion. B The US Federal government sends $11.3 billion to New Mexico each year. C For each $1 New Mexico sends to Washington, New Mexico gets $2 back. THEREFORE, Representative McKinney, we ask your help to get copies of the docket sheets. Citizens of the US are becoming more upset with the behavior of bureaucrats, the courts [lawyers], and the US federal government. Some Americans have no other way to express their dissatisfaction with US federal government mismanagement of our country except by violence. Frederick Douglass either wrote or said on August 4, 1847 Those who profess to favor freedom, and yet depreciate agitation are men who want crops without plowing up the ground. They want rain without thunder and lightening. Power concedes nothing without a demand. It never did, and it never will. Find out just what people will submit to and you have found out the exact amount of injustice and wrong which will be imposed upon them. These will continue until they are resisted with either words or blows, or with both. The limits of tyrants are prescribed by the endurance of those whom they oppress. We chose to use the words and law to hold government employees accountable. Please encourage Scalia to do his job. Help get us copies of the docket sheets. And even perhaps help investigate further and settle this American tragedy. Sincerely, Arthur R. Morales William H. Payne 1023 Los Arboles NW 13015 Calle de Sandias NE Albuquerque, NM 87107 Albuquerque, NM 87111 Enclosures 1 NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe 2 Crypto AG: The NSA's Trojan Whore? by Wayne Madsen 3 Swiss Radio International Audio tape, 15 May, 18 July 1994 Distribution Ben Nighthorse Campbell administrator at campbell.senate.gov Ernest Hollings senator at hollings.senate.gov Trent Lott senatorlott at lott.senate.gov Richard Shelby senator at shelby.senate.gov Charles Robb Senator_Robb at robb.senate.gov Jim Lehrer newshour at pbs.org From jya at pipeline.com Mon Mar 16 19:41:39 1998 From: jya at pipeline.com (John Young) Date: Mon, 16 Mar 1998 19:41:39 -0800 (PST) Subject: The Cypherpunks Meeting, OpenPGP, and the TIS Merger Message-ID: <1.5.4.32.19980317034316.010c3f84@pop.pipeline.com> Thanks to Jim Gillogy we've put a copy of the IETF draft OpenPGP Message Format at: http://jya.com/openpgp-01.htm (99K) And thanks to all who've primed the OpenPGP pump to boost it worldwide we've opened an archive of selected parts (SSM) of the discussion here: http://jya.com/openpgp-msg.htm From gnu at toad.com Mon Mar 16 20:20:47 1998 From: gnu at toad.com (John Gilmore) Date: Mon, 16 Mar 1998 20:20:47 -0800 (PST) Subject: Bernstein's top lawyer, Cindy Cohn, testifies to Congress Tuesday Message-ID: <199803170400.UAA02843@toad.com> The lead attorney in Dan Bernstein's challenge to the US export controls on cryptography is Cindy Cohn, a partner at McGlashan & Sarrail of San Mateo, CA. She will testify on the constitutionality of export controls (and proposed domestic controls) on cryptography, before the Senate Judiciary Committee's subcommittee on the Constitution, Federalism, and Property Rights. The hearing will begin at 10AM (Washington, DC time) on Tuesday, March 17. The hearing will be cybercast in real-time, and will also be archived, at: http://www.computerprivacy.org (Scroll down to the "Encryption hearing to be cybercast" link.) Copies of Cindy's written testimony will be available on Tuesday from the EFF Web site; see http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ I hope you can attend. The Ninth Circuit Court of Appeals has not yet ruled on the government's appeal in our case. They hope to overturn our Federal District Court case, in which all current export controls on cryptographic source code were declared unconstitutional. We expect a ruling within the next several months. John Gilmore Electronic Frontier Foundation Here are further details, courtesy of Alan Davidson of CDT, : (1) Senate Committee To Hold Encryption Hearing March 17 Constitutional law experts, industry representatives, and the attorney in a case challenging U.S. encryption regulations will testify on encryption policy before the Senate Judiciary Committee's Constitution, Federalism, and Property Rights Subcommittee on Tuesday, March 17. The hearing, "to examine privacy in the digital age, focusing on encryption and mandatory access issues", is scheduled for 10:00 am in the Senate's Dirksen Office Bldg., Rm. 226. Among the hearing highlights: Two well-respected legal scholars, Professor Kathleen Sullivan of Stanford Law School and Professor Richard Epstein of the University of Chicago, will outline the major constitutional concerns raised by domestic encryption controls and other policies to regulate encryption. Expected witnesses include: Panel 1: Rep. Robert Goodlatte (R-VA) Panel 2: Robert Litt, Department of Justice Panel 3: Tom Parenty, Sybase Bill Wiedemann, RedCreek Communications Representative of Law Enforcement Association of America Panel 4: Kathleen Sullivan, Stanford Law School Richard Epstein, U. of Chicago Law School Cindy Cohn, McGlashan & Sarrail Tim Casey, MCI From moneytape3 at usa.net Mon Mar 16 20:34:23 1998 From: moneytape3 at usa.net (moneytape3 at usa.net) Date: Mon, 16 Mar 1998 20:34:23 -0800 (PST) Subject: Can something FREE really change your life? Message-ID: <199801045326.GAB02457@usa.net> Turn YOUR Spare Time Into MONEY! FREE Money Tape Reveals: PROVEN "STEP BY STEP" Marketing System that will make you MONEY! This audio tape is STRAIGHT FORWARD, and CUTS TO THE CHASE. Never before has it been this EASY to take charge of your life. Sign up for your FREE Money Tape NOW and start making the money you deserve! Visit: http://www.e-bizness.com/direct123/healthy-wealthy.html FREE MONEY TAPE (You can ONLY sign up for your FREE money tape through THIS website.) HURRY! Quantities are LIMITED! I GUARANTEE you won't be dissappointed! From Cindy at mcglashan.com Mon Mar 16 20:45:30 1998 From: Cindy at mcglashan.com (Cindy Cohn) Date: Mon, 16 Mar 1998 20:45:30 -0800 (PST) Subject: Cohn Testimony Message-ID: <199803170425.UAA28521@gw.quake.net> Here is the text of my testimony before the Senate Judiciary Committee's Subcommittee on Constitution, Federalism and Property Rights on Tuesday March 17. TESTIMONY OF CINDY A. COHN; LEAD COUNSEL, BERNSTEIN v. DEPARTMENT OF JUSTICE, ET AL. I want to thank the Sub-Committee for inviting me here today. Although there have been very many hearings and much discussion about cryptography here in Washington, this is the first, I believe, to seek testimony from one of the attorneys directly involved in the legal challenges to the cryptography regulations. I've been asked here because I am lead counsel in the case of Bernstein v. Department of Justice, et al. With the help of the Electronic Frontier Foundation, Professor Daniel J. Bernstein has been trying for over six years to publish on the Internet a simple cryptographic computer program which he wrote. He has been told that if he does, he will be prosecuted. We argued that American scientists, be they academics, in industry or hobbyists, should not have to submit their own work prior to publication to faceless government bureaucrats. This is especially so when those same bureaucrats have unchecked discretion to bar them from publishing his work. That is what the current scheme allows. In fact, before we brought suit those same agency bureaucrats told Professor Bernstein that publishing an academic paper about his software would be illegal and that putting his software into a public library would be illegal. The Federal District Court for the Northern District of California has agreed with us that the regulations are in violation of the First Amendment on their face, meaning that they violate the First Amendment rights of all Americans, not just Professor Bernstein. KARN AND JUNGER: TWO OTHER LEGAL CHALLENGES Two other similar cases are also pending. The first, Karn v. U.S. Department of State, is here in D.C. District Court. The Karn case is the clearest example of the quip often made about the Administration's cryptography policy--that it is based upon the belief that terrorists can't type. Mr. Karn was told that, although a book containing computer source code could be freely sent abroad, a floppy disk containing the exact same information could not. The second case, Junger v. Christopher, is in Cleveland, Ohio, and is based upon the government's position that Professor Junger, a law professor at Case Western University could be prosecuted for teaching a Computers and the Law course in his usual way. RULINGS OF THE BERNSTEIN CASE In the Bernstein case we have received three rulings from the District Court so far, all in our favor: 1) April 1996: Computer program source code is speech; 2) December 1996: ITAR was unconstitutional; 3) August 1997: New Commerce Department cryptography regulations issued in December, 1996 are unconstitutional. In short, the Federal District Court has declared that every single one of the current (and previous) regulations of encryption software are unconstitutional. The final ruling in our favor was appealed by the Administration, argued in December, 1997 before the Ninth Circuit Court of Appeals, and is now awaiting decision. I have attached a copy of the third District Court opinion to my written statement for your review. I hope you have your staff take the time to review it--it gives a clear and concise statement of some of the key constitutional requirements that any legislation on cryptographic software must meet and a better explanation than I could ever give you about why the current regulations are unconstitutional. As I mentioned before, the Bernstein case challenges the current government restrictions on cryptographic software on the grounds that they are in violation of the First Amendment. Although our case focuses, as it must, on the current regulations, the analysis would apply as well to proposed domestic restrictions which would restrict or license the creation, distribution or receipt of cryptographic software. Indeed, the constitutional problems which would arise if domestic controls were imposed are even more severe than those of the current scheme. The first doctrine of First Amendment law which the cryptography regulations violate is prior restraint of speech. The Bernstein case focuses on the easiest flaws to see in the current scheme--the lack of procedural protections. The Supreme Court has long held that if the government wants to institute a prepublication licensing scheme, it must contain: 1) Prompt decision - no more than 2 weeks; 2) Only a court can stop publication; the government must bring a court case rather than act administratively; 3) Government bears burden of proof in Court. This comes from a seminal Supreme Court case called Freedman v. Maryland. I should point out that as much as I would like to take credit for our legal analysis, we were not the first to see this problem. In fact, the first people to point out this problem in the regulations were in the Justice Department's Office of Legal Counsel in 1978. You see, the agencies have known for 20 years that this scheme is unconstitutional. Their own lawyers told them so. That is why you never hear them mention the First Amendment in their presentations to you. COMPUTER SOFTWARE IS PROTECTED EXPRESSION The key point in our case, and in your consideration of any proposed legislation, is that source code is protected expression for purposes of the First Amendment. On this point, the administration largely agrees. Let me repeat that--the Administration has not denied that in regulating computer software it is also regulating the "expressive activities" of Americans. This conclusion, which is obvious to anyone who has ever written or read a computer program, is also consistent with what Congress has repeatedly acknowledged. Software is treated as identical to other forms of protected expression in both the Copyright Act and the Freedom of Information Act. From a legal standpoint, the Bernstein case is not complex, nor does it break any dramatic new ground. It simply asks the courts to recognize that the First Amendment extends to science on the Internet, just as it does to science on paper and in the classroom. For it is this scientific freedom which has allowed us to even have an Internet, as well as the many other technologies which we enjoy today. OTHER FIRST AMENDMENT TESTS WHICH CRYPTOGRAPHY REGULATION MUST MEET Up to this point everything I've said isn't just my opinion. It's been decided by the Federal District Court. My legal team and I believe that there are other strong Constitutional reasons which prevent the regulation of cryptographic software. The District Court did not need to address these additional reasons, since it agreed with us that the first alone was sufficient to invalidate the regulations. In addition to procedural protections, the Constitution requires that any regulation which institutes a licensing scheme, or any other form of prior restraint, pass the strictest of tests. Even a claim of national security or public safety must be carefully weighed against our fundamental rights, and must be supported with hard evidence of direct, immediate and irreparable harm, not just conjecture and a few frightening scenarios. Further, aside from prior restraint, a scheme which targets speech on the subject of cryptography and treats that speech differently from speech on other topics must pass the tests of strict scrutiny--that the regulation address a compelling government interest and be narrowly tailored to reach only that interest and no further. That is, the government's concern about national security cannot reach so broadly as to prevent law-abiding citizens from having access to software which they can use for completely lawful purposes. Put into another context, it means that the government cannot require all of us to deposit our house keys with them on the off chance that one of us is a criminal. Further, the government must prove that their restrictions on speech actually meet their goals. Here, such proof would be difficult since terrorists, pedophiles and drug dealers can simply purchase or download strong German, Swiss or Japanese encryption software that is freely available all over the U.S. and the world--over 500 at last count. If necessary, criminals could even type in or scan one of the computer programs printed in the many books published on the subject. THE ADMINISTRATION'S LEGISLATIVE PROPOSALS FAIL THESE FIRST AMENDMENT TESTS Neither the current scheme nor any administration-supported, so-called "compromise" schemes proposed so far addresses these First Amendment problems. And even the SAFE bill, which is well-intentioned, fails to contain an assurance of judicial review of any agency decision to prevent publication due to alleged national security concerns, a key element required by the Constitution. SAFE also does not clearly protect scientists such as Professor Bernstein, but only protects those who seek to distribute mass market software already available abroad. This means that American scientists can no longer participate in the ongoing international development of this vital and important area of science. ENCRYPTED SPEECH IS STILL SPEECH In addition, we believe that regulation of encryption software and technology violates the First Amendment because of what encryption does. Encryption allows people to use electronic envelopes to protect their speech. The Supreme Court has noted that a state could not regulate ink or paper without raising constitutional concerns. We believe that similarly the government cannot prevent Americans from using electronic envelopes or require them to use key-escrowed envelopes without violating their First Amendment rights. This is because such rules compel them to speak to the Government anytime they wish to speak to anyone else. Encrypted speech is still speech. The elimination of privacy creates a chilling effect on that speech which implicates the First Amendment. ENCRYPTION WAS USED BY THE FOUNDING FATHERS In fact, in our research for this case we have discovered that the Founding Fathers used cryptography on a regular basis. Even the Constitution and the Bill of Rights themselves were often encoded, as Thomas Jefferson and James Madison exchanged drafts of those seminal documents. Cryptography was used by a virtual Who's Who of the American Founding Fathers--not only Jefferson and Madison but Benjamin Franklin, Alexander Hamilton, John and Abigail Adams, Aaron Burr, and many others. In sharp contrast to the Administration's arguments today, they viewed cryptography as an essential instrument for protecting information, both political and personal. Our research indicates that when the First and Fourth Amendments were enacted in the late 1700s, any suggestion that the Government should have the ability to prevent individuals from encrypting their messages, or that the Government should have a back-door key to all encrypted messages, would have struck the Constitution's framers as ridiculous. CONCLUSION In sum, our legal challenge to the current restrictions on encryption software is succeeding. It is succeeding because the First Amendment is clearly violated when the government institutes a prepublication licensing scheme which allows agency bureaucrats unfettered discretion to prevent American scientists from publishing their own ideas. It is succeeding because the Courts have recognized the importance of keeping the First Amendment intact as we move into the information age. As you consider the many legislative proposals about cryptography, we hope you will do the same. ****************************** Cindy A. Cohn, Cindy at McGlashan.com McGlashan & Sarrail, P.C. 177 Bovet Road, 6th Floor San Mateo, CA 94402 (650) 341-2585 (tel) (650) 341-1395 (fax) From nobody at REPLAY.COM Mon Mar 16 20:47:29 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 16 Mar 1998 20:47:29 -0800 (PST) Subject: Prologue 8/0 Message-ID: <199803170447.FAA15608@basement.replay.com> SAHMD -- Prologue 8/0 --------------------- Note from a disinterested party: A quick perusal of the various chapters of "Space Aliens Hide My Drugs" indicates to me that Timothy C. May will be unable to understand the chaotic YoungEsque structure of this release of the manuscripts, whereas John F. Young will be unable to understand the serious, grounded basis of rationale behind the often confusing, shot-gun blatherings being perpetrated upon the reader (unless, of course, JFA reads it during one of his drug-free periods during which he maintains one of the most detailed and pertinent databases ever assembled, concerning the privacy, security, and freedom issues of the day). Thus I will take it upon myself to interpret the current Circle of Eunuchs manuscript which is being spammed upon the Cypherpunks mailing lists in the interests of ensuring that sanity and decorum do not gain the upper hand among the spooks, psychotics, sociopaths and nuclear physicists who use the list to vent male hormones which exceed the level which normal society finds acceptable. ***** For starters, "Space Aliens Hide My Drugs," although often spoke of by the Author as the title of h/is/er evenutal autobiography, was begun by an entity who was either attempting to provide cover-fire for the son of gomez during his TruthMonger Soft-Target Tour, or by an agent of a government agency which was monitoring that tour. Analysis of the opening chapters show conclusively that they were written on an early version of a Sperry computer, using WordPerfect 4.2. The computer in question had =~= 256K of RAM, situated on an add-in board. Prologue 1/0 ------------ Written by someone with a comprehensive knowledge of the Author's background, but with subtle self-denigrating slams against his character and history which suggest it was written by someone whose goal was to cast the Author in a negative light which goes far beyond that which the Author h/im/erself reveals in the process of viewing h/is/er life with basic objectivity. The increasingly violent rhetoric, combined with a challenge to a female member of the Cypherpunks whom the Author holds in the utmost respect, tends to confirm that this chapter was initiated, not by a fellow initiate into the Circle of Eunuchs, but by a member of one of the agencies monitoring h/im/er, in the hope that s/he would eventually 'take the bait' and continue h/is/er autobiography in an open and forthright manner which would lead to an increasing quantity of evidence concerning h/is/er state of mind which could be legally used during the course of government prosecution. Prologue 2/0 ------------ This was introduced by a post, allegedly from L. Reed, which seemed to have a purpose only of implicating Ms. Reed and J. Tolkoff in the writing and desemination of the SAHMD manuscript. Prologue 2/0, proper, is written from the point of view of someone who was surrupticiously monitoring CJ Parker's attendance at a Bay-Area Cypherpunks physical meeting. Its goal seems to be to legitimatize the character and activities of C2Net and its raghead leader, Sameer, in a way that goes totally contrary to the Author's view of them as shadowy entities in league with the Evil One. Prologue 3/0 & 3a/0 ------------------- All indications are that this chapter was written by, or under the direction of, Larry Joe Dowling, the Austin attorney who flew to Las Vegas to warn old Doc Parker that his autobiography had been set in motion by government entities which were working against his self-interests. Only Dowling would have likely been familiar with the persona known as Justin Case, a musician that Parker met only one time, at a late- night picking/drinking session at Dowling's residence outside of Austin. Only Dowling would have been likely to recognize the close affinity between "The Electronic Privacy Papers" and "Paper Prison." Prologue 4/0 ------------ Analysis of past communications between toto at sk.sympatico.ca and camcc at abraxis.com indicate that this chapter was written by Alec McCrackin, a Circle of Eunuchs member purportedly working as a CoE double agent, deep within the bowels (this week's 'catch phrase') of the BXA in Georgia, but actually a triple-agent working to expose the source and goals of the 'True Story of the InterNet' manuscripts, as well as a quadruple-agent working for MI9 and pulling down some serious money collecting all of those paychecks... Prologue 5/0 ------------ Written by Bianca, a CoE member renowned far and wide for a pair of stand-up titties that men would abandon thrones and fortunes for. "The Story Thus Far: (Or so we would have you believe...)" is a classical trademark of the woman who has 'monitored the monitors' since her initiation into the Circle of Eunuchs, and who has provided much of the insider information that is openly disseminated in 'The True Story of the InterNet" manuscripts, surrounded by details which seem outlandish and overblown to those who have never experienced the true depth of the mystery and intrigue taking place behind the scenes of what the average person views as reality. Prologue 6/0 ------------ This chapter was ghost-written by a resident of the Home For The Criminally Insane, who transcribed the barkings of the Author's dog, Baby (aka - MongrelMonger), who claims to be a Fox Terrorist. Baby is purported to be the inspiration behind the soon-to-be worldwide phenomena known as the Army of Dog. Prologue 7/0 ------------ Written by Kent Crispin, a CypherPunk who was torn between his work as a Government Schill (TM) and his obligations as a full initiate of the Circle of Eunuchs, until he received a private email from the Author, stating that Kent was welcome to 'rat me out' at any given point in time in order to protect his family, with the explaination from the Author that, 'I am expendable--that's my role in the CoE.' Prologue 8/0 ------------ This chapter was not written by me...it is an obvious forgery... From nobody at REPLAY.COM Mon Mar 16 21:08:32 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 16 Mar 1998 21:08:32 -0800 (PST) Subject: If Tim May fucked John Young, the progeny would write... Message-ID: <199803170507.GAA18728@basement.replay.com> Excretion from Prologue 7/0 of Space Aliens Hide My Drugs: The only hope for Netizens to resist becoming Digital Sheeple behind the ElectroMagnetic Curtain which the forces of censorship/repression are striving to put in place is for each member of the coming Army of Dog to mark their meatspace and cyberspace territory and refuse to go gently into the night when the Oppressor attempts to scare them into submission with a mountain of laws and regulations which promise unjust persecution for imaginary offenses. A Global InterNet Army of individuals committed to freedom must strive to create a maximum entropy within which the chaos of semiotic evolution can break the digital chains which the Statist Oppressors are seeking to use to bind and repress access to information, global communication, free speech/expression, and the evolution of the Universal Life Energy, itself. From etmp at etmp.com Mon Mar 16 21:14:05 1998 From: etmp at etmp.com (etmp at etmp.com) Date: Mon, 16 Mar 1998 21:14:05 -0800 (PST) Subject: Eventemp (ETMP) - Stock Ready To Take Off!!! Message-ID: <199803170513.VAA03325@toad.com> To be removed from our mailing list please reply with "REMOVE" in the subject. Visit http://www.jtsr-stock.com or call 888-295-6365 For Complete Information. **** NEWS FLASH **** 2/20/98 Analysts correct - JT's Stock price up 40% from Feb. 17, 1998 to Feb. 20, 1998 - JT's is still the "Ground Floor Oppoprtunity" - The growth remains ahead Who said opportunity only knocks once. JT's Restaurants is growing by leaps and bounds. Under valued stock situation presently $3.00 per share. Analysts predict stock will reach $5 to $6 this spring and could go up to $10.00 by end of 1998. Stock symbol JTSR on OTC BB. "THEN and NOW" An investment of $100.00 in Mcdonalds in 1955 would NOW be worth over $1 million today. No one knew THEN. Visit us at http://www.jtsr-stock.com or call 1-888-295-6365. The contents of this message have been provided for the review of potential investors only and does not constitute an offering of securities. From StanSquncr at aol.com Mon Mar 16 21:43:56 1998 From: StanSquncr at aol.com (StanSquncr) Date: Mon, 16 Mar 1998 21:43:56 -0800 (PST) Subject: On Cypherpunks Message-ID: I just want to say, with all the "nobody's" and "anon's" running around attacking folk in private, I feel right at home (just like any other list on the net, the "Know-nothings" are all over the net). And I'd like to apologize for my comments directed towards the list when I first came, I was rather prejudice (against EVERY list) at the time, and my compliments to the cypher's for your apparent open-mindedness. It's cool to be here, Stan, Stan and the Sequencers From etmp at etmp.com Mon Mar 16 23:36:08 1998 From: etmp at etmp.com (etmp at etmp.com) Date: Mon, 16 Mar 1998 23:36:08 -0800 (PST) Subject: Eventemp (ETMP) - Stock Ready To Take Off!!! Message-ID: <199803170735.XAA11611@cygint.cygnus.com> To be removed from our lists please reply with "REMOVE" in the subject. Visit http://www.etmp.com or call 1-888-295-6365 for full details. Eventemp markets an a new system that allows your car to be preheated or precooled with a touch of a button without using the cars engine. Eventemp has received several major large contracts over the last few weeks including one from the largest Cadillac dealership in the United States. This will generate a huge revenue stream for Eventemp and make it a very profitable company. Eventemp predicts that profits will be in the millions based on the contracts recently signed. Check company news at http://www.etmp.com for full stories. It is believed that this stock will double in value from current price of $3.50 in the near future. This is a ground floor opportunity. Eventemp owns all the patents to the technology used. Once again - Visit http://www.etmp.com or call 1-888-295-6365 for full details. From dean at intergal.com Tue Mar 17 02:00:14 1998 From: dean at intergal.com (dean at intergal.com) Date: Tue, 17 Mar 1998 02:00:14 -0800 (PST) Subject: Add 90 minute streaming movies for FREE - just link ! Message-ID: <199803170947.BAA01890@amateurextreme.com> Hi Webmaster, Thanks for including your name on our mailing list. The contents and links from this email are only intended for adult webmasters. If you wish to be removed go to < http://209.1.31.42/remove.html > and enter the email address that you wish to have removed. New from Intergal we are pleased to announce FREE content for your website. We are offering 1. Hidden Camera Feed 2. 90 Minute Full motion movie online with sound. 3. 50 Streaming Videos 4. 240 Daily Video Clips All these are yours FREE. All of these feeds are served from our servers and using our bandwidth - NO cost to you . Increase your signups if you are a paysite and bookmarks if you are a free site. The Sign up URL's and linking details are below. ******************** Free sites and paysites both welcome 90 Minute movie with sound just link to this page - and you are set up ! < http://209.60.195.160/secure6/ > ********************** Free sites and paysites both welcome Hidden Camera Feed link to this page - and you are ready to go ! < http://163.125.19.250/Cgi-Win/Playgal.exe > *********************** Free Sites and Paysites both Welcome 240 Clips a Day - Changes everyday - Sample -� http://www.virtualgirlz.com or for Gay go to http://www.virtualgirlz.com/freeholio/gay.html and then sign up here http://www.zanepix.com/240free.html ********************************* Paysites Only 50 Streaming Movies sign up here and you will be activated within 24 hours. http://video1.ibroadcast.net/50free/ *********************** Password protection Protect your site from password traders http://www.pennywize.com *********************** Earn cash for your traffic - paid every 2 weeks http://www.intergal.com/nfa http://www.unfaithful.com/easycash ********************** Get up to 10,000 hits back submit a pic to http://picturepost.com Intergal is a reputable company and operates one of the largest adult networks with over 500,000 front page hits a day. If you have any questions please contact dean at intergal.com regards Dean CEO Intergal From gwb at gwb.com.au Tue Mar 17 03:35:51 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Tue, 17 Mar 1998 03:35:51 -0800 (PST) Subject: Pauline Hanson's One Nation update Message-ID: <1.5.4.32.19980217095822.006d3428@mail.pronet.net.au> Dear One Nation Supporter in New South Wales, Hard copy of Helen Dodd's book: ============================== I was surprised to learn that small number of the limited edition, numbered (150) copies of Helen Dodd's book "Pauline, the Hanson Phenomenon" signed by Pauline Hanson are still available. They will definitely be sold out after this post so get in quick. The cost is Au$75 each and send you emails to: camint at geocities.com (As a matter of interest a $20 copy of Pauline Hanson's "The Truth" recently sold for $250.) ++++++++++++++++++++++++++++++++++ One Nation birthday party: ========================= For those of you ***who are members of Pauline Hanson's One Nation*** we are holding a celebration of the party's first anniversary over the Easter Weekend (April 10-12) on Pauline's rural property near Ipswich in South East Queensland. In true Australian style camping and bar-b-ques under the starlit sky will be the order of the day. There will be competitions, entertainment like bush dancing, karaoke and horse racing - and much, much more. If you are interested please contact (07) 3369 8214, 3848 2197, 3399 6662 or 3399 6901 for details. Costs range from $25 per day for adults or just $45 for the three. Families from $55 for the one day to $85 for the three. Book before you put this one in your diary - once again very limited numbers! Max of 400 people to be accepted. +++++++++++++++++++++++++++++++++ Raffle tickets going fast: ========================= The first prize is a QANTAS Global Explorer Holiday for two valued at $12,000 - a 23 day trip visiting Paris, London, New York, Los Angeles, Anaheim and Honolulu. The second prize is a 7 day holiday to Hawaii at the Outrigger Reef Hotel for two - value $5,000. The third prize is a 7nights stay at the Novotel Palm Cove at Cairns - value $3,000. You can order a book of 5 tickets (minimum) at $10 per book (or $2 per ticket) by credit card by phoning 1800 620088. Winner's names being drawn at One Nation's Birthday Party at 7pm on April 11th 1998. Winners will be notified by phone and mail with the results being published in the Sydney Morning Herald on Friday 17th April 1998. Order now while tickets remain! ++++++++++++++++++++++++++++++ Finally important Internet addresses: Pauline Hanson's One Nation: http://www.gwb.com.au/onenation One Nation Press Releases (about 10 in the last month): http://www.gwb.com.au/onenation/press/ One Nation on-line history (the first year): (We will be updating this site live from the party on Pauline's property during the Easter weekend in April): http://www.gwb.com.au/gwb/news/history GWB Scott Balson From jya at pipeline.com Tue Mar 17 06:11:43 1998 From: jya at pipeline.com (John Young) Date: Tue, 17 Mar 1998 06:11:43 -0800 (PST) Subject: Will New Sendmail Block Remailers? Message-ID: <1.5.4.32.19980317141322.006c25cc@pop.pipeline.com> Markoff in the NYT reports today on the release of a new Sendmail upgrade by author Eric Allman that will block spam by checking the legitimacy of the originating address before delivery. The report claims that spam is up to 10% of e-mail worldwide, And that Sendmail is used on 75% of the computers that route e-mail, all of which are being fitted with the new program. What are the chances that this will affect remailers or other means of eternal anonymity? Except Sualk, GL, UB and Nuh, all of whom we now know are Otot GinPu Tca as those crazy Syug Irtmid Irun. From nobody at REPLAY.COM Tue Mar 17 06:12:12 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 17 Mar 1998 06:12:12 -0800 (PST) Subject: No Subject Message-ID: <199803171412.PAA17815@basement.replay.com> 3/17/98 A note to Cypherpunks: Today I was sent a missive ostensibly from Mr. Toto. Following are the particulars: [begin quote] Return-Path: Received: from harrier.sasknet.sk.ca (harrier.sasknet.sk.ca [142.165.5.2]) by camel10.abraxis.com (8.8.5/8.8.5) with ESMTP id XAA02654 for ; Mon, 16 Mar 1998 23:42:42 -0500 (EST) Received: from uymfdlvk (regnsk01d05020132.sk.sympatico.ca [142.165.24.84]) by harrier.sasknet.sk.ca (8.8.6/8.8.6) with SMTP id WAA21157; Mon, 16 Mar 1998 22:40:54 -0600 (CST) Message-ID: <350E1A48.6C00 at sk.sympatico.ca> Date: Mon, 16 Mar 1998 22:38:01 -0800 From: Toto Reply-To: toto at sk.sympatico.ca To: Replay Anonymous remailer [end quote] For health reasons I removed myself from the list several months ago; now it appears the errors of my youth have returned to haunt me. I had assumed either the RCMP, CIA, FBI, KGB, ASPCA, or some other local authority had plucked Toto from the Web. Alas, this latest message, SAHMD -- Prologue 8/0, indicates the torment continues unless, of course, it is a forgery. But then, Mr. T. has been known to forge messages he has signed and send them direct with screwed up Anon: headers. This must stop. Whom should I contact to complain about such harrassment? My head is hurting again for the first time in months. Alec From billp at nmol.com Tue Mar 17 06:31:12 1998 From: billp at nmol.com (bill payne) Date: Tue, 17 Mar 1998 06:31:12 -0800 (PST) Subject: BIOS, FBI/ERF, Barbara Boxer, Message-ID: <350E871B.2E74@nmol.com> Tuesday 3/17/98 6:29 AM Charles Christopher, FBI/NY http://www.fbi.gov/fo/nyfo/nytwa.htm John Gilmore Christopher, I received a phone call Monday morning. The caller asked me to modify my resume to reflect my experience with PC BIOS. I added the following lines. Attended Annabooks University week-long course on ROMing BIOS in 1992. Sixteen years experience interfacing high-level languages to BIOS. Reverse engineering BIOS and DOS for Sandia Labs weapons controller. Custom BIOS modifications experience for electronic locks for the FBI/Engineering Research Facility using Pentium processors. The FBI paid my course tuition for the Annabooks course. http://www.annabooks.com/ I learned several months after Sandia manager Tommy Sellers, who was entering the crypto business, and ombudsman Harvey Brewster gave me a directed transfer to break electronic locks for the FBI that the FBI DOES NOT GET COURT ORDERS to do normally illegal work. The FBI my FBI/ERF supervisors, Mike Uttaro, and his boss Mike McDevitt told me that they believe that the above work is CLASSIFIED SECRET. http://www.fbi.gov/ I think that we should get this matter settled before it GETS WORSE. Gilmore, I saw at http://www.jya.com/acp-pols.htm BOXER CONTINUES EFFORTS TO OPPOSE U.S. EXPORT LIMITS ON COMPUTER ENCRYPTION March 4, 1998 WASHINGTON, D.C. -- U.S. Senator Barbara Boxer (D-CA) joined Americans for Computer Privacy and a delegation of bipartisan lawmakers at a news conference today to oppose U.S. export limits on encryption technology. The following is Senator Boxer�s statement. �Since the high-tech revolution, Americans have learned that privacy protection is of the utmost importance. Encryption technology is a key component in protecting our privacy - it is the lock on the door that guarantees not only our privacy, but often our safety as well. Boxer also is known for the following quote �Those who survived the San Francisco earthquake said, �Thank God, I�m still alive.� But, of course, those who died, their lives will never be the same again.� - Representative Barbara Boxer, after the 1994 [sic] earthquake Weird History 101 John Richard Stephens http://www/adamsmedia.com Sandian Ron Pate and I were seated in a SF airport satellite area during that earthquake. Pate and I worked on electronic tagging for the CTBT. This used public key crypto. I used the Cylink CY1024 for that project. Electronic locks are mostly connected to Pcs. The PC keeps both a printed record and disk log entrys. Electronic lock programmers do not and cannot rewrite an operating system. Therefore, the simplest way to defeat an electronic lock is to modify BIOS. Intercept the electronic lock programmer call to BIOS, look for a known credential, open the door, and suppress the writes to printer and disk. Not too tough to do. But I was told to modify MANY SYSTEMS which I could NOT DO. Hirsch, CardKey, Sensor engineering, .... I was being set up to fail. Looks like your legal stuff is paying off in political support. Let�s hope we get this crypto mess settled so that we can all move on to more constructive projects. Later bill From nobody at REPLAY.COM Tue Mar 17 06:37:31 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 17 Mar 1998 06:37:31 -0800 (PST) Subject: "Must refrain from using a mind": A(h)OL's son Message-ID: <199803171437.PAA21913@basement.replay.com> Information Violation wrote: > > from the Bienfait Rectal Examiner: > _________________________________________________________________ > > A(h)OL, a long, chubby dick with a thick mustache, has pleaded not > present to two felony counts alleging possession of cryptographic material > with the intention of ciphering or deciphering. > > If convicted, he faces up to six lifetimess in prison. > > He pleaded not present Wednesday and is free on his own recognizance, > subject to some unusual conditions: that he obey authority, stay away > from words, refrain from possessing or using a mind and get > psychopathological torture. > > Opening the back door of Jim Morrison's former home on a trimmed > cul-de-sac, A(h)OL, his face reflecting anarchy for a few seconds, > declined a donut and shut the door. > > A(h)OL's attorney, Adrian Messenger, said the persecution's theory of > reality was probably the result of 'bad acid.' His client, a > childless bachelor, with two sons, "is a 47-year-old turd," he said. > "He's not a cryptographer. He stays stoned a lot, and he's a pretty > recessive pervert." > > Adrian said A(h)OL "strikes me as an acutely illiterate guy who > wouldn't hurt a word. He hasn't got the social grace or skills of > one who would try subtly to peek up a female cryptographer's skirt > to see if she was wearing panties." From jya at pipeline.com Tue Mar 17 06:45:44 1998 From: jya at pipeline.com (John Young) Date: Tue, 17 Mar 1998 06:45:44 -0800 (PST) Subject: GSM Interception Message-ID: <1.5.4.32.19980317144733.01052c04@pop.pipeline.com> Below is one of the most comprehensive and informative sites we've seen on telephonic snooping, with nation by nation accounting of technologies, laws, disinformation, deception, complicity, commerce and teletone opps for MH-moola ka-chinka chinka: From: "UT11" To: Date: Tue, 17 Mar 1998 15:07:50 +0100 Actually 100 Millions of GSM Are Geographically & Automatically Tapped and Stored 4 Months http://www.ii-mel.com/interception http://www.dejanews.com (keyword: location GSM, title: interception) From rhayden at means.net Tue Mar 17 06:57:14 1998 From: rhayden at means.net (Robert A. Hayden) Date: Tue, 17 Mar 1998 06:57:14 -0800 (PST) Subject: Will New Sendmail Block Remailers? In-Reply-To: <1.5.4.32.19980317141322.006c25cc@pop.pipeline.com> Message-ID: On Tue, 17 Mar 1998, John Young wrote: > Markoff in the NYT reports today on the release of a new > Sendmail upgrade by author Eric Allman that will block > spam by checking the legitimacy of the originating address > before delivery. > > The report claims that spam is up to 10% of e-mail worldwide, > And that Sendmail is used on 75% of the computers that route > e-mail, all of which are being fitted with the new program. > > What are the chances that this will affect remailers or other > means of eternal anonymity? Depends on how the remailer is set up. For example, I own the domain "geek.net". If I set up a remailer and messages resolve to "anonymous at geek.net", I suspect it will get through. I may need to also have an alias that /dev/nulls messages to anonymous at geek.net, but that is still a legitimate mailing address. I think what they are trying to stop are spammers that have a return address like "fakename at fakedomain.com" or "your at best.friend". Those wouldn't resolve and would just get shitcanned. IMHO, there's nothing _toooo_ sinister here, yet. But vigilance is suggested. =-=-=-=-=-= Robert Hayden rhayden at means.net UIN: 3937211 IP Network Administrator http://rhayden.means.net MEANS Telcom (612) 230-4416 From Mia.Westerholm at DataFellows.com Tue Mar 17 07:12:30 1998 From: Mia.Westerholm at DataFellows.com (Mia Westerholm) Date: Tue, 17 Mar 1998 07:12:30 -0800 (PST) Subject: Data Fellows Lauches New Version of the Famous F-Secure SSH Products Message-ID: <3.0.2.32.19980317160523.00c5fa18@smtp.DataFellows.com> Data Fellows Ltd. Media Release For immediate release 17 March 1998 DATA FELLOWS LAUNCHES NEW VERSIONS OF THE FAMOUS F-SECURE SSH PRODUCTS The improved F-Secure SSH product family is a unique tool for secure remote systems administration ESPOO, FINLAND --- Data Fellows, a leading provider of Internet security solutions, has launched new versions of its famous F-Secure SSH products. F-Secure SSH Tunnel&Terminal and F-Secure SSH Server protect TCP/IP-based terminal connections in UNIX, Windows and Macintosh environments. They enable remote systems administrators and telecommuters to access corporate networks via any Internet Service Provider without revealing system passwords and other secrets to possible eavesdroppers. "In addition to providing secure login connections, F-Secure SSH Server secures all remote systems administration tasks by providing secure tools to replace the existing rsh, rlogin, rcp, rdist and telnet protocols," says Mr. Olli Voima, Product Development Manager of F-Secure SSH. "As a new feature, the secure file transfer application offers an easy-to-use graphical interface for the safe transfer of files." F-Secure SSH Tunnel&Terminal and F-Secure SSH Server support the forwarding of TCP/IP services like pop, smtp (used by e-mail software), http (used by Web browsers), etc., or almost any other TCP/IP-based service. The local proxy server in F-Secure SSH Tunnel&Terminal listens for a socket on the desired port and forwards the request and data over the secure channel. It then instructs the F-Secure SSH Server to make the connection to the specified service on the remote machine. Automatic forwarding of the X11 Windowing System secures graphical applications. F-Secure SSH products are based on the SSH protocol, an application level security mechanism used in conjunction with Internet protocols. "The SSH protocol is the most widely audited and standardized security protocol in the world," says Mr. Voima. "Its strong end-user authentication and encryption leave no room for security compromises. As a European company, Data Fellows is not restricted by the US export regulations, and has thus been able to make strong encryption available worldwide. F-Secure SSH host authentication is based on 1024-bit RSA keys, and the secure connections use 128-bit session keys." In addition to being strongly secured, the F-Secure SSH products are easy to use. The single sign-on technology makes the handling of multiple terminal sessions simple. Says Mr. Voima: "Easy-to-use and strongly secured, F-Secure SSH is a truly unique security solution for remote systems administration." About Data Fellows: Data Fellows is one of the world�s leading developers of data security products with offices in San Jose, California and Espoo, Finland. Its groundbreaking F-Secure product family is a unique combination of globally available, strong encryption and revolutionary anti-virus software. The integrated F-Secure product range provides a complete security solution for enterprises, and includes file encryption and IPSec communication encryption products, VPN gateways, SSH based secure remote management software, and a full range of anti-virus products to workstations, servers and gateways. Data Fellows is also the developer of the award winning F-PROT Professional anti-virus, now part of the dual scanning engine concept of F-Secure Anti-Virus. Data Fellows is privately owned. Since it was founded in 1988, its annual net growth of net sales has been over 80%. Data Fellows offers a worldwide network of technical support, training and distribution in over 70 countries. Data Fellows belongs to an elite group of companies that have a triple-A rating from Dun&Bradstreet. For further information, please contact: Mr. Olli Voima, Product Development Manager Tel. +358 9 859 900, Fax. +358 9 8599 0599 E-Mail: Olli.Voima at DataFellows.com or visit out website at http:// www.DataFellows.com ALSO, VISIT OUT BOOTH AT CEBIT�98 (HALL 3, STAND B46) ���������������������������������������������������� Mia.Westerholm at DataFellows.com http://www.DataFellows.com Data Fellows Ltd. PL 24 FIN-02231 ESPOO, FINLAND Tel. +358 9 859 900 Fax. +358 9 8599 0599 From whgiii at invweb.net Tue Mar 17 07:41:04 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Tue, 17 Mar 1998 07:41:04 -0800 (PST) Subject: Will New Sendmail Block Remailers? In-Reply-To: Message-ID: <199803171540.KAA00760@users.invweb.net> In , on 03/17/98 at 08:58 AM, "Robert A. Hayden" said: >On Tue, 17 Mar 1998, John Young wrote: >> Markoff in the NYT reports today on the release of a new >> Sendmail upgrade by author Eric Allman that will block >> spam by checking the legitimacy of the originating address >> before delivery. >> >> The report claims that spam is up to 10% of e-mail worldwide, >> And that Sendmail is used on 75% of the computers that route >> e-mail, all of which are being fitted with the new program. >> >> What are the chances that this will affect remailers or other >> means of eternal anonymity? >Depends on how the remailer is set up. >For example, I own the domain "geek.net". If I set up a remailer and >messages resolve to "anonymous at geek.net", I suspect it will get through. >I may need to also have an alias that /dev/nulls messages to >anonymous at geek.net, but that is still a legitimate mailing address. >I think what they are trying to stop are spammers that have a return >address like "fakename at fakedomain.com" or "your at best.friend". Those >wouldn't resolve and would just get shitcanned. >IMHO, there's nothing _toooo_ sinister here, yet. But vigilance is >suggested. Well I think this may add to the problem. All the spamers need to do is start faking real e-mail addresses in the headers. So now you will have alot of users bearing the brunt of anti-spam attacks and complaints who had nothing to do with it. -- --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html --------------------------------------------------------------- Tag-O-Matic: PATH=C:\DOS;C:\DOS\RUN;C:\WIN\CRASH\DOS;C:\ME\DEL\WIN -------------- next part -------------- A non-text attachment was scrubbed... Name: pgp00003.pgp Type: application/octet-stream Size: 339 bytes Desc: "PGP signature" URL: From jya at pipeline.com Tue Mar 17 08:36:13 1998 From: jya at pipeline.com (John Young) Date: Tue, 17 Mar 1998 08:36:13 -0800 (PST) Subject: Local Law Oppose FBI on Crypto Message-ID: <1.5.4.32.19980317163801.0071eac8@pop.pipeline.com> A point made at Senator Ashcroft's crypto hearing going on now, made by James J. Fotis, of the Law Enforcement Alliance of America, is that many local police departments do not want the FBI and federal agencies snooping on them, thus, they oppose the FBI's stance on crippled crypto. To be sure, they may fear the feds because of local corruption, but it's a crack in the blue wall solidarity that the FBI has heretofore vaunted. Listen in by RealAudio: http://www.computerprivacy.org/archive/03171998-1/ From ryan at michonline.com Tue Mar 17 08:59:13 1998 From: ryan at michonline.com (Ryan Anderson) Date: Tue, 17 Mar 1998 08:59:13 -0800 (PST) Subject: Will New Sendmail Block Remailers? In-Reply-To: <1.5.4.32.19980317141322.006c25cc@pop.pipeline.com> Message-ID: > Markoff in the NYT reports today on the release of a new > Sendmail upgrade by author Eric Allman that will block > spam by checking the legitimacy of the originating address > before delivery. > > The report claims that spam is up to 10% of e-mail worldwide, > And that Sendmail is used on 75% of the computers that route > e-mail, all of which are being fitted with the new program. > > What are the chances that this will affect remailers or other > means of eternal anonymity? As long as this feature isn't turned on, on the remailers, not at all. All the remailers use a replyable e-mail as the from field, they ust dumpe anything e-mail to that, so if Sendmail goes out and does a VRFY on an e-mail, it'll work, but not mean a heck of a lot.. All it really does is force spammers to search for someone's real address to spoof and harass. (They can just scan usenet, and pick on random people if they want..) Ryan Anderson - Alpha Geek PGP fp: 7E 8E C6 54 96 AC D9 57 E4 F8 AE 9C 10 7E 78 C9 "With this word of power, I cast thy soul into the void: (void)soul" print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <199803171722.MAA01561@users.invweb.net> In , on 03/17/98 at 11:58 AM, Ryan Anderson said: >All it really does is force spammers to search for someone's real address >to spoof and harass. (They can just scan usenet, and pick on random >people if they want..) Yep, it's not like they are short on valid e-mail addresses. -- --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html --------------------------------------------------------------- Tag-O-Matic: Program call to load Windows- "Here_piggy_piggy_piggy" -------------- next part -------------- A non-text attachment was scrubbed... Name: pgp00004.pgp Type: application/octet-stream Size: 339 bytes Desc: "PGP signature" URL: From RDonnovan at hotmail.com Tue Mar 17 11:47:46 1998 From: RDonnovan at hotmail.com (RDonnovan at hotmail.com) Date: Tue, 17 Mar 1998 11:47:46 -0800 (PST) Subject: VIABLE PRODUCT, VIABLE OPPORTUNITY Message-ID: <199803171947.LAA14002@cygint.cygnus.com> Every Day Cash Plan �You OWN the copyrights to the program! �You sell the program for any amount you wish �You are not part of any company, downline or MLM �One time fee- $20 �Once you buy, I don't forget you- the program includes my support BBS. Any questions or difficulties you encounter, you contact me personally. First question you are likely to ask- is this "junk mail?" Read on to see why it is not another "$3000 in 5 minutes" scam. ----FREE----FREE----FREE----FREE---- REGISTERED version of NetContact Retails for $300 and up This bulk E-mail software will EXPLODE your business ----FREE----FREE----FREE----FREE---- That is all I do! I earn $140, $200, even $250 a day mailing out the exact same sales letter! There is absolutely no catch or crazy gimmick involved here, I promise you. This has nothing to do with any order-based envelope stuffing program, illegal chain-letter scam or worthless multi-level scheme! Why does it work? You OWN the rights, and are free to do with the program as you please. You keep EVERYTHING you make. No boss, no downline. Owning copyrights to any information is a valuable commodity- this is why you will receive around a 50% response rate on your ads. There is not an easier way to make $140 a day than this- if you would like to gain financial independence and success, listen up... I tried every moneymaking plan under the sun. After a couple years of constant attempts at striking it rich, I had done nothing but strike out. I tried multi-level marketing... I failed! I tried chain letters... They failed me! I tried envelope stuffing... Ridiculous! I figured I could afford the $30 or $40 for each of the programs I tried; until I realized not only does that build up, but I was making no money in the mean time. Needless to say, living with no positive income quickly equals debt. Luckily a friend informed me of this program, which turned my finances around. It has come to replace the career I was working towards, simply because I make better money in very little time- leaving me time for more important things, like my family. Here is what my 3 diskette program includes: 1) NetContact bulk mail software- REGISTERED 2) Master copies of my Special Sales Letters that make $140 per day 3) Complete business startup guides 4) Complete instructions and internet access to our secret website As you can see, for only $20, you are getting a complete business system with all the support you need! In the past I have licensed this system for $49.95. Available only for Windows95 and NT. cut here____________________________________________ Please rush me your Every-Day Cash Plan!! Enclosed is the $20 dollar cost. Send $20 cash or check to: HyperReal Box 136 2051 Richmond Road Suite 125 Lexington, KY 40502 Make checks or money orders payable to HyperReal Name_________________________________________________ Address_______________________________________________ City__________________________________________________ State/Province______________ Zip/Postal code_______________ Country if other than U.S._________________________________ From declan at well.com Tue Mar 17 12:05:29 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 17 Mar 1998 12:05:29 -0800 (PST) Subject: Local Law Oppose FBI on Crypto In-Reply-To: <1.5.4.32.19980317163801.0071eac8@pop.pipeline.com> Message-ID: At 11:38 -0500 3/17/98, John Young wrote: >A point made at Senator Ashcroft's crypto hearing going >on now, made by James J. Fotis, of the Law Enforcement >Alliance of America, is that many local police departments >do not want the FBI and federal agencies snooping on them, >thus, they oppose the FBI's stance on crippled crypto. The LEAA is part of the Americans for Computer Privacy effort and was listed as one of their member groups at the announcement earlier this month... -Declan From cb at dev.null Tue Mar 17 12:09:16 1998 From: cb at dev.null (Cy Borg) Date: Tue, 17 Mar 1998 12:09:16 -0800 (PST) Subject: BIOS, FBI/ERF, Barbara Boxer, In-Reply-To: <350E871B.2E74@nmol.com> Message-ID: <350EF165.3762@dev.null> Subject: Prologue 7/0 -- SPACE ALIENS HIDE MY DRUGS From: TruthMonger Organization: "It's not FUD until *I* say it's FUD!" To: cypherpunks at toad.com CC: hoffmeyer at mermaid.molbio.ku.dk Prologue 7/0 -- SPACE ALIENS HIDE MY DRUGS ------------------------------------------ Bureau42 wrote: The unifying presence of CJ Parker seems to have disappeared, and the Circle of Eunuchs is in chaos. This is what's left - the cryptic saga, "Space Aliens Hide My Drugs!" I can only wonder what, if anything, this malarchy means. But it's occasionally amusing if nothing else. the bureau42 staff ----- Subject: A.Word.A.Day--chaos Date: Mon, 16 Mar 1998 00:07:19 -0500 From: Wordsmith To: linguaphile at wordsmith.org chaos (KAY-os) noun 1. A condition or place of great disorder or confusion. 2. A disorderly mass; a jumble. 3. Often Chaos. The disordered state of unformed matter and infinite space supposed in some cosmogonic views to have existed before the ordered universe. 4. Obsolete. An abyss; a chasm. [Middle English, formless primordial space, from Latin, from Greek khaos.] "But chaos is a condition of creativity, says Zarathustra - `one must have chaos in one, to give birth to a dancing star.'" Nietzsche, Friedrich Wilhelm, Thus Spake Zarathustra: Part 1. ----- [Note from the Editor: CJ Parker, having had previous experience in playing a woman's role during his stint on 'Baywatch', has gone to ground recently, as have many other members of the Circle of Eunuchs, by re-entering the World of Myth, replacing the Parker woman in the TV series, 'The Pretender' (who died in a plane crash while giving Ron Brown the details of BadBillyC's sexual assault on her). This rather bizarre chain of events was precipitated by a warning he received regarding the return of Adolf Hitler to power, using the same Dimlluminati (The lights are on, but nobody's home...) process which was used to sweep Ronnie RayGuns into power as the chief leader of the Freeh(ee-hee) World. Those who have noticed the stunning blitzkrieg assault of a small college basketball team, Valparaiso, on their opponents in the NCAA tournament currently taking place, may have noticed the striking resemblance of Bryce Drew, their star player, to the child actor who was the main protagonist in the TV series, 'The Wonder Years.' This is no coincidence--they are, in fact, one and the same person. The diabolical process used to implant a respectable, patriotic image of Ronnie RayGuns in the mind of the American people, through the then-developing psychedelic opiate of Cinema/Television, is, in the present case, being extended to reinforce the image of the 'Wonder Boy' in an increasingly global environment, by extending the actor/ image persona into the sports arena--beginning at the college level. ("Win one for the Gipper...") The 'miracle shot' by Bryce Drew to lift the obscure college team to victory over Mississippi was a staged event which required several 'takes' before being successfully captured on film. The scene was shot in the same TV studio in which the original 'moon landing' was filmed. The same choreographers were used who worked on The Oklahoma City Players last major production, the bombing of the Murrah Federal Building. When asked for comment, a former Detroit Piston player who is now the owner of an NBA franchise, but wishes to remain anonymous, said, "If Bryce Drew and Ronald Reagan were black, they would have been just another pair of average actors." Knowledgeable individuals following the Reptilian Nazi conspiracy to emerge from their secret bunkers underneath the AdamAntArctic and Mule Shoe, Texas, recognize this quote as proof that the next step in this diabolical plot is to put the third clone (TV child- actor, college basketball player...-->...) of Adolf Hitler into place as the new 'white hope', replacing Larry Byrd as a member of the Boston Celtics. This shrewd move will help draw together, into a common cause, Fundamentalist Christians, White Supremacists, and East-coast factions of the Irish Republican Army. Circle of Eunuchs members attempting to expose this grand scheme of the Evil One have come under heavy attack recently. Dr. Dimitri Vulis KOTM, who was thrown out of the only CoE meeting he attended, had his InterNet account pulled shortly after putting up web site images of Bryce Drew, of Drew's alleged 'coach/father' and of Adolf Hitler. (Guess who Bryce *really* looks the most like...?) A forth clone of Hitler (rumored to be operating under the code name of 'Lucky Green' and involved in an incestuous relationship with his aunt, E. Christ--currently operating under the alias of Anne R. Christ) is being prepared, within the bowels of the crypto-community, to emerge as the future leader of the New World Order--in the position of Information Monitor/Director of the United Statism of Mind.] ----- Subject: Re: Freedom. (fwd) From: Jim Choate To: cypherpunks at ssz.com (Cypherpunks Distributed Remailer) Forwarded message: > From: Mark Rogaski > Subject: Re: Freedom. > Date: Sun, 15 Mar 1998 23:39:56 -0500 (EST) > : > It's typical of prisoners that they begin to associate with their captors at some > point. Eventualy there is no difference. Congratulations, you've reached that point. > > Equating adaptability for guilt is a shaky bridge and not handled well by > blanket judgements. Actualy it's neither. It's a facet of human nature involved in the survival mechanism. Further, there is no judgement involved, it's an easily verifiable quality of human psychology that prisoners begin to associate with their captors after a short period. What it is in this context is the recognition that prisoners of a political system will after a fashion begin to accept that system. Just look at the cry by many to return to the socialist system after the fall of the CCCP in 1990. ____________________________________________________________________ Those who suppress freedom always do so in the name of law and order. John. V. Lindsay The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- ----- As a consequence the search for a quantitative theory of evolution based at the genetic level, which has been such an obsession for neo-Darwinism ever since the work of Fisher, Haldane and Wright, has been misdirected. As Depew and Weber has expressed it 'natural selection at the level of individuals and the notion of fitness used to measure it, is itself poised on the edge of chaos' (Depew and Weber, 1995): 'The fitness of various sorts of organisms is not necessarily, or even probably, enhanced by superiority in a single trait... In fact, the emergence of the ability to take advantage in resource competitions of an indefinitely number of often infinitesimally small differences creates degrees of freedom, in both the technical and the ordinary senses, well beyond what can be achieved by merely chemical and physical systems. It also creates more variables and interactions among them than can be tracked. It is impossible, then, to reduce the components of fitness to any single language or system of variables' (ibid, 471). The number of possible solutions for selection to scrutinise, and the subtlety of the communicational interactions, will tend to produce a no-win situation. As a result selection cannot really �measure� the stakes of single players (individuals, demes, or species) in the game, but it could still influence the choice of the game itself. Plays, not players, are selected for. ~Jesper Hoffmeyer Biosemiotics: Towards a New Synthesis in Biology European Journal for Semiotic Studies, Vol. 9 No. 2, 1997, pp 355-376. ----- It was the work of Jesper Hoffmeyer, in the field of Biosemiotics, which led to the development of an artificial life/intelligence form capable of self-development/evolution, at Sandia Laboratories--by Reptilian Nazis. Their Cyborg technology had reached the point where it could finally be mass-produced when Bill Payne, a Sandia-NISTA employee, downloaded all the relevant technological files to a fellow Circle of Eunuchs member operating clandestinely within the bowels of a secret government laboratory (code-named 'Lost Alamo' by CoE psychophants). Although the Reptilian Nazis sent the Shadow back in time to eliminate the threat of the Circle of Eunuchs, by eliminating the Author in a sleazy motel room in southern Saskatchewan, the Circle of Eunuchs, taking advantage of the Trei Transponder technology developed by the CypherPunks, made contact with the resident of a Home For The Criminally Insane, in the same era, and used Biosemiotic theory to transfer biological communication-information to a digital implant he had received as part of a government experiment designed to control the minds of the members of the CypherPunks Distributed Remailer lists. The resulting events have long been the basis for certain mythologies concerning the Mythical Circle of Eunuchs, with the basic theme of the CoE reality being mirrored from time to time in the mythology- substitute of the era--Literature/Cinema/Television. (e.g. - Animal Farm, 1984, War of the Worlds, Terminator (I & II), X-Files, Pretender, Millennium, Journey to the East, The Magus, etc.) ---- The Bureau42 statement, "The unifying presence of CJ Parker seems to have disappeared, and the Circle of Eunuchs is in chaos." was an alert to CoE members to pay special attention to a commincation which ultimately came from a CoE collective known as 'WordSmith': "But chaos is a condition of creativity, says Zarathustra - `one must have chaos in one, to give birth to a dancing star.'" Nietzsche, Friedrich Wilhelm, Thus Spake Zarathustra: Part 1. The issue of chaos/creativity versus order/statism has pitted the Circle of Eunuchs against the New World Order on a battleground that encompasses NWO Anti-Christ/Artificial-Intelligence against CoE Anarchist/Biosemiotic-CodeWriting. It is a battle in which the meatspace Army of God forces must be countered by cyberspace Army of Dog troops. "DogMongers write biosemiotic code." ~ Bubba Hughes ----- The InterNet is fast becoming the global battleground for control of the future biosemiotic evolution, not only of humankind, but of universal intelligence, itself. ----- Darwin was right in seeing selection as the central process in animate nature, but for more than hundred years Darwinists have resisted taking the full consequence of this insight. It is now necessary to take this consequence and admit the obvious: That selective processes presupposes interpretations (with the implied possibility of misinterpretation). Thus, to the extent selection is a natural process, semiosis is a natural process - semiosis goes on all the time and at all levels of the biosphere. It may be feared that such a position will put biology outside the safe range of natural science, since interpretation seems to presuppose the existence of some kind of subject-ness. This risk, however, must be confronted through a thorough analysis of the implications, rather than evaded by repression. ~Jesper Hoffmeyer Biosemiotics: Towards a New Synthesis in Biology European Journal for Semiotic Studies, Vol. 9 No. 2, 1997, pp 355-376. ----- The war between the forces of freedom and the forces of repression takes place in many arenas. In the arena of expression of the life force, it is manifest in the battle between the forces of free speech and the forces of censorship. The evolution of the InterNet is the evolution of Biosemiotic Information-Communication. The term umwelt refers to the phenomenal worlds of organisms, the worlds around animals as they themselves perceive them. "Every action" wrote Uexk�ll "that consists of perception and operation imprints its meaning on the meaningless object and thereby makes it into a subject-related meaning-carrier in the respective umwelt" (Uexk�ll, 1982 [1940]) The Medium Is The Message Information Exchange Is The CornerStone Of Evolution Evolution Is The Creativity of Chaos Becoming Manifest ----- The number of possible solutions for selection to scrutinise, and the subtlety of the communicational interactions, will tend to produce a no-win situation. As a result selection cannot really �measure� the stakes of single players (individuals, demes, or species) in the game, but it could still influence the choice of the game itself. Plays, not players, are selected for. In the last decade the trend towards semiotisation of nature discussed here has manifested itself at still new levels. Thus, in evolutionary biology, neo-Darwinism has been seriously challenged by a set of ideas referred to as infodynamics (Brooks and Wiley, 1986; Weber, et al., 1989; Weber and Depew, 1995; Goodwin, 1989; Salthe, 1993). Infodynamics in the words of Stanley Salthe 'subsumes thermodynamics and information theory, essentially animating the latter by means of the former' (Salthe, 1993, 6). The general idea as originally suggested by Dan Brooks and Ed Wiley is that information capacity (disorder) increases spontaneously in developing systems, being produced along with physical entropy as the system grows and differentiates. Since such self-organisation is a prevalent property of our universe, natural selection should not be seen as the dominating force of evolution, but rather as playing the more modest role of pruning down the novelty that is constantly and autonomously being generated by the requirements of the second law of thermodynamics. Prigogine got the Nobel-price for his work on the thermodynamics of irreversible systems and most importantly in this context he showed that in so-called dissipative structures, i.e. systems far from thermodynamic equilibrium, ordered states may sometimes arise spontaneously out of disordered states. Our universe according to Prigogine is inherently creative. Due in large part to this revolution in our understanding of thermodynamics modern cosmology now sees our world as a self-organising place, a view which has perhaps most forcefully been unfolded in the recent work of Stuart Kauffman (Kauffman 1991, 1993). ~ Jesper Hoffmeyer ----- As CP-CoE neobyte Jim Choat points out, we become Sheeple who blindly follow our captors through the operation of our inborn survival mechanism. "It's a facet of human nature involved in the survival mechanism. Further, there is no judgement involved, it's an easily verifiable quality of human psychology that prisoners begin to associate with their captors after a short period." The only hope for Netizens to resist becoming Digital Sheeple behind the ElectroMagnetic Curtain which the forces of censorship/repression are striving to put in place is for each member of the coming Army of Dog to mark their meatspace and cyberspace territory and refuse to go gently into the night when the Oppressor attempts to scare them into submission with a mountain of laws and regulations which promise unjust persecution for imaginary offenses. A Global InterNet Army of individuals committed to freedom must strive to create a maximum entropy within which the chaos of semiotic evolution can break the digital chains which the Statist Oppressors are seeking to use to bind and repress access to information, global communication, free speech/expression, and the evolution of the Universal Life Energy, itself. ----- Current CoE mythology indicates that CJ Parker, fleeing his safehouse in Bienfait, Saskatchewan, after his dog Baby was shot by an FBI sniper as the Canadian Mounties closed in on him to enforce a "Dog at large." charge which was trumped up in an attempt to get him to inform on other CoE and CypherPunks members, left behind a note to his wannabe persecutors which indicated that he was willing to fight to the death, in both meatspace and cyberspace, if his only alternative was to live in a world where CypherBroads were required, by law, to wear panties. (This bit of information originated with his nephew, Human Gus-Peter, and is thus viewed with skepticism by some of the more mature/aged/ rotting members of the Circle of Eunuchs.) ---- Lock & Loll Rock & Road Chop & Chop ZenRacistMonger From nobody at REPLAY.COM Tue Mar 17 13:13:12 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 17 Mar 1998 13:13:12 -0800 (PST) Subject: PGP assimilated by NAI Message-ID: <199803172112.WAA03178@basement.replay.com> Anonymous wrote: > No doubt. I offer the observation that only someone doing > a favor for the government or someone operating from the > totally mind-fucked perspective of modern mismanagement > would invest good money to buy a company whose principal > asset was its "good will" and proceed to completely trash > that marketplace good will, abandon the world-famous > name of product and company, and physically assimilate > the hapless wage slaves working there by another group > that represents the antithesis of what PGP stood for in > the minds of virtually all who knew it, worldwide. How > can this _possibly_ be a good business decision in and > of itself? Occam's Razor: It isn't -- it's only good in > terms of what someone may have promised in return for > destroying PGP. It's a lot easier to see how that might > be the case than to see how NAI/NG could come out winning > in the marketplace by cancelling out everything that PGP, > Inc. had going for it. Back in the 'old days', when I had to walk ten miles, uphill, in a blinding snowstorm, only to find that computers did not exist yet, I was a founder of one of the first Canadian anti-nuclear grassroots organizations. Once the anti-nuke movement had progressed to the point where it was a viable entity, worthy of press coverage, etc., the Canadian government began to 'recognize' the legitimacy of the movement, and to 'fund' it (hee-hee). I went to the self-congratulatory celebration party held by the members of the group I had founded who had managed to line up at the government trough by abandoning their ethics and values in favor of a government-mandated policy of taking a 'reasonable' middle-road in the group's activities. I was there for eleven minutes. I spent the first five minutes shoveling as much free food as humanly possible down my throat. I spent the next five minutes draining every bottle of free liquor in sight down my throat. I spent the next minute barfing everything I had consumed all over the government representative who was in attendance to make certain that everyone was toeing the line and not saying 'bad things' about the Canadian government or the Nuclear Power Industry. Prologic Management Systems, Inc., bought Basis, Inc., in Berzerkeley a couple years ago (considered by some to be the main lair of a secret organization dedicated to preventing the Evil One from using computer technology to imprison the minds and souls of humankind). My research indicated that Prologic was a spook-owned 'company killer' which specialized in buying out and decimating companies who actually had a capacity to resist the diabolical aims of the NWO. When Network Associates bought PGP, I did similar research on NAI and Network General, and came to the same conclusions. > ("Psst! Buy PGP > and fuck it over until no one recognizes or trusts it, > and we'll throw you a $50 million contract next year > from our Black Budget!") I have a friend in Arizona who asks me for investment advice, and I recently told him to invest heavily in companies being acquired by WorldComm. My rationalization for his investing heavily in companies in league with the Anti-Christ was that, when Jesus comes back, he'll have enough money to buy him a meal and drinks at the best restaurant in town, thus redeeming himself. > This is a Pretty Good Example of why it was a Pretty > Bad Idea to form PGP, Inc. in the first place. Phil, > the brave but too-politically-correct middle-aged naive > liberal guy, is seeing his creation burn to ashes before > his eyes. Parents should never outlive their children -- > it ruins them, as is part of the game plan here, I > suspect. > FuckedAgainGeezMyAssIsGettingSoreMonger II Whenever the government 'legitimatizes' any organization/product, it is generally for the purpose of co-opting/fucking them. The government uses the carrot-stick method on the citizen-animal. First, it gives them the carrot/benefit for registering their identity with the government (SSN#) and then it gives them the stick/buttfucking once they are identified and categorized. ImFromTheGovernmentAndImHereToHelpBendOverAndGiveMeYourNumberMonger From spectre at anthrax.net Tue Mar 17 13:27:45 1998 From: spectre at anthrax.net (The Spectre) Date: Tue, 17 Mar 1998 13:27:45 -0800 (PST) Subject: Software license detector vans In-Reply-To: Message-ID: At 13:15 3/17/98 , you wrote: >Well, you don't have to cover *every* house, just *any* house. THe >Brits have vans that roam around looking for unlisenced sattelite >receivers, and it provides a pretty effective deterrant. That works in that scenario, but you do have to monitor *every* house, and continually, if you want to catch a software pirate.. in the satellite scenario, they're just looking for a signal to see if it exists or not. In the M$ scheme, you'd have to get the license key and compare it against a database to see if that license key was in use by anyone else at that exact moment... it's not illegal to use multiple copies of the same piece of software, it's just illegal to use them concurrently. -The Spectre [SP4 w/ clam cluster] -http://www.anthrax.net/cos "The surest way to corrupt a youth is to instruct him to hold in higher esteem those who think alike than those who think differently." -- Neitzsche, _The_Dawn_ PGP key available from servers. From tm at dev.null Tue Mar 17 17:24:31 1998 From: tm at dev.null (TruthMonger) Date: Tue, 17 Mar 1998 17:24:31 -0800 (PST) Subject: Corporate Children Message-ID: <350F3DCF.6718@dev.null> [Bienfait Nutly News] IN A RIOTOUS, DRUNKEN ORGY AT THE COALDUST SALOON, representatives of Canadian Funeral Home Association celebrated their success in bribing enough Canadian officials, bureaucrats, politicians and mobsters to pull off the advertising coupe of the century. Beginning on April 19, 1998, at 9:02 a.m., Canadian funeral homes will be able to bid on advertising space on the ceilings of maternity wards, birthing rooms and infant care facilities across the nation. Jealous of the recent success of soft-drink and liquor companies in gaining a virtual stranglehold on the public school and college market, the CFHA appealed to the North American Advertising Coalition for support, on the grounds that establishing a Cradle-to-Grave precedent for access to the minds of the citizens would be good for the industry as a whole. Lou Armbuster, who engineered Smith & Wesson's successful bid for access to the prison advertising market, stated, "We are certain that this will be a major step in preventing people from putting off dealing with funeral arrangements until it is too late, leaving their relatives vulnerable to unscrupulous operators during their period of grief." When asked about the rumor that the "Vote Hoffa" ads appearing on the sides of the majority of coffins recently was part of a pre- arranged deal for Teamster Union support, Mr. Armbuster punched out the lights of the reportwhore who asked the question. PGP Inc., under fire recently for the fact that their latest version of Corporate GAKware has a 'comment' line that defaults to "Louis Freeh for President!", contends that it does not constitute free political advertising, since the customer has the option to change it. Nevertheless, PGP refuses to drop their lawsuit against the FrostBack they consider responsible for hacking their system and altering their source code so that new versions of PGP installed on Canadian systems have a default comment line of "Cindy Cohn has a great ass!" ----- The Bienfait Nutly News is in no way connected to the Left Nutly News or the Right Nutly News. We prefer to remain in the middle, in the tradition of our founder, Dick Richard. ----- From nobody at REPLAY.COM Tue Mar 17 19:27:09 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 17 Mar 1998 19:27:09 -0800 (PST) Subject: The Eighth Word You Can't Say On The Internet Message-ID: <199803180327.EAA11046@basement.replay.com> Armies Gather by Jeff Elliott The most surprising place where anti-abortion provisions have appeared, however, was in the mammoth Telecommunications Deregulation Bill. Late in the day of January 30th, Colorado Representative Pat Schroeder made an unpleasant discovery: a last-minute addition appeared to make it a crime to discuss abortion on the Internet. The Telcom Bill already had the controversial "Communications Decency Act" that made it a felony to mention the seven dirty words forbidden on radio or TV; that was well known, and much discussed in both the House and the Senate. But this abortion clause was new, and would make "abortion" the eighth word banned from cyberspace. The ACLU and 19 other organizations filed for a temporary restraining order on the same day that Clinton signed the bill. But while the federal judge ruled, the vague "indecency" provisions were probably unconstitutional and should be heard by a special 3-judge panel, the restraining order on the abortion section was denied. Schroeder and others are trying to repeal the ancient law behind these restrictions, but passage in the rightward-tilted House is far from certain. From brian at smarter.than.nu Tue Mar 17 19:47:41 1998 From: brian at smarter.than.nu (Brian W. Buchanan) Date: Tue, 17 Mar 1998 19:47:41 -0800 (PST) Subject: Will New Sendmail Block Remailers? In-Reply-To: <1.5.4.32.19980317141322.006c25cc@pop.pipeline.com> Message-ID: On Tue, 17 Mar 1998, John Young wrote: > > Markoff in the NYT reports today on the release of a new > Sendmail upgrade by author Eric Allman that will block > spam by checking the legitimacy of the originating address > before delivery. > > The report claims that spam is up to 10% of e-mail worldwide, > And that Sendmail is used on 75% of the computers that route > e-mail, all of which are being fitted with the new program. > > What are the chances that this will affect remailers or other > means of eternal anonymity? I doubt it. NYT is probably referring to the integration into the sendmail package of rules that nix incoming mail with forged From headers, e.g. "you.want.to at buy.this" and prevent unauthorized relaying. Remailers generally use a From header that includes their own legitimate domain, so they likely won't be blocked. However, while the anti-relay-hijacking rules are useful (and LONG overdue), I see the the From-domain-validity change as a Bad Thing, as it will encourage spammers to deliberately choose existing domains to spoof in their From lines, leading to an increase in the incidences of sites being subjected to fragmented denial-of-service attacks, i.e. being mailbombed by the collective complaints of all those shit-stupid AOLers who don't bother to read the Received headers. I've been lucky enough never to have been subjected to one of those attacks, but from the sheer volume of complaints I once got when a luser sent a MMF spam to USENET, I can sympathize with the victim of a spoof. Yet another instance of "protection for the masses" actually providing no real benefit and simultaneously negating the protection afforded to those few who had previously used the defense. A similar thing has happened/is happening with the previously-useful "Comments: Authenticated sender is" check for spam, which used to be nearly 95% effective at nixing spam because most known spamming packages included the header, and only one legitimate mailer did likewise, but was easy to make exceptions for because it included an identifying X-Mailer header. -- Brian Buchanan brian at smarter.than.nu Never believe that you know the whole story. From spectre at anthrax.net Tue Mar 17 20:12:23 1998 From: spectre at anthrax.net (The Spectre) Date: Tue, 17 Mar 1998 20:12:23 -0800 (PST) Subject: EMI, Van Eck, etc. Message-ID: In almost every writing I've come across regarding Van Eck, I notice the phrase "...simply a modified television" or something along those lines. Does anyone have a document for actually modifying a television set to do this sort of thing? It doesn't have to be extremely long ranged, and could in fact be very short range.. I am interested in performing my own experiments into defeating this sort of eavesdropping. Also, would it be possible to scramble the signal into an unusable level by simply putting another device emanating RF at the snooping frequencies nearby the machine that you want to protect? Something generating white noise at that frequency, but with a purposely built antenna, say a high gain type turned outward from the monitor, with a significantly higher power output than the monitor? Thanks.. -The Spectre [SP4 w/ Clam Cluster] -http://www.anthrax.net/cos "No man is clever enough to know all the evil he does." - La Rochefoucauld From toto at sk.sympatico.ca Tue Mar 17 21:53:36 1998 From: toto at sk.sympatico.ca (TOTO ENTERPRISES) Date: Tue, 17 Mar 1998 21:53:36 -0800 (PST) Subject: PROGRAMMERS WANTED !!! In-Reply-To: <3504A945.1286@nmol.com> Message-ID: <350F7879.436@sk.sympatico.ca> TOTO ENTERPRISES is looking for C, C++, and Java programmers to write code designed to identify and categorize persons of Jewish extraction from a variety of government, public and private databases around the world. Applicants should be company-oriented individuals who have no qualms about writing code that contains no backdoors that would allow those who later worry about the use their creations are being put to access to the systems of those using those programs. No cryptography skills will be required of those applicants working in areas where U.S. exportable crypto is dominant. Applicants will be able to work from their homes, with only occassional trips to the Antarctic required. Applicants who can translate "We're from the government and we're here to help you." into several different languages will be given preference. Applicants who can translate "We're from the government and we're here to help you into the cattle-cars." into several different languages will automatically be given credit for applicable prior work experience. To receive an application by email, reply to this message with an empty message body, and a 'Subject' header of, "Mein Kamf." (True CypherPunks need not apply...) From kevin at emarc.com Tue Mar 17 22:01:00 1998 From: kevin at emarc.com (Kevin Mahoney) Date: Tue, 17 Mar 1998 22:01:00 -0800 (PST) Subject: No Subject Message-ID: Reply-to: kevinm at emarc.com Subject: emarc Research Services Hello, I am contacting you on behalf of my company emarc, LLC. (Electronic Media & Research Consultants) . We provide our clients with services that utilize Internet technology, sound sampling (compilation) methodologies and innovative on-line implementation solutions . Our products and services include: Online Screening with guaranteed response rates based on completed surveys. On-going panel compilation for future studies or focus groups. Panel compilation for buisness or consumer related studies. Online product affinity for software and computer related products. Our services provide cost effective, efficient and accurate data collection that can be generalized to larger populations through pre-screening and post-hoc weighting. emarc's mission is to provide quality service to the marketing, market research and political research communities. For more information please call me at 1-561-347-0356 or drop me an email at kevinm at emarc.com Regards Kevin Mahoney Director of Research Services emarc, LLC. From ichudov at algebra.com Wed Mar 18 04:16:17 1998 From: ichudov at algebra.com (Igor Chudov @ home) Date: Wed, 18 Mar 1998 04:16:17 -0800 (PST) Subject: Will New Sendmail Block Remailers? In-Reply-To: <1.5.4.32.19980317141322.006c25cc@pop.pipeline.com> Message-ID: <199803181215.GAA31936@manifold.algebra.com> John Young wrote: > Markoff in the NYT reports today on the release of a new > Sendmail upgrade by author Eric Allman that will block > spam by checking the legitimacy of the originating address > before delivery. > > The report claims that spam is up to 10% of e-mail worldwide, > And that Sendmail is used on 75% of the computers that route > e-mail, all of which are being fitted with the new program. > > What are the chances that this will affect remailers or other > means of eternal anonymity? > > Except Sualk, GL, UB and Nuh, all of whom we now know > are Otot GinPu Tca as those crazy Syug Irtmid Irun. WRT remailers, sendmail only checks the validity of a domain. So if a "From " address is "anonymous at replay.com", the message would be passed on. I have read the Sendmail announcement from sendmail.org. The new version is very nice and friendly to everyone except spam relayers. - Igor. From Markus.Kuhn at cl.cam.ac.uk Wed Mar 18 05:09:40 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Wed, 18 Mar 1998 05:09:40 -0800 (PST) Subject: EMI, Van Eck, etc. In-Reply-To: Message-ID: The Spectre wrote on 1998-03-18 05:11 UTC: > In almost every writing I've come across regarding Van Eck, I notice the > phrase "...simply a modified television" or something along those lines. > > Does anyone have a document for actually modifying a television set to do > this sort of thing? It doesn't have to be extremely long ranged, and could > in fact be very short range.. I am interested in performing my own > experiments into defeating this sort of eavesdropping. Ingredients for a minimum cost quick&dirty TEMPEST experiment: 1 RF tuner of a VCR 1 antenna amplifier 1 antenna 1 multisync PC monitor 1 PC with a video card (or a pair of tuneable sync oscillators) Connect the PC with the video card to the SYNC inputs of the multisync monitor. Program the video card to a video mode with the same deflection frequencies as that used by the target system. Connect the baseband output of your tuner to the VIDEO-IN pins of your monitor. Connect the antenna and amplifier to the RF input of your tuner. Switch on. Fill the screen of the target device with a big symbol consisting of dithered and non-dithered areas for best results in the first trials. Now tune through the VHF bands starting with the dot clock frequency of the target. That's it basically. Such a primitive TEMPEST monitor is of course unsuitable for evaluating the threat from much more sophisticated wide-band DSP eavesdropping receivers that directly attempt OCR-style algorithms on the signal with matched filters. But it is fun to play around with, it is useful for getting a feeling for the effect, and it is suitable for demonstrating most of the Soft Tempest tricks that I described in . > Also, would it be possible to scramble the signal into an unusable level by > simply putting another device emanating RF at the snooping frequencies > nearby the machine that you want to protect? Something generating white > noise at that frequency, but with a purposely built antenna, say a high > gain type turned outward from the monitor, with a significantly higher > power output than the monitor? The FCC and your radiologist advise against this. Shielding is much more elegant than jamming. Remember that CRT content is a periodic signal, thus you can suppress uncorrelated noise by periodic averaging rather easily. Good jamming must produce a correlated output signal. See United States Patents 5165098 and 5297201 for descriptions of correlated jammers. I don't think, these are widely used though, as the TEMPEST standards seem to mandate shielding and not jamming, which I think is very sensible. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From nobody at REPLAY.COM Wed Mar 18 07:59:11 1998 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 18 Mar 1998 07:59:11 -0800 (PST) Subject: You've got to save room for desert... Message-ID: <199803181558.QAA21882@basement.replay.com> Takes 18 bee hummingbirds to weigh as much as a shot of whiskey. ============================================== LMBoyd Web Site / U. S. Newspapers / Start Email / Stop Email http://www.LMBoyd.com/postscript.htm From ass at dev.null Wed Mar 18 09:55:13 1998 From: ass at dev.null (A. Sheeple) Date: Wed, 18 Mar 1998 09:55:13 -0800 (PST) Subject: They don't need no stinking privacy! Message-ID: <35102602.1811@dev.null> An Open Letter To The CypherPunks: Due to the large amounts of ridicule heaped upon the Sheeple family by members of the CypherPunks list, I have decided to write to the list to clarify a few of the issues on which our family's stances are apparently misunderstood by people outside the pen. First of all, we are AdamAnt about retaining our right to privacy, but we recognize the need for the authorities to invade other people's right to privacy, in order to protect us from them. We demand our right to a fair and impartial trial before a jury of our peers, but we recognized the need for law enforcement agencies and the justice system to take whatever steps are needed to make certain that others are convicted in accordance with the desires of the majority of their betters, according to the results of the Sheeple polls taken by CNN and People's Court. (Note: We, the Sheeple, are willing to do our part, and look the other way when those responsible for our protection need to stretch the boundaries of belief by claiming that a black wife-beater is not a suspect in the murder of his wife and her white lover, as they climb over a fence onto his private property, without a warrant, saying, "We're white men from the government, and we're here to help a Black-Afro American.] We wish to exercise our right to have security in our private communications by employing strong cryptography, but we also recognize the need for our government to intercept communications by foreigners, in order to protect us and to manipulate world events in a manner that will keep the price of our TV's as low as possible. We wish to exercise our right to free speech, but we recognize the need of authorities to prevent filth and vermin from using disgusting and perverted language such as, "Baah...Baah...", instead of righteous and politically correct language such as "Baaa...Baaa." In short, or position is that we wish to retain all of our rights and freedoms, but support them being compromised or taken away from others, for the good of the Sheeple. A. Sheeple From nobody at nsm.htp.org Wed Mar 18 10:06:02 1998 From: nobody at nsm.htp.org (nobody at nsm.htp.org) Date: Wed, 18 Mar 1998 10:06:02 -0800 (PST) Subject: fight back at SPAM! Message-ID: <19980318180502.25156.qmail@nsm.htp.org> I received some annoying spam today. Unbelievably, they included a 1-800 number. Since they wasted my time, I thought I'd call them up and waste their time (on their nickel!). I got a recording asking me to leave a message. I then called back and it stated that this was my last call for the day. Apparently they only accept two phone calls from each distinct phone number. The phone number is 1-800-338-6150 if anyone else feels like calling them up and tying up their phone line. I'm not going to mention what they're selling, since that would be doing them a favor. Maybe when they get their phone bill they will realize the problems associated with direct email marketing on the Internet. ;-) If a honest-to-goodness live person answers, just talk to 'em and try to keep them on the line as long as possible. Ask questions about their product, etc. The longer they talk to you, the more it costs them! You get the picture! Enjoy! From nobody at REPLAY.COM Wed Mar 18 10:06:44 1998 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 18 Mar 1998 10:06:44 -0800 (PST) Subject: The Rapist from the Internet Chat Room Message-ID: <199803181805.TAA12602@basement.replay.com> Alleged `Cybersex' Victim Testifies By SAMUEL MAULL, Associated Press Writer NEW YORK -- A woman who says a graduate student she met online tied her up and raped her in his apartment tearfully described for jurors how she begged, "Don't rape me, don't dismember me, don't kill me" before escaping. In emotional testimony Tuesday, the 22 -year-old woman said she managed to untie herself from a futon, fight off her assailant and flee. "I was sore. I was exhausted. I didn't want to move," she said, then describing how she loosed the cloth strips: "I felt so good! I got it undone and I stood up! I got it undone! I looked at him and he looked frightened! I'm not going to die!" The witness, who said she was naked while tied up, said she grabbed her clothes and got dressed while running for the door and fighting off the man who had held her as a sex captive for more than 20 hours. "He tried to catch me," she said. "I just kept fighting. I wouldn't let him get any part of me. I ran to the door and clenched the handle because I was not going to be tied up again." The woman says her tormentor was Oliver Jovanovic, 31, a Columbia University doctoral candidate in molecular biology whom she met in an Internet chat room. Jovanovic is charged with kidnapping, sodomy, aggravated sex abuse and assault against the woman in his apartment following their first date Nov. 22, 1996. The woman said Jovanovic had tied her up, dripped hot candle wax on her abdomen and genital area, bit her breasts until they bled and used a nightstick to sexually abuse her. The woman said Jovanovic attacked her after a discussion about good and evil and became upset when she said she believes people are not inherently evil. He then ordered her to undress, she said. Defense lawyer Jack Litman said no violence occurred between the two and that any sexual activity, while it might have been unusual, was consensual. He quoted from e-mail messages sent by the woman to Jovanovic before and after their date in which she talks about sadomasochism in what appear to be terms of approval. The e-mail messages the woman sent to Jovanovic included one that reads "Rough is good," and another that reads "I would go through the pleasure of hell's pain." The woman testified that she sought out Jovanovic because she thought he was intelligent, knowledgeable and interesting. Litman called the woman unstable and overly imaginative. He said she is blaming the evening's activity on Jovanovic to absolve herself of something she likes but considers dirty. From phundie at mhv.net Wed Mar 18 10:36:54 1998 From: phundie at mhv.net (Michael Graffam) Date: Wed, 18 Mar 1998 10:36:54 -0800 (PST) Subject: EMI, Van Eck, etc. In-Reply-To: Message-ID: On Tue, 17 Mar 1998, The Spectre wrote: > Does anyone have a document for actually modifying a television set to do > this sort of thing? It doesn't have to be extremely long ranged, and could > in fact be very short range.. I am interested in performing my own > experiments into defeating this sort of eavesdropping. Well, for one.. I don't think (speculation, I haven't done any real investigation into it yet..) that this oft repeated maxim applies to modern hi-res monitors with super refresh rates. I don't think that a TV could be used to display emanations from a new monitor. OTOH, I haven't looked into modern TV technology at all.. I don't know what the new sets are really capable of. Suffice it to say, you probably won't be able to modify an older set to snoop on a new monitor set up at 1280x1024, but if for experiment purposes to just did a text display you should be able to snoop that with an older set. > Also, would it be possible to scramble the signal into an unusable level by > simply putting another device emanating RF at the snooping frequencies > nearby the machine that you want to protect? Something generating white > noise at that frequency, but with a purposely built antenna, say a high > gain type turned outward from the monitor, with a significantly higher > power output than the monitor? I would think that any device of this sort would make the monitor's display rather distorted.. unless you put shielding around it to protect it, but that same shielding would prevent usable EMR. Find the Unofficial Tempest Homepage (sorry, dont have the URL handy.. but I found it a few times by searching out the title from altavista) it has links to Van Eck's original paper, and if memory serves papers that "fill in" the gaps of Van Eck's work to help in modifying equipment. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "Act only according to that maxim by which you can at the same time will that it should become a universal law.." - Immanuel Kant "Metaphysics of Morals" ** This message not PGP signed because I am logged in through an insecure ** channel. Caution may be warranted. From jya at pipeline.com Wed Mar 18 10:48:01 1998 From: jya at pipeline.com (John Young) Date: Wed, 18 Mar 1998 10:48:01 -0800 (PST) Subject: PRZ on PGP/NAI/TIS/Key Recovery Message-ID: <1.5.4.32.19980318184942.006dedbc@pop.pipeline.com> Date: Wed, 18 Mar 1998 12:48:48 -0500 To: jya at jya.com From: Ed Stone Subject: PGP/NAI merger and key recovery I received the following email from Phil Zimmermann, regarding concerns I have expressed about NAI's acquisition of TIS, a substantial contractor to the National Security Agency, and a major developer of key recovery capabilities. >> begin PRZ email<<< Date: Wed, 18 Mar 1998 01:20:34 -0800 To: estone at synernet.com From: Philip Zimmermann Subject: PGP/NAI merger and key recovery Cc: prz at pgp.com Ed, I saw your recent remarks in comp.security.pgp.discuss. I'd like to make a few points. You may quote me on this. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Mergers are complex operations, especially mergers of publicly traded companies of this size. NAI and TIS will not fully close the merger deal for about 60 days. Until then, there are many policy details we cannot discuss in public. NAI has no plans to incorporate TIS's key recovery technology in any version of PGP, including our business versions. I have discussed this point with NAI management. I have not changed my political values regarding privacy and crypto. I would not have allowed the sale of my company to NAI if they were going to buy PGP in order to bury PGP, as some have feared. They bought PGP because they value the reputation that PGP has earned in the industry. They want to preserve that reputation by preserving PGP's product integrity. I plan to keep watch over PGP's product integrity for the foreseeable future. NAI plans to keep publishing our source code for peer review. Source code publication in printed books is a vital part of NAI's business strategy, especially its overseas strategy. There will be an important announcement on this subject on 20 March at CeBit in Hannover Germany. -Philip Zimmermann -----BEGIN PGP SIGNATURE----- Version: PGP 5.5.5 iQA/AwUBNQ+RzWPLaR3669X8EQLuRwCcDowyBBr32YtbsnYSHy6clTW+7CwAnjpk KnVN0NVreBNuIOyxsAcWIb40 =vY/q -----END PGP SIGNATURE----- >>>end PRZ email<<< -- ------------------- Ed Stone estone at synernet.com ------------------- From jya at pipeline.com Wed Mar 18 11:20:26 1998 From: jya at pipeline.com (John Young) Date: Wed, 18 Mar 1998 11:20:26 -0800 (PST) Subject: EMI, Van Eck, etc. Message-ID: <1.5.4.32.19980318192230.006ee93c@pop.pipeline.com> Michael Graffam wrote: >Find the Unofficial Tempest Homepage (sorry, dont have the URL handy.. That's Joel McNamara's bountiful and ever-growing TEMPEST site: http://www.eskimo.com/~joelm/tempest.html While the work of Markus Kuhn and Ross Anderson provide more recent unclassified information Joel has a standing request for any TEMPEST material that is created by research or liberated from tax-pits and fat corp labs. Some black stuff comes over the transom. RF and EM offensive and defensive weapons are whitehot in national security labs around the globe, and probably equally so in commercial cages where NDA transgressors are hoovering dual-usage technologies out of MOD's coffers like subway turnstile-suckers. From this-will-bounce at zoom.nu Wed Mar 18 12:26:25 1998 From: this-will-bounce at zoom.nu (Anonymous) Date: Wed, 18 Mar 1998 12:26:25 -0800 (PST) Subject: PRZ comments Message-ID: <199803182030.VAA13078@china.netassist.se> >> begin PRZ email<<< Date: Wed, 18 Mar 1998 01:20:34 -0800 To: estone at synernet.com From: Philip Zimmermann Subject: PGP/NAI merger and key recovery Cc: prz at pgp.com Ed, I saw your recent remarks in comp.security.pgp.discuss. I'd like to make a few points. You may quote me on this. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Mergers are complex operations, especially mergers of publicly traded companies of this size. NAI and TIS will not fully close the merger deal for about 60 days. Until then, there are many policy details we cannot discuss in public. NAI has no plans to incorporate TIS's key recovery technology in any version of PGP, including our business versions. I have discussed this point with NAI management. I have not changed my political values regarding privacy and crypto. I would not have allowed the sale of my company to NAI if they were going to buy PGP in order to bury PGP, as some have feared. They bought PGP because they value the reputation that PGP has earned in the industry. They want to preserve that reputation by preserving PGP's product integrity. I plan to keep watch over PGP's product integrity for the foreseeable future. NAI plans to keep publishing our source code for peer review. Source code publication in printed books is a vital part of NAI's business strategy, especially its overseas strategy. There will be an important announcement on this subject on 20 March at CeBit in Hannover Germany. -Philip Zimmermann -----BEGIN PGP SIGNATURE----- Version: PGP 5.5.5 iQA/AwUBNQ+RzWPLaR3669X8EQLuRwCcDowyBBr32YtbsnYSHy6clTW+7CwAnjpk KnVN0NVreBNuIOyxsAcWIb40 =vY/q -----END PGP SIGNATURE----- >>>end PRZ email<<< -- ------------------- Ed Stone estone at synernet.com ------------------- I'm just curious, and no offense intended, but Phil's signature is bad in the signed message. I'm using PGP 5.55, and it has his key in it, and it doesn't check out. "Things that make you go 'hmmmmm'"....... From inquiry at asset-max.com Wed Mar 18 12:27:37 1998 From: inquiry at asset-max.com (Asset-Max) Date: Wed, 18 Mar 1998 12:27:37 -0800 (PST) Subject: Consolidate Debts, Home Improvements Message-ID: <199803182030.MAA15378> THIS IS A LIMITED-TIME OFFER FOR HOMEOWNERS ONLY. AS A HOMEOWNER YOU ARE ENTITLED TO A FREE CONSULTATION. Are you interested in home improvements, consolidating your monthly bills AND reducing your payments? Do you have an unanticipated need for at least $25,000 for any reason? Are you the owner/occupant of a single family, free standing residence? These days, it's more important than ever to know how to get the most out of owning a home. To help you do just that, we've created a variety of unique financing programs and options. Remember: This valuable information is absolutely FREE! Learn How To: * GET 24-HOUR PRE-APPROVAL * GET UP TO $80,000 WITH NO EQUITY * CONSOLIDATE BILLS * MAKE HOME IMPROVEMENTS * PAY FOR COLLEGE * BUY A NEW CAR, BOAT, OR EVEN 2ND HOME *** SAVE THOUSANDS YEARLY IN INTEREST PAYMENTS *** Even if: * YOU'RE SELF-EMPLOYED * HAVE HEAVY DEBT * HAVE BEEN PREVIOUSLY DECLINED * YOU CAN'T PROVE ALL YOUR INCOME Plus, on certain programs, there's: * NO PREPAYMENT PENALTY * NO APPRAISAL REQUIRED Thousands of people just like you have already responded and have been helped. However, this offer may not be available indefinitely, so act now. TO RECEIVE YOUR COMPLIMENTARY AND CONFIDENTIAL CONSULTATION, click on a highlighted link below http://www.asset-max.com/mortgage.html http://www.asset-max.com/mortgage.html (if your mail reader does not support clickable links, copy the above URL into your Web browser) OR simply email your reply, with the following information: name: street address: city: state: zip: home phone: (best time for a Senior Loan Officer to call): business phone: (best time for a Senior Loan Officer to call): estimated current market value of home: estimated current mortgage balance: amount to borrow: FIND OUT WHAT YOU QUALIFY FOR -- KNOW YOUR OPTIONS! --------------------------------------------------- This mailing is intended to be of interest to a large audience and to communicate a valuable offer. If you have no interest in this offer, be advised that other valuable promotions will be featured in future mailings which may be of interest to you. However, if you have no desire to receive offers of value from us in the future, please email us with "Remove" as the subject and you will be removed from this mailing list. Copyright 1998 Asset Max. The information contained in this email message may not be published, broadcast, rewritten, or otherwise distributed without the express written consent of Marathon. Offer void where prohibited by law. From jkwilli2 at unity.ncsu.edu Wed Mar 18 12:52:36 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Wed, 18 Mar 1998 12:52:36 -0800 (PST) Subject: interNIC is a bunch of fuckwads... (fwd) Message-ID: ---------- Forwarded message ---------- Date: Wed, 18 Mar 1998 11:19:15 -0800 (PST) From: Christian Hedegaard To: dc-stuff at merde.dis.org Cc: kemkidd at clearink.com Subject: interNIC is a bunch of fuckwads... A friend of mine put in a request to reg "pimpshit.com" the other day but it was DENIED by interNIC because it was deemed "innapropriate".. WHAT THE FUCK? lets see, fucker.com *isn't* innapropriate? assmaster.com isn't? what the hell crawled up their asses and died? why is a commercial corporation running the internet? why is free speech being taken away by these fuckwads? let me guess, they also will support CDA2. and any other censorship bullshit that our government tries to "protect us" with? goddamnit,. people should be able to reg whatever the fuck they want. from pussy.org, to nigger.com... I don't give a fuck if it's offensive to me or anybody, people should still have that very simple right. so, does anyone know what the story is? is interNIC going to refuse re-registration for such names as fucker.com nigger.com pussy.com etc...? or are they just refusing new registration with "innapropriate" stuff? They'd better refuse re-registration, otherwise it's totally unfair to EVERYBODY... hell, they're already being unfair to everybody.. fuckers. -- ICQ: 8141565 ------------------------------------------------------------------------------- "It's yet another in a long series of diversions in an attempt to avoid responsibilty" -Chris Knight, "Real Genius" ------------------------------------------------------------------------------- "Out the SPARC, through the router, down the fiber, off another router, down the T3, past the firewall... nuthin but NET" ------------------------------------------------------------------------------- From qwlkty89z at xpc.xpoint.co Wed Mar 18 14:37:27 1998 From: qwlkty89z at xpc.xpoint.co (qwlkty89z at xpc.xpoint.co) Date: Wed, 18 Mar 1998 14:37:27 -0800 (PST) Subject: 68 Million Email Addresses - $99 Message-ID: <> 68 MILLION EMAIL ADDRESSES FOR ONLY $99 You want to make some money? I can put you in touch with over 60 million people at virtualy no cost. Can you make one cent from each of theses names? If you can you have a profit of over $600,000.00 This offer is not for everyone. If you can not see the just how excellent the risk / reward ratio in this offer is then there is nothing I can do for you. To make money you must stop dreaming and TAKE ACTION. **************************************** PACKAGE A 68,000,000 email addresses on CD These name are all in text files ready to mail!!! $99.00 **************************************** PACKAGE B 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. $ 139.00 **************************************** PACKAGE C THE WORKS 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. AND Over 500 diferent Business Reports now being sold on the internet for up to $100 each. You get full rights to resell these reports. With this package you get the email addresses, the software to mail them AND ready to sell information products. AND ...... . a collection of the 100 best money making adds currently floating around on the internet. $ 189 **************************************** SEVERAL WAYS TO ORDER !!! IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!! 1) WE ACCEPT: AMERICAN EXPRESS OR VISA <> MASTERCARD TYPE OF CARD AMX / VISA / MC??_______________ EXPIRATION DATE ___________________________ NAME ON CREDIT CARD________________________ CREDIT CARD #________________________________ BILLING ADDRESS ____________________________ CITY_________________________________________ STATE________________ZIP_____________________ PHONE INCLUDE AREA CODE___________________ EMAIL ADDRESS______________________________ WE WILL BILL selected amount to your account plus the following shipping costs SHIPPING COST OF 3.85 FIRST CLASS MAIL SHIPPING COST OF 15.00 24 HOUR EXPRESS MAIL / FEDERAL EXPRESS SALES TAX (7.25%) added to CA residents >>> Send correct amount in cash, check or money order to: >>> ELECTRIC EMAIL >>> 702 Mangrove Avenue, Suite 151 >>> Chico, CA 95926 2) Send the same above requested credit card information to above address. 3) Fax the same above credit card information to 530-895- 8470 4) Call phone # 530-876-4291. This is a 24 hour phone number to place a CREDIT CARD order. 5) FAX A COPY of your signed check to 530-895-8470. This is an EXCELLENT way to order without a credit card! Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider. Copyright 1998 All rights reserved Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. Amendment I, The US Constitution :-) From qwlkty89z at xpc.xpoint.co Wed Mar 18 14:37:27 1998 From: qwlkty89z at xpc.xpoint.co (qwlkty89z at xpc.xpoint.co) Date: Wed, 18 Mar 1998 14:37:27 -0800 (PST) Subject: 68 Million Email Addresses - $99 Message-ID: <> 68 MILLION EMAIL ADDRESSES FOR ONLY $99 You want to make some money? I can put you in touch with over 60 million people at virtualy no cost. Can you make one cent from each of theses names? If you can you have a profit of over $600,000.00 This offer is not for everyone. If you can not see the just how excellent the risk / reward ratio in this offer is then there is nothing I can do for you. To make money you must stop dreaming and TAKE ACTION. **************************************** PACKAGE A 68,000,000 email addresses on CD These name are all in text files ready to mail!!! $99.00 **************************************** PACKAGE B 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. $ 139.00 **************************************** PACKAGE C THE WORKS 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. AND Over 500 diferent Business Reports now being sold on the internet for up to $100 each. You get full rights to resell these reports. With this package you get the email addresses, the software to mail them AND ready to sell information products. AND ...... . a collection of the 100 best money making adds currently floating around on the internet. $ 189 **************************************** SEVERAL WAYS TO ORDER !!! IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!! 1) WE ACCEPT: AMERICAN EXPRESS OR VISA <> MASTERCARD TYPE OF CARD AMX / VISA / MC??_______________ EXPIRATION DATE ___________________________ NAME ON CREDIT CARD________________________ CREDIT CARD #________________________________ BILLING ADDRESS ____________________________ CITY_________________________________________ STATE________________ZIP_____________________ PHONE INCLUDE AREA CODE___________________ EMAIL ADDRESS______________________________ WE WILL BILL selected amount to your account plus the following shipping costs SHIPPING COST OF 3.85 FIRST CLASS MAIL SHIPPING COST OF 15.00 24 HOUR EXPRESS MAIL / FEDERAL EXPRESS SALES TAX (7.25%) added to CA residents >>> Send correct amount in cash, check or money order to: >>> ELECTRIC EMAIL >>> 702 Mangrove Avenue, Suite 151 >>> Chico, CA 95926 2) Send the same above requested credit card information to above address. 3) Fax the same above credit card information to 530-895- 8470 4) Call phone # 530-876-4291. This is a 24 hour phone number to place a CREDIT CARD order. 5) FAX A COPY of your signed check to 530-895-8470. This is an EXCELLENT way to order without a credit card! Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider. Copyright 1998 All rights reserved Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. Amendment I, The US Constitution :-) From jim at mentat.com Wed Mar 18 14:50:15 1998 From: jim at mentat.com (Jim Gillogly) Date: Wed, 18 Mar 1998 14:50:15 -0800 (PST) Subject: PRZ comments Message-ID: <9803182246.AA29563@mentat.com> Somebody quoted PRZ's message about the NAI/PGP/TIS merger deal, which puts to rest for now some of concerns about the weird juxtaposition of companies, anyway. He didn't address the issue of NAI becoming a KRAP again. Anonymous quoted: > -----BEGIN PGP SIGNED MESSAGE----- ... > announcement on this subject on 20 March at CeBit in Hannover Germany. > > -Philip Zimmermann > > -----BEGIN PGP SIGNATURE----- and then s/he said: > I'm just curious, and no offense intended, but Phil's signature is > bad in the signed message. I'm using PGP 5.55, and it has his key > in it, and it doesn't check out. "Things that make you go 'hmmmmm'"....... Just a formatting problem. If you put a space before the "-Philip" the message checks just fine. There are several other copies of the message posted around the Web already with the correct formatting, and the other one I checked had the spacing right already (which is how I knew where to look on this copy). See, for example, the copy at http://jya.com . Jim Gillogly From paladin at lvcablemodem.com Wed Mar 18 15:24:52 1998 From: paladin at lvcablemodem.com (Eric Tune) Date: Wed, 18 Mar 1998 15:24:52 -0800 (PST) Subject: interNIC is a bunch of fuckwads... (fwd) Message-ID: <000e01bd52c5$03f27c20$2a06ea18@paladin.lvcablemodem.com> > >A friend of mine put in a request to reg "pimpshit.com" the other day but >it was DENIED by interNIC because it was deemed "innapropriate".. > >WHAT THE FUCK? lets see, fucker.com *isn't* innapropriate? assmaster.com >isn't? what the hell crawled up their asses and died? why is a >commercial corporation running the internet? why is free speech being >taken away by these fuckwads? let me guess, they also will support CDA2. >and any other censorship bullshit that our government tries to "protect >us" with? > >goddamnit,. people should be able to reg whatever the fuck they want. from >pussy.org, to nigger.com... I don't give a fuck if it's offensive to me or >anybody, people should still have that very simple right. > >so, does anyone know what the story is? is interNIC going to refuse >re-registration for such names as fucker.com nigger.com pussy.com etc...? >or are they just refusing new registration with "innapropriate" stuff? >They'd better refuse re-registration, otherwise it's totally unfair to >EVERYBODY... hell, they're already being unfair to everybody.. > >fuckers. > Don't that just suck... I was a bit pessimistic about finding fucker.com, but lo and behold, there it was, www.fucker.com ...talk about bullshit. If they will register this, they should register "pimpshit.com" too. Talk about "selective memory loss"...sheesh. I'm heading to their site (internic) to bitch about their selective and prejudicial policy "change"... Eric J. Tune paladin at lvcablemodem.com PGP 5.55 and 2.62 keys available upon request. DO NOT EXPORT STRONG CRYPTO BELOW...OH NO! print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Anonymous (from anon at anon.efga.org) wrote: > Anonymous (from this-will-bounce at zoom.nu) wrote: > > I'm just curious, and no offense intended, but Phil's signature is bad > > in the signed message. I'm using PGP 5.55, and it has his key in it, > > and it doesn't check out. "Things that make you go 'hmmmmm'"....... > You took out the space before "-Philip Zimmermann". Put it back as it > was originally and the signature verifies fine: I'm getting mighty tired of the anonymous motherfuckers posting through efga.org interfering with the attempts of the anonymous saints posting through the other anonymous remailers to spread CSM (Cluelessness, Stupidity and Misinformation) throughout the Internet. Remember: "If you're not living in space, you're taking up too much of the edge." ~ No Beer From genocide at Genocide2600.com Wed Mar 18 17:13:07 1998 From: genocide at Genocide2600.com (Genocide) Date: Wed, 18 Mar 1998 17:13:07 -0800 (PST) Subject: interNIC is a bunch of fuckwads... (fwd) In-Reply-To: Message-ID: On Wed, 18 Mar 1998, Ken Williams wrote: > A friend of mine put in a request to reg "pimpshit.com" the other day but > it was DENIED by interNIC because it was deemed "innapropriate".. I once remember a time when there was this well known story about "Freedom of Speech", I believe it's only a rumor in todays world. Genocide Head of the Genocide2600 Group Board Member of E.H.A.P ============================================================================ ____________________ *---===| |===---* *---===| Genocide |===---* "Courage is not defined by those who *---===| 2600 |===---* fought and did not fall, but by those *---===|__________________|===---* who fought, fell, and rose again." Email: Genocide at Genocide2600.com Web: http://www.Genocide2600.com Check out the mud at: genocide2600.com 6666 ============================================================================ From brianbr at together.net Wed Mar 18 18:50:33 1998 From: brianbr at together.net (Brian B. Riley) Date: Wed, 18 Mar 1998 18:50:33 -0800 (PST) Subject: PRZ comments Message-ID: <199803190250.VAA29972@mx01.together.net> -----BEGIN PGP SIGNED MESSAGE----- On 3/18/98 3:30 PM, Anonymous (this-will-bounce at zoom.nu) passed this wisdom: > >>> begin PRZ email<<< > >Date: Wed, 18 Mar 1998 01:20:34 -0800 >To: estone at synernet.com >From: Philip Zimmermann >Subject: PGP/NAI merger and key recovery >Cc: prz at pgp.com > >Ed, I saw your recent remarks in comp.security.pgp.discuss.I'd like >to make a few points. You may quote me on this. > >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 The signature fails .... -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQEVAwUBNRCH4T7r4fUXwraZAQEGuAf/SkPKROnsZpZnLfZQ5uiT5RwBw2RTNeky gKEGXOlTFrDRHq00qm5xovXp7Oohw0JsqthwkVHiLLAPHJWEVtjzhgV0B291gF1p 2w/giHj6yl8sh1gExjLqb7Xe+NH3xy3myan6vCNFzcn2GG9QIIBZjEpg/noYt4GI 2mgFcauYk9mNBKi1AWJprz5O7ZS9oF/Q8om9K+CVS5ejCQXQCeeIy82hBE5Dlglg nk00fyiC9mImJo6ZdSGAM4OG7d5LiHZ4s5ZKCxai/Bf03YSm8fByEUsSLnDVmjyd xRGzpQhawCbvr6EQ0X1lPMiB36VnBp5I/sPLjm0OnuBAOOzwXUvtDw== =TkXG -----END PGP SIGNATURE----- Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "May God stand between you and harm, in all the empty places where you must walk." - Susan Ivonava, Babylon 5 From anon at anon.efga.org Wed Mar 18 19:30:29 1998 From: anon at anon.efga.org (Anonymous) Date: Wed, 18 Mar 1998 19:30:29 -0800 (PST) Subject: No Subject Message-ID: Fuck U Dickwads wrote: > > Those reporters who step outside of the scratch-and-sniff mentality > that guarantees a large pay-per-sniff audience of rubberneckers are > asking questions that have to do with access to 'National Security' > matters (deemed important enough to destroy the Constitution over) being > granted to individuals whose main qualification seems to be a great > set of hooters, or a sizeable donation to the correct political party. I count on TruthMonger as -my- mainstream news source. I'llKissYouOnTheLipsButIWon'tPutMyTongueInYourMouthMonger From spectre at anthrax.net Wed Mar 18 20:38:48 1998 From: spectre at anthrax.net (The Spectre) Date: Wed, 18 Mar 1998 20:38:48 -0800 (PST) Subject: Software license detector vans In-Reply-To: <35100ECB.4466@nac.net> Message-ID: At 20:44 3/18/98 -0500, you wrote: >Standard UPS's do not operate with their batteries "on-line" but in >standby mode. Because of this you do not get any of the filtering affect >from the batteries. You can get good "online" UPS's with gel-cell battery >banks but they cost $$$. Look at some of the companies that service the >telcom industry providing UPS for switchrooms. Line conditioning on the >standard UPS's (PC Decsktop grade) is medeocere at best and are designed >for leveling out power fluctuations not for filtering data leakage. > >If Tempest is a serious concern I recomend a dual battery bank so one bank >can be charging while the other is in use. Physicial disconnects on both >battery banks between the computer and between outside power grid to >insure physicial issolation durring operations. While I agree with you in that total security is only possible if you completely isolate the system, I think that the original person posting wasn't referring to the batteries, but rather the conditioning that is going on inside the UPS. Any decent ups will put the incoming power through a "conditioner" that will filter out noise in the incoming power, and rebuild the wave so that transient sags and spikes don't get through. It stands to reason that these filters would work in reverse, since they are AC filters. Most AC circutry works equally well in reverse as forward. DC circuitry would probably filter out noise equally as well since it simply won't work in reverse for the most part, it'll simply resist any reverse current until it blows. Of course, I make no claims about noise that the transformer itself may make while it does it's filtering that someone might be able to use to determine what was filtered out. -The Spectre [SP4 w/ Clam Cluster] -http://www.anthrax.net/cos "No man is clever enough to know all the evil he does." - La Rochefoucauld From nobody at REPLAY.COM Wed Mar 18 20:55:30 1998 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 18 Mar 1998 20:55:30 -0800 (PST) Subject: MISTY1 and MISTY2 Message-ID: <199803190454.FAA23416@basement.replay.com> MISTY1 and MISTY2 operate with 64-bitplain text and cypher text blocks and is contolled by a 128-bit key. These two encryption algorithms call MISTY generically. From StanSquncr at aol.com Wed Mar 18 21:47:34 1998 From: StanSquncr at aol.com (StanSquncr) Date: Wed, 18 Mar 1998 21:47:34 -0800 (PST) Subject: Chicken "anons" and "nobody's" Message-ID: <170eb93a.3510b14a@aol.com> In a message dated 98-03-18 22:53:53 EST, anon at anon.efga.org writes: << I count on TruthMonger as -my- mainstream news source.>> Who's that, the "TruthMeister? (Rush Limbaugh)" You would, you're an idiot (any person who counts on any one person as the only source of news, is an idiot). Stan From StanSquncr at aol.com Wed Mar 18 22:08:50 1998 From: StanSquncr at aol.com (StanSquncr) Date: Wed, 18 Mar 1998 22:08:50 -0800 (PST) Subject: UPSs Message-ID: <5b89711e.3510b439@aol.com> In a message dated 98-03-18 23:54:33 EST, spectre at anthrax.net writes: << ... Any decent ups will put the incoming power through a "conditioner" that will filter out noise in the incoming power, and rebuild the wave so that transient sags and spikes don't get through. ... >> BUT, even the fastest electronics cannot respond fast enough to the initial spike, if that spike is too high in the first place (if your incoming power lines get hit by lightning, for instance), it's already too late. My suggestion, don't trust a UPS to eliminate spikes, get it if you anticipate a need for back-up power to shut down your system in case of black-out (and screw the surge protectors, trust the filtering in your power supply to do that for you.) Stan From tristanm at bulletproof.com Wed Mar 18 23:13:24 1998 From: tristanm at bulletproof.com (Tristan Muller) Date: Wed, 18 Mar 1998 23:13:24 -0800 (PST) Subject: JDesignerPro 2.5 just released Message-ID: <19980319070533968.AQZ71@www.bulletproof.com> Hi Cypher, As a Microsoft Site Builder participant, BulletProof Corporation wants you to know about our latest release: Just Released! A while back you downloaded JDesignerPro 2.02 from the Site Builder Network. Version 2.5 is a much improved product with new Wizards, printing capability, JavaBeans support, the Deployment Manager and many other enhancements. JDesignerPro 2.5 The Java RAD Tool for Business Applications Download a free trial today (3MB): http://www.bulletproof.com * WIN JDesignerPro - $1200 Product Giveaway: Download and Install JDesignerPro 2.5 to find out how to win. Contest ends March 28th. * Buy before April 9th to save $300 As of April 9, 1998 the price of the JDesignerPro Standard System will increase to $995. Until then BulletProof is offering a grace period at the current $695 price. * JDesignerPro 2.5 Is For You JDesignerPro 2.5 is an easy to use tool for developers to build and deploy data-driven business applications for the Web - Sales Management, Inventory Management, Help Desk, Customer Care, Decision Support, etc. If you need to manage data through an Intranet, JDesignerPro is for you. For many basic database applications, no knowledge of Java is required. * Press Quotes "If you're looking for a database development environment that leverages Java's finest virtues, JDesignerPro is it." DBMS Magazine "This may be one of JDP's biggest advantages for database developers who find themselves thrust into Java development: No Java programming is necessary. Developers can implement any standard functions simply by associating one component's method with another component's event." InternetWorld magazine * Microsoft Site Builder Network Microsoft is one of our best partners and they've agreed to offer the new version 2.5 of JDesignerPro on the updated Site Builder Network. If you're a Site Builder member, you'll see BulletProof listed on the download area. * Major New Features of JDesignerPro 2.5 * FastSockets(tm) Technology in JAGGServer. With BulletProof's innovative FastSockets you'll see substantial speed improvements of nearly 300% throughout the development and deployment processes. FastSockets is a seamless integration requiring no effort on your part. The included JAGGServer(tm) middleware handles JDBC/ODBC database access, load balancing and more. All SQL and server messaging is created automatically. * Application Wizards - The Screen Wizards are now part of the Application Builder. Build complete forms, charts, master/details 70% faster than before. * Enhanced Data Wizards - Unprecedented speed, thanks to FastSockets, and ease in building complex data-aware interfaces. * Year 2000 compliance - With the end of the millennium lurking JDesignerPro is fully year 2000 compliant. You can now easily specify your default date format. * International Language Support - JDP now lets you customize the interface to allow for different language support. This feature can also be used to customize the labels and messages of JDesignerPro to your needs. * New component features - Several new features have been added to the existing JDesignerPro components such as date pop ups in the Text Grid again allowing you to create the most powerful finished application without any hand coding. Download a free trial today: http://www.bulletproof.com * WIN JDesignerPro - $1200 Product Giveaway: Download and Install JDesignerPro 2.5 to find out how to win. Contest ends March 28th. * See us at JavaOne, Moscone Center, San Francisco, March 24-27 in the Sun partner pavilion! Thanks for taking the time to read this. Regards, Tristan Muller Customer Support BulletProof Corporation *If you don't want to be notified of future product releases simply reply to this message and place the word 'remove' in the subject. From frantz at netcom.com Thu Mar 19 00:40:17 1998 From: frantz at netcom.com (Bill Frantz) Date: Thu, 19 Mar 1998 00:40:17 -0800 (PST) Subject: Will New Sendmail Block Remailers? In-Reply-To: <1.5.4.32.19980317141322.006c25cc@pop.pipeline.com> Message-ID: At 8:58 AM -0800 3/17/98, Ryan Anderson wrote: >> Markoff in the NYT reports today on the release of a new >> Sendmail upgrade by author Eric Allman that will block >> spam by checking the legitimacy of the originating address >> before delivery. >> >> ... > >All it really does is force spammers to search for someone's real address >to spoof and harass. (They can just scan usenet, and pick on random >people if they want..) The ultimate end of this line of measure/countermeasure is code that sniffs out peoples passwords so spammers can "borrow" their accounts to send a million or so messages. ------------------------------------------------------------------------- Bill Frantz | If hate must be my prison | Periwinkle -- Consulting (408)356-8506 | lock, then love must be | 16345 Englewood Ave. frantz at netcom.com | the key. - Phil Ochs | Los Gatos, CA 95032, USA From jkwilli2 at unity.ncsu.edu Thu Mar 19 02:11:53 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Thu, 19 Mar 1998 02:11:53 -0800 (PST) Subject: Chicken "anons" and "nobody's" In-Reply-To: <170eb93a.3510b14a@aol.com> Message-ID: On Thu, 19 Mar 1998, StanSquncr wrote: >In a message dated 98-03-18 22:53:53 EST, anon at anon.efga.org writes: > ><< I count on TruthMonger as -my- mainstream news source.>> > >Who's that, the "TruthMeister? (Rush Limbaugh)" > >You would, you're an idiot (any person who counts on any one person as the >only source of news, is an idiot). > >Stan > Well, Stan, all of the news you read ultimately comes from the one person selected by Clinton to drive The Propoganda Machine up in Washington, DC. Ken Williams ORG: NC State Computer Science Dept VP of The E.H.A.P. Corp. EML: jkwilli2 at adm.csc.ncsu.edu ehap at ehap.org WWW: http://152.7.11.38/~tattooman/ http://www.ehap.org/ PGP: finger tattooman at 152.7.11.38 From jkwilli2 at unity.ncsu.edu Thu Mar 19 02:36:22 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Thu, 19 Mar 1998 02:36:22 -0800 (PST) Subject: UPSs In-Reply-To: <5b89711e.3510b439@aol.com> Message-ID: On Thu, 19 Mar 1998, StanSquncr wrote: >In a message dated 98-03-18 23:54:33 EST, spectre at anthrax.net writes: > ><< ... Any decent ups will put the incoming power > through a "conditioner" that will filter out noise in the incoming power, > and rebuild the wave so that transient sags and spikes don't get through. ... >>> > >BUT, even the fastest electronics cannot respond fast enough to the initial >spike, if that spike is too high in the first place (if your incoming power >lines get hit by lightning, for instance), it's already too late. My >suggestion, don't trust a UPS to eliminate spikes, get it if you anticipate a >need for back-up power to shut down your system in case of black-out (and >screw the surge protectors, trust the filtering in your power supply to do >that for you.) > >Stan How many times have you been struck by lightning, Stan? The effects are showing... Ken Williams ORG: NC State Computer Science Dept VP of The E.H.A.P. Corp. EML: jkwilli2 at adm.csc.ncsu.edu ehap at ehap.org WWW: http://152.7.11.38/~tattooman/ http://www.ehap.org/ PGP: finger tattooman at 152.7.11.38 From whgiii at invweb.net Thu Mar 19 04:25:58 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Thu, 19 Mar 1998 04:25:58 -0800 (PST) Subject: Chicken "anons" and "nobody's" In-Reply-To: <170eb93a.3510b14a@aol.com> Message-ID: <199803191225.HAA21960@users.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <170eb93a.3510b14a at aol.com>, on 03/19/98 at 12:46 AM, StanSquncr said: >In a message dated 98-03-18 22:53:53 EST, anon at anon.efga.org writes: ><< I count on TruthMonger as -my- mainstream news source.>> >Who's that, the "TruthMeister? (Rush Limbaugh)" >You would, you're an idiot (any person who counts on any one person as >the only source of news, is an idiot). You don't have a clue do you Stan?? - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html - --------------------------------------------------------------- Tag-O-Matic: If Windows sucked it would be good for something. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNREBTo9Co1n+aLhhAQE0tAP9GR39xeKrtAYRc31BjhjC6EGRqOI46we0 NFBwTWXX6saynTvEo4gdk35Kko9W/cEKAxNsOmjDz8zsFaCX0LJNtzzcVai6g7/t o8GLb/PbDv3i1rMw/1vJqyvMH6D2d3IuIQvUFg0luNeHnSxUT+cze1r4moeHw+Fj yTDV7hk+lb4= =cOih -----END PGP SIGNATURE----- From Mia.Westerholm at DataFellows.com Thu Mar 19 05:06:29 1998 From: Mia.Westerholm at DataFellows.com (Mia Westerholm) Date: Thu, 19 Mar 1998 05:06:29 -0800 (PST) Subject: Data Fellows Introduces the Security Solution for Corporate Networks - VPN+ Message-ID: <3.0.2.32.19980319134441.006a06d8@smtp.DataFellows.com> Data Fellows Ltd. Media Release For immediate release 19 March 1998 DATA FELLOWS INTRODUCES THE SECURITY SOLUTION FOR CORPORATE NETWORKS F-Secure VPN+ offers worldwide strong security for all aspects of today�s networking ESPOO, FINLAND -- Data Fellows Ltd., a leading software development company known for its F-Secure anti-virus and cryptography products, has today introduced F-Secure VPN+, a complete security solution for all enterprise networking. F-Secure VPN+ is the successor of the award winning F-Secure VPN, an encrypting router that enables one to build a virtual private network over the Internet using strong cryptographic security. Now the F-Secure VPN+ product family is going one step further by facilitating the security integration of small sites and independent workstations to the corporate network. The extended corporate network may include corporate sites, partners or distributors, remote offices and even laptops. F-Secure VPN+ consists of three products: F-Secure VPN+ Gateway, F-Secure VPN+ Client (for the desktop), and F-Secure VPN+ Server. These components can be combined to build a variety of secure virtual private networks that cover all aspects of corporate networking. Such VPNs include the following: - Business VPN+: provides a cost-effective security solution for intranet connections between corporate sites. In-corporate communication can be encrypted with powerful F-Secure VPN+ Gateways regardless of the network technology. - Partner VPN+: offers strong authentication and filtering capabilities for extranet connections between an organization and its partners, subcontractors, or distributors. It keeps unwanted users out and facilitates secure communication no matter where the data goes to. - Remote Office VPN+: supports telecommuting as a method of working. It is a scaleable and cost-effective solution for securing communication over the Internet for the Small Office and the Home Office. - Traveling VPN+: secures the extension of the corporate network to employees on the road. Typical remote networking applications, such as email, or accessing corporate file servers, can be secured transparently. - Service VPN+: is suitable for organizations offering systems management services. It ensures that only the authorized systems manager can access the remote system and that administration data cannot be seen or tampered with by unauthorized outsiders. Service VPN also provides Internet Service Providers with the opportunity to find new sources of revenue by offering VPN based services, or hybrid customer networks with VPN links. Its powerful management features help the operator in maintaining the customer network. "Small and medium sized organizations don't need to wait any more," Mr. Jukka Kotovirta, Director of Sales from Data Fellows. "They are now able to build their own networks by using regular Internet connections combined with the F-Secure VPN+ security solutions. Large organizations can also utilize F-Secure VPN+ to extend their corporate network to sites outside the corporate domain." F-Secure VPN+ is firewall and router independent, allowing for the building of extranets on top of existing infrastructures. "The F-Secure VPN+ architecture is uniquely wide: it is compatible with all existing router and firewall solutions, and all major platforms," says Mr. Kotovirta. "For the end user, the strength of the product is its transparency. As F-Secure VPN+ operates at the OSI level 3, which is invisible at the application level, it does not require any changes to applications or their configurations." The F-Secure VPN+ will be released in June-July 1998. F-Secure VPN+ Server will initially be available for Microsoft Windows NT and Sun Solaris. F-Secure VPN+ Gateway will operate in Windows NT and Solaris. F-Secure VPN+ Client will initially operate in Solaris, Windows NT 4 and Windows95. The products use the SSH and IPSec security protocols. About Data Fellows: Data Fellows is one of the world�s leading developers of data security products with offices in San Jose, California and Espoo, Finland. Its groundbreaking F-Secure product family is a unique combination of globally available, strong encryption and revolutionary anti-virus software. The integrated F-Secure product range provides a complete security solution for enterprises, and includes file encryption and IPSec communication encryption products, VPN gateways, SSH based secure remote management software, and a full range of anti-virus products to workstations, servers and gateways. Data Fellows is also the developer of the award winning F-PROT Professional anti-virus, now part of the dual scanning engine concept of F-Secure Anti-Virus. Data Fellows is privately owned. Since it was founded in 1988, its annual net growth of net sales has been over 80%. Data Fellows offers a worldwide network of technical support, training and distribution in over 70 countries. Data Fellows belongs to an elite group of companies that have a triple-A rating from Dun&Bradstreet. For further information, please contact: Mr. Jukka Kotovirta, Director of Sales Tel. +358 9 859 900, Fax. +358 9 8599 0599 E-Mail: jukka.kotovirta at DataFellows.com or visit our web site at http://www.datafellows.com ALSO, VISIT OUT BOOTH AT CEBIT�98 (HALL 3, STAND B46) ���������������������������������������������������� Mia.Westerholm at DataFellows.com http://www.DataFellows.com Data Fellows Ltd. PL 24 FIN-02231 ESPOO, FINLAND Tel. +358 9 859 900 Fax. +358 9 8599 0599 From snickers at mejl.com Thu Mar 19 05:09:12 1998 From: snickers at mejl.com (Yupin Mungdee) Date: Thu, 19 Mar 1998 05:09:12 -0800 (PST) Subject: Will New Sendmail Block Remailers? In-Reply-To: Message-ID: > >All it really does is force spammers to search for someone's real address > >to spoof and harass. (They can just scan usenet, and pick on random > >people if they want..) > > The ultimate end of this line of measure/countermeasure is code that sniffs > out peoples passwords so spammers can "borrow" their accounts to send a > million or so messages. But that can be defeated with encryption. Another possible "ultimate end" for the spammer wars would be making spamming illegal, like fax spamming, and having the cops hunting down the spammers. But that can be defeated with truly anonymous markets, still assuming that encryption will be legal. To really beat spamming we probably need filters that only allow messages from inside our web of trust. Don't you agree? From billp at nmol.com Thu Mar 19 06:05:57 1998 From: billp at nmol.com (bill payne) Date: Thu, 19 Mar 1998 06:05:57 -0800 (PST) Subject: US court system Message-ID: <351125DE.4F04@nmol.com> Guys When Sandia assigned me to break locks for the FBI/Engineering Research Facility, project leader Peter Hamilton told me that if we got caught there were judges who would help us. I was not sure that I believe Hamilton then. I do now. Morales and I signed and mailed the petition for writ of prohibition on the 18th bill From info at softexport.com Thu Mar 19 11:40:17 1998 From: info at softexport.com (Soft Export- Nancy Matte') Date: Thu, 19 Mar 1998 11:40:17 -0800 (PST) Subject: Your Request for information on JDesignerPro from BulletProof, Corp Message-ID: <01BD5345.2D145D00.info@softexport.com> Hi Cypher Your inquiry to BulletProof, Corp about JDesignerPro was forwarded to us on Thursday, March 19, 1998. Soft/Export is celebrating the latest release of JDesignerPro V2.32- the Java Client-Server interface builder. With the ability to import any Java class JDesignerPro now becomes the best RAD tool for creating solutions using third party Java classes such as those from JScape, I-Kinetics, Rogue Wave, the KL Group, Microsoft, Netscape or even your own in house components or objects. Version.2.32 supports not only importing of JavaBeans but also importing of ANY Java object. You can now use the AFC, IFC, JFC or any other FC that you can get your hands on. This is the only 100% Pure Java tool which takes you from initial development to deployment all in the same environment. Soft/Export is the master international reseller for JDesignerPro outside of the U.S. If you are interested in placing an order for JDesignerPro, please fax a purchase order with shipping and credit card details to +353 1 294 2197 or email to sales at softexport.com. To find out more about JDesignerPro or any of the other products we sell, visit our website at: www.softexport.com. Please see below for special pricing on JDesignerPro. Please don't hesitate to contact me if you have any questions or require any additional assistance BR-JDPSS2.32 dollars J Designer Pro 2.32 Standard System BR-JDPEL2.32 249 dollars J Desinger Pro 2.32 Entry Level Yours sincerely, Noel Hall - SoftExport, Ltd Email: noelh at softexport.com From ulf at fitug.de Thu Mar 19 12:01:00 1998 From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=) Date: Thu, 19 Mar 1998 12:01:00 -0800 (PST) Subject: G8 action plan on online anonymity? Message-ID: <9803191909.AA49210@public.uni-hamburg.de> Apparently restrictions on online anonymity have been discussed at the meeting of the Justice and Interior Ministers of the G8 in Washington, Dec 8--12, 1997 on "high-tech and organized crime". >From Janet Reno's press release : "each nation has committed to develop faster ways to trace attacks coming through computer networks, so that we can quickly identify the hacker or criminal who is responsible." What are these fast ways to trace attacks? Did the ministers also discuss anonymous speech? Anyone have the full text of the declaration and the action plan? From mhw at wittsend.com Thu Mar 19 13:16:22 1998 From: mhw at wittsend.com (Michael H. Warfield) Date: Thu, 19 Mar 1998 13:16:22 -0800 (PST) Subject: Will New Sendmail Block Remailers? In-Reply-To: Message-ID: <199803192105.QAA27595@alcove.wittsend.com> Yupin Mungdee enscribed thusly: > > > >All it really does is force spammers to search for someone's real address > > >to spoof and harass. (They can just scan usenet, and pick on random > > >people if they want..) > > > > The ultimate end of this line of measure/countermeasure is code that sniffs > > out peoples passwords so spammers can "borrow" their accounts to send a > > million or so messages. > > But that can be defeated with encryption. > > Another possible "ultimate end" for the spammer wars would be making > spamming illegal, like fax spamming, and having the cops hunting down the > spammers. But that can be defeated with truly anonymous markets, still > assuming that encryption will be legal. Oh yeah right... Just like gambling being illegal has eliminated it from the Internet. We need to make it UNPROFITABLE and the scum will slink back under the rocks they came from. > To really beat spamming we probably need filters that only allow messages > from inside our web of trust. Don't you agree? Mike -- Michael H. Warfield | (770) 985-6132 | mhw at WittsEnd.com (The Mad Wizard) | (770) 925-8248 | http://www.wittsend.com/mhw/ NIC whois: MHW9 | An optimist believes we live in the best of all PGP Key: 0xDF1DD471 | possible worlds. A pessimist is sure of it! From StanSquncr at aol.com Thu Mar 19 13:39:32 1998 From: StanSquncr at aol.com (StanSquncr) Date: Thu, 19 Mar 1998 13:39:32 -0800 (PST) Subject: A little Paranoid, William? Message-ID: <48360fab.3511906d@aol.com> Their paranoia is something else that shows you who they are ("Know-nothings") - In a message dated 98-03-19 07:25:54 EST, whgiii at invweb.net writes: << -----BEGIN PGP SIGNED MESSAGE----- ... -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNREBTo9Co1n+aLhhAQE0tAP9GR39xeKrtAYRc31BjhjC6EGRqOI46we0 NFBwTWXX6saynTvEo4gdk35Kko9W/cEKAxNsOmjDz8zsFaCX0LJNtzzcVai6g7/t o8GLb/PbDv3i1rMw/1vJqyvMH6D2d3IuIQvUFg0luNeHnSxUT+cze1r4moeHw+Fj yTDV7hk+lb4= =cOih -----END PGP SIGNATURE----- >> From StanSquncr at aol.com Thu Mar 19 13:40:06 1998 From: StanSquncr at aol.com (StanSquncr) Date: Thu, 19 Mar 1998 13:40:06 -0800 (PST) Subject: UPSs Message-ID: <7341d3ab.3511906d@aol.com> In a message dated 98-03-19 05:36:18 EST, jkwilli2 at unity.ncsu.edu writes: << How many times have you been struck by lightning, Stan? The effects are showing... >> That, my fellow cypherpunks, was known as a 'ad hominem' attack (an attack on (supposed) character, because Ken Williams is too STUPID (after all, he's a "Know-nothing") to be able to attack what I've said.) Stan From StanSquncr at aol.com Thu Mar 19 13:40:10 1998 From: StanSquncr at aol.com (StanSquncr) Date: Thu, 19 Mar 1998 13:40:10 -0800 (PST) Subject: Chicken "anons" and "nobody's" Message-ID: <31b0872b.3511906c@aol.com> In a message dated 98-03-19 05:11:50 EST, jkwilli2 at unity.ncsu.edu writes: << Well, Stan, all of the news you read ultimately comes from the one person selected by Clinton to drive The Propoganda Machine up in Washington, DC. >> And what planet do you live on? Stan From n9505834 at garbo.nepean.uws.edu.au Thu Mar 19 13:58:22 1998 From: n9505834 at garbo.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Thu, 19 Mar 1998 13:58:22 -0800 (PST) Subject: Chicken "anons" and "nobody's" In-Reply-To: <31b0872b.3511906c@aol.com> Message-ID: On Thu, 19 Mar 1998, StanSquncr wrote: > In a message dated 98-03-19 05:11:50 EST, jkwilli2 at unity.ncsu.edu writes: > > << Well, Stan, all of the news you read ultimately comes from the one person > selected by Clinton to drive The Propoganda Machine up in Washington, DC. >> > > And what planet do you live on? Yar, everybody knows that it is Rupid Murdoc who runs all the news. Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. Support NoCeM http://www.cm.org/ I'm sorry but I just don't consider 'because its yucky' a convincing argument From declan at well.com Thu Mar 19 14:42:19 1998 From: declan at well.com (Declan McCullagh) Date: Thu, 19 Mar 1998 14:42:19 -0800 (PST) Subject: Will New Sendmail Block Remailers? In-Reply-To: Message-ID: So I'm told that the new version of sendmail (8.9) has the same antispam features as 8.8 -- only difference is in defaults. True? -Declan From mgraffam at mhv.net Thu Mar 19 15:22:08 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Thu, 19 Mar 1998 15:22:08 -0800 (PST) Subject: A little Paranoid, William? In-Reply-To: <48360fab.3511906d@aol.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Thu, 19 Mar 1998, StanSquncr wrote: > Their paranoia is something else that shows you who they are > ("Know-nothings") I've heard it said 'Paranoia is reality on a finer scale.' I believe it. If you think that signing messages is paranoia, you may be right.. I, for one, _am_ paranoid. I know the practical attacks that can be made, and I've seen them work and, and demonstrated how easy they are. Worse, I've experienced them. Maybe you haven't .. and thats good. I hope your good luck continues. But when you stick your neck out for something, you make enemies .. and I have my fair share of mine.. and I suspect that many here have their too (.. and when I think about it, they're prolly the same guys.. ) If I had it my way, I'd have all email sent to me encrypted. Next to nothing, I'll take signed messages any day. > In a message dated 98-03-19 07:25:54 EST, whgiii at invweb.net writes: > -----BEGIN PGP SIGNATURE----- ... ... > -----END PGP SIGNATURE----- >> My keys can be had off of my home page (my rsa 2048 and dh 4096 can be had off of my hard drive if I am online, else use the 1024 bit RSA key stored on my provider). PGP encrypted mail more than welcome. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc I think that we should be men first, and subjects afterward. It is not desirable to cultivate a respect for the law, so much as for the right. Henry David Thoreau "Civil Disobedience" -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQCVAwUBNRGnBQKEiLNUxnAfAQFpTwP+OawQiYahkwovIJaSwmX2xnnYLwbsTD7n yn8m0X+F/fnbLo5e4qBJTUBBftzC/8PGOKhlQsNpum27kEFpPLvnITPf475uwuH/ 9LlLgg7XVrUsvwFJ6N7cECTO5ZKrZNfF8oDezTtHUmvKQqb2CH/ZuGcjsilnF2MJ 5JgGEhI6CGA= =l+1p -----END PGP SIGNATURE----- From mgraffam at mhv.net Thu Mar 19 15:29:59 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Thu, 19 Mar 1998 15:29:59 -0800 (PST) Subject: UPSs In-Reply-To: <7341d3ab.3511906d@aol.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Thu, 19 Mar 1998, StanSquncr wrote: > In a message dated 98-03-19 05:36:18 EST, jkwilli2 at unity.ncsu.edu writes: > > << How many times have you been struck by lightning, Stan? The effects are > showing... >> > > That, my fellow cypherpunks, was known as a 'ad hominem' attack (an attack on > (supposed) character, because Ken Williams is too STUPID (after all, he's a > "Know-nothing") to be able to attack what I've said.) Actually, I believe it was because what you said was too stupid to be attacked.. no offense. The thread was about TEMPEST-related EMR. .. and your quote in question was: >BUT, even the fastest electronics cannot respond fast enough to the initial >spike, if that spike is too high in the first place (if your incoming power >lines get hit by lightning, for instance), it's already too late. My >suggestion, don't trust a UPS to eliminate spikes, get it if you > anticipate a need for back-up power to shut down your system in case of > black-out (and screw the surge protectors, trust the filtering in your > power supply to do that for you.) See.. now.. you're clearly talking about power protection.. but, you see we _weren't_ talking about power outages, we were talking about compromising emanations being sent through power lines.. and as far as the UPS goes, whether or not a UPS would help such muffle such emanations. Two completely different things. You may as well have said "Yeah, UPS is great. They have good rates on ground shipping." In which case the response of.. > << How many times have you been struck by lightning, Stan? The effects > are showing... >> ..might well be appropriate. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc I think that we should be men first, and subjects afterward. It is not desirable to cultivate a respect for the law, so much as for the right. Henry David Thoreau "Civil Disobedience" -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQCVAwUBNRGo0wKEiLNUxnAfAQHdjAP/QZALkfNwMGXqtoJLSdhhisAclmfDJiON P0WCSLG2fKhIAs3U54nIFEv/jxootQNZAHEG+/0xfw7NxhuBnphpAyIJ73qpUmee 9xdK7JcjcIgAwRAdbg9dBuWdMs+aIJFIS/ijMffbEy79EHGLvRV4LLRrV5m3A46k DxqIjpQKzZM= =y8Q+ -----END PGP SIGNATURE----- From Shane.Pearson at tafensw.edu.au Thu Mar 19 15:49:37 1998 From: Shane.Pearson at tafensw.edu.au (Pearson Shane) Date: Thu, 19 Mar 1998 15:49:37 -0800 (PST) Subject: UPSs Message-ID: Hi Stan, A simple low pass filter made of 2 large inductors and a few high voltage capacitors will do the trick nicely. Which is not a slow reacting device being passive. Combine this with polyswitch style protection and some method of discharging a really high voltage to ground and it'll be even better. A very cheap design that should be in all UPS's. And is certainly a whole lot better than nothing at all for removing harzardous spikes, etc. > -----Original Message----- > From: StanSquncr [SMTP:StanSquncr at aol.com] > Sent: Thursday, March 19, 1998 4:59 PM > To: spectre at anthrax.net; cypherpunks at toad.com > Subject: Re: UPSs > > In a message dated 98-03-18 23:54:33 EST, spectre at anthrax.net writes: > > << ... Any decent ups will put the incoming power > through a "conditioner" that will filter out noise in the incoming > power, > and rebuild the wave so that transient sags and spikes don't get > through. ... > >> > > BUT, even the fastest electronics cannot respond fast enough to the > initial > spike, if that spike is too high in the first place (if your incoming > power > lines get hit by lightning, for instance), it's already too late. My > suggestion, don't trust a UPS to eliminate spikes, get it if you > anticipate a > need for back-up power to shut down your system in case of black-out > (and > screw the surge protectors, trust the filtering in your power supply > to do > that for you.) > > Stan From dave at bureau42.ml.org Thu Mar 19 17:19:37 1998 From: dave at bureau42.ml.org (David E. Smith) Date: Thu, 19 Mar 1998 17:19:37 -0800 (PST) Subject: Will New Sendmail Block Remailers? In-Reply-To: Message-ID: On Thu, 19 Mar 1998, Declan McCullagh wrote: > So I'm told that the new version of sendmail (8.9) has the same antispam > features as 8.8 -- only difference is in defaults. True? The closest to a noticeable change I've spotted is that the simple anti-relaying rules (check_rcpt) are now part of the sendmail.cf by default. (No longer do they have to be downloaded separately and hacked in by hand.) There are more complex anti-relaying configurations that can be specified now, also (for permitting certain parties/domains to relay, or to only restrict certain groups from relaying). In other words, not much has changed. dave ----- David E. Smith, P O Box 324, Cape Girardeau MO 63702 http://bureau42.base.org/people/dave/ dave at bureau42.ml.org Random IRC Quote: [topic(#linux)] New MS motto: "Gehirnwesche die Kinder, wenn sie jung sind. In ihren Erwachsensein sind sie Ihre bereiten Sklaven. [TM]" (Brainwash the children. When they are adults they will be your slaves) topic set by Bascule [Sat Jan 24 05:57:42 1998] From op319 at juno.com Thu Mar 19 18:04:33 1998 From: op319 at juno.com (op319 at juno.com) Date: Thu, 19 Mar 1998 18:04:33 -0800 (PST) Subject: Make 6 Figure Income Working In Your Pajamas !! Message-ID: <77940725_18189> Make 6 Figure Income Working In Your Pajamas !! Each day I get out of bed, brush my teeth and walk into the next room to begin my work day..... Still in my PJs! And who am I working with, you ask. Well, my strategic partners are major corporations like: Netscape UUNet Oracle Sun Microsystems Worldcom (soon to be the 2nd largest phone company after merging with MCI) Sprint Cellular ....Incredible names in the communications industry!! The products and services from these corporations, which include Internet services, telecommunications services and unified messaging services, are targeted to the consumer, small office and home office (SOHO) markets. And there is even more coming in the next few months! And NO, it does not cost the king's ransom to sign up. How about $25?!!! Want more info? Reply with PAJAMAS in the subject. From billp at nmol.com Thu Mar 19 18:12:41 1998 From: billp at nmol.com (bill payne) Date: Thu, 19 Mar 1998 18:12:41 -0800 (PST) Subject: Wayne Madsen Message-ID: <3511CFDD.42E@nmol.com> Thursday 3/19/98 6:58 PM John Young J Orlin Grabbe John Gilmore Here are my notes Thursday December 29, 1994 16:45 File MAD1.TXT Memorandum of Record At 16:30 I received a call from a Wayne Madsen 3911 Fairfax Square Fairfax, VA 22031 703-876-3081 3065 FAX wmadsen at explorer.csc.com Wayne told me he had a contract to update the Puzzle Palace first written by James Bamford. The contract is with Penguin- Viking. We talked close to 45 minutes. Wayne told he saw my name in Wirbel's EE Times articles. I gave Madsen some information about my case and where documents can be obtained in the WDC area. Madsen told me two disturbing items: 1 NSA has been inviting White House staff to NSA. NSA attempts to impress staff with NSA gadgets. 2 NSA recently invited Tom Clancy to NSA. Clancy's next novel will be about NSA. Clancy, Wayne told, me is being used as a PR man to obtain more funding for NSA. Madsen also told me that a CRYPTO-AG salesman also got arrested by the Iranians for selling them crypto devices which also sent out the key! NSA work: called Red Threads or Hidden Threads. But let us be a little suspicious. NSA is fairly good at dirty tricks. 1 Anyone know Madsen? 2 Is Madsen for real? If Madsen is for real, then let us help him with his book. Madsen recently wrote http://caq.com/CAQ/caq63/caq63madsen.html A former spook did a drive-by of 3911 Fairfax Square Fairfax, VA 22031 shortly after the phone call from Madsen The former spook phoned me again on 07:29 3/16/1998. The spook did a technical evaluation of the above address. How may tricycles, cars, shades pulled-down to see if the address was possibly a home address. The spook concluded that the above address may be a business. Let�s all, of course, hope for settlement. bill From tm at dev.null Thu Mar 19 18:33:32 1998 From: tm at dev.null (TruthMongrel) Date: Thu, 19 Mar 1998 18:33:32 -0800 (PST) Subject: G8 action plan on online anonymity? In-Reply-To: <9803191909.AA49210@public.uni-hamburg.de> Message-ID: <3511D0F1.23A@dev.null> Ulf M�ller wrote: > >From Janet Reno's press release http://www.usdoj.dov/opa/pr/1997/December97/518cr.html>: "each nation > has committed to develop faster ways to trace attacks coming through > computer networks, so that we can quickly identify the hacker or > criminal who is responsible." Remo also gave an ultimatum to InterNet FreehDumb Fighters, while banging her shoe on the table, "Fuck with us, and we will *bury* you!" Talk quickly turned to discusion of how to best stop the leaks coming from a wide variety of government agencies which spilled the beans to the citizens about the kinds of nefarious activities that their government is *really* engaged in. "If these scum are allowed to circumvent the cloud of secrecy that we have thrown over our actions, then National Political Criminal Security will be endangered." Remo stated. Those gathered lifted the glasses of free liquor provided by Capital Hill lobbyists, hollering, "I'll drink to that." Where'sMine?Monger From tm at dev.null Thu Mar 19 18:33:38 1998 From: tm at dev.null (TruthMongrel) Date: Thu, 19 Mar 1998 18:33:38 -0800 (PST) Subject: [Fwd: Re: PROGRAMMERS WANTED !!!] Message-ID: <3511D4FA.6627@dev.null> It never fails to amaze me that a person can send a letter to a politician telling them that they should shove a crowbar up a child's ass on primetime TV, and get back a reply stating that their opinion is important to the recipient. Once technology is further advanced, I am certain that we can look forward to receiving replies from world leaders which begin with, "Thank you for the DEATH THREAT!!!" ButAreYouReallySincereMonger? To: toto at sk.sympatico.ca Subject: Re: PROGRAMMERS WANTED !!! From: Senator_McCain at mccain.senate.gov (Senator McCain) Date: Wed, 18 Mar 1998 01:51:18 -0500 *Automated response* Dear Friend: Thank you for taking the time to contact my office. Your views and opinions are important to me. Due to the high volume of Internet requests that I receive daily, I am unable to provide you with an immediate response. However, if you have included a current mailing address and phone number, you will receive a response by phone or via the U.S. Postal Service. If you did not include a mailing address and would like to receive a response, please feel free to 'reply' to this email, attach a copy of your original message, and be sure to include your postal address and phone number. Additionally, due to provisions of the Privacy Act of 1974, all federal agencies are prohibited from releasing any information regarding an individual without that individual's written consent. This protection means that if you are requesting my assistance with a particular agency or casework of any kind, I am unable to help until I have something in writing, complete with signature, from the person concerned to show that I am authorized to check into the matter. Unfortunately, email does not meet this requirement. I regret any inconvenience that this delay in corresponding may cause. Again, thank you for contacting my office. Sincerely, John McCain U.S. Senator From nobody at REPLAY.COM Thu Mar 19 18:38:41 1998 From: nobody at REPLAY.COM (Anonymous) Date: Thu, 19 Mar 1998 18:38:41 -0800 (PST) Subject: Make 6 Figure Income Working In Your Pajamas !! Message-ID: <199803200238.DAA24210@basement.replay.com> op319 at juno.com wrote: > > Make 6 Figure Income Working In Your Pajamas !! I had a girlfriend who used to do that...does that make me a pimp? From millions5 at juno.com Thu Mar 19 19:43:24 1998 From: millions5 at juno.com (millions5 at juno.com) Date: Thu, 19 Mar 1998 19:43:24 -0800 (PST) Subject: Millionaire in six months Message-ID: <258161_44888744> LOCAL MILLIONAIRE Willing to teach 5 men or women proven method for becoming a millionaire in six months. No experience necessary - However, applicant must have strong reason for becoming rich. Call 24 Hrs. 888-355-6909 or 714-951-3066 http://www.freeyellow.com/members2/mlmbabes/ Email: Million4UNME at juno.com To be removed from All mailings, reply with "remove" in the subject line. Thanks From m6RU9k9pF at edw1hit.com Thu Mar 19 22:33:11 1998 From: m6RU9k9pF at edw1hit.com (m6RU9k9pF at edw1hit.com) Date: Thu, 19 Mar 1998 22:33:11 -0800 (PST) Subject: NDIA's 24th Environmental Symposium & Exhibition Message-ID: <3jAeNh12OTUwd1UR5> PLEASE JOIN US AT NDIA's 24th Environmental Symposium & Exhibition "Smart Business Practices for Mission Readiness and Environmental Sustainability" April 6-9, 1998 Tampa Convention Center Tampa, FL Speakers Include: Ms. Sherri Goodman Deputy Under Secretary of Defense, Environmental Security and The Honorable Jacques Gansler Under Secretary of Defense, Acquisition & Technology This meeting provides a national forum for the free exchange of environmentally related policies, programs, related technical information and ideas from individuals, educational institutions, professional associations and societies, representatives of private companies and corporations and officials of Federal and State government agencies and regulatory bodies. You will also have the opportunity to attend Air Force Industry Day on Wednesday, April 8th. This is definitely a "can't miss" event! Exhibit space is still available! Please mailto:ckline at ndia.org for more information and a current floorplan. To view the complete agenda and hotel information, please visit our web page at http://www.ndia.org/events/brochure/844/844.htm We hope to see you in sunny Tampa, FL!! From thecompanyprez at a-vip.com Thu Mar 19 23:38:31 1998 From: thecompanyprez at a-vip.com (thecompanyprez at a-vip.com) Date: Thu, 19 Mar 1998 23:38:31 -0800 (PST) Subject: 9 out of 10 Americans are owed an average of $1,200.00 each! Message-ID: <> There is over 400 BILLION DOLLARS in unclaimed and lost money in North America and we want to help people get their money back! In a continuing effort to inform the public of this money, Personal Funds Recovery, Inc. is launching an INFOMERCIAL to air across North America. This INFOMERCIAL will educate millions of viewers about the over 400 BILLION DOLLARS that needs to be returned to it's rightful owners. We are looking for 300 INDEPENDENT AGENTS who will become a part of this campaign. Each Agent will own an exclusive territory and will receive a percentage of every lead generated from the national informercial! Your involvement will be very financially rewarding. Visit our website at to find out more about the opportunity and how you can get involved. ******************************** If you wish to be removed please hit REPLY and type REMOVE in the subject line and your request will be honored immediately. ******************************** From thecompanyprez at a-vip.com Thu Mar 19 23:38:31 1998 From: thecompanyprez at a-vip.com (thecompanyprez at a-vip.com) Date: Thu, 19 Mar 1998 23:38:31 -0800 (PST) Subject: 9 out of 10 Americans are owed an average of $1,200.00 each! Message-ID: <> There is over 400 BILLION DOLLARS in unclaimed and lost money in North America and we want to help people get their money back! In a continuing effort to inform the public of this money, Personal Funds Recovery, Inc. is launching an INFOMERCIAL to air across North America. This INFOMERCIAL will educate millions of viewers about the over 400 BILLION DOLLARS that needs to be returned to it's rightful owners. We are looking for 300 INDEPENDENT AGENTS who will become a part of this campaign. Each Agent will own an exclusive territory and will receive a percentage of every lead generated from the national informercial! Your involvement will be very financially rewarding. Visit our website at to find out more about the opportunity and how you can get involved. ******************************** If you wish to be removed please hit REPLY and type REMOVE in the subject line and your request will be honored immediately. ******************************** From newsdirectories at juno.com Thu Mar 19 23:56:24 1998 From: newsdirectories at juno.com (newsdirectories at juno.com) Date: Thu, 19 Mar 1998 23:56:24 -0800 (PST) Subject: Powerful New Advertising Software Message-ID: <17177016_47687087> POWERFUL NEW ADVERTISING SOFTWARE! When Advertising on the Internet , Just Isn't Enough. Introducing NATIONWIDE NEWSPAPERS! An Electronic Directory of Over 3,600 Papers! Includes Statewide & Group Network Associations. Pricing, Circulation, Discounted Rates, Phone Numbers, & More! List Includes Dailies, Weeklies, Shoppers, Community Papers & More! Save Time & Money, 1 Call, 1 Payment & You're in 100's of Papers! For More Information, Reply ASAP To: From dc at panix.com Fri Mar 20 00:24:55 1998 From: dc at panix.com (David W. Crawford) Date: Fri, 20 Mar 1998 00:24:55 -0800 (PST) Subject: NETA & exporting PGP Message-ID: March 20, 1998 Export Law Tested by Sale of Privacy Software SAN FRANCISCO -- An American maker of data-scrambling software said Thursday that it would circumvent U.S. export policies by allowing its Dutch subsidiary to begin selling an international version of Pretty Good Privacy, a strong encryption program that does not provide a back door for law enforcement surveillance. Because the company, Network Associates, is the nation's largest independent maker of computer security software, its action could have a serious effect on U.S. export policies on software. Network Associates' decision to sell a program specifically prohibited by the Commerce Department comes at a time when the Clinton administration is already fighting congressional attempts to end export controls on encryption software for fear that such restrictions will hurt the ability of American industry to compete internationally. [...] http://www.nytimes.com/library/tech/yr/mo/biztech/articles/20encrypt.html David W. Crawford Los Gatos, CA ps If there is an addres preferred to cypherpunks at toad.com, let me know. From Tryit at Ipswitch.com Fri Mar 20 09:56:28 1998 From: Tryit at Ipswitch.com (Tryit) Date: Fri, 20 Mar 1998 09:56:28 -0800 (PST) Subject: WS_FTP Pro 5.0 from Ipswitch, Inc. Now Available! Message-ID: <01C29E4A0C4BD111B1540060979D31222DE7E5@download.ipswitch.com> Dear Joe: FILE TRANSFER OVER THE INTERNET JUST GOT EASIER! As a user of WS_FTP Limited Edition from Ipswitch, you know that file transfer between your local PC and a remote FTP server is a breeze. We're happy to announce the availability of WS_FTP Pro 5.0, with a CHOICE of user interfaces. Select the all-new, easy-to-use Windows Explorer interface, the classic WS_FTP Pro interface, or both and transferring files over the Internet just got easier! Powered by the same reliable WS_FTP engine, the new Windows Explorer interface provides: - Seamless integration with Microsoft Windows Explorer - Support for "remote-to-remote" transfers WS_FTP Pro 5.0 also provides the following functions and benefits not found in WS_FTP LE: - Drag-and-drop capability between windows - Auto re-get of failed file transfers - Preserved date and file time on transfer from remote - Prompt for overwrite of same or newer files - Won't transfer old or same files during directory transfers - Product manual plus telephone or e-mail technical support FREE FULL-FEATURED EVALUATION DOWNLOAD Learn a lot more about WS_FTP Pro 5.0 by visiting our Web site at: http://www.ipswitch.com/products/WS_FTP While you're there, download a free evaluation copy to check out the impressive new features of WS_FTP Pro 5.0. And once you download the software you will be automatically entered into our Download to Win contest. You may be the lucky winner of a free copy of WS_FTP Pro 5.0. Install and win today! ORDER NOW WS_FTP Pro 5.0 is available for just $37.50. Purchase it electronically through our on-line store, by phone (1-800-793-4825), or simply print and return our Web-based fax-back order form: http://www.ipswitch.com/purchase Finally, we want to thank you for your interest in WS_FTP Pro and other great Ipswitch products. **************************************************** P.S. This message is intended as a service to Ipswitch customers and visitors to our Web site. To be removed from any future mailings please reply with DELETE in the subject line. ----------------------------------------- Ipswitch, Inc. 81 Hartwell Ave. Lexington, MA 02173 Phone: (781) 676-5700 Fax: (781) 676-5710 Web: http://www.ipswitch.com E-mail: sales at ipswitch.com Check out our Web site for more information on these exciting Ipswitch products: - IMail Server for Windows NT - Internet Messaging - WhatsUp Gold - Enterprise Network Monitoring - WS_Ping ProPack - Internet Utilities - VT320 Telnet and TNHOST Terminal Emulators From die at die.com Fri Mar 20 10:14:58 1998 From: die at die.com (Dave Emery) Date: Fri, 20 Mar 1998 10:14:58 -0800 (PST) Subject: reference In-Reply-To: Message-ID: <19980320131536.57966@die.com> On Thu, Mar 19, 1998 at 11:00:02PM -0600, Mike Rosing wrote: > Cryptography is a weapon. With a wire wrap tool, you too can create > weapons of mass destruction using nothing but untracable legal parts. ^^^^^^^^^^^^^^^^^^^^^^^^^^^ I'll bite, how ? Crypto is not a destructive weapon - it may blind the opponent, perhaps even sometimes at critical times when that can induce him to behave dangerously - but I fail to see how a cipher in and of itself is a weapon of destruction, let alone mass destruction. I see crypto as an entirely defensive weapon with no potential to destroy anything (except perhaps data when the key gets lost or forgotten). Of course you may be refering to other things one can put together with a wirewrap tool - which isn't really the tool one would want to assemble HERF or HPM destructive weapons with in any case since wirewrap wire can barely handle an amp or so max... > > Patience, persistence, truth, > Dr. mike > -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From roberts at traderonline.com Fri Mar 20 11:41:53 1998 From: roberts at traderonline.com (Bob Roberts) Date: Fri, 20 Mar 1998 11:41:53 -0800 (PST) Subject: reference In-Reply-To: Message-ID: <3512C840.85AA5E9D@traderonline.com> Dave Emery wrote: > > > I'll bite, how ? Crypto is not a destructive weapon - it may > blind the opponent, perhaps even sometimes at critical times when that > can induce him to behave dangerously - but I fail to see how a cipher in > and of itself is a weapon of destruction, let alone mass destruction. I > see crypto as an entirely defensive weapon with no potential to destroy > anything (except perhaps data when the key gets lost or forgotten). Imagine in the new realm of white collar crime, individuals are only convicted because of evidence. Evidence that can't be decrypted cannot be used. I see that going back to defense, but on the wrong side. From cryptech at Mcs.Net Fri Mar 20 11:46:35 1998 From: cryptech at Mcs.Net (Mike Rosing) Date: Fri, 20 Mar 1998 11:46:35 -0800 (PST) Subject: reference In-Reply-To: <19980320131536.57966@die.com> Message-ID: On Fri, 20 Mar 1998, Dave Emery wrote: > I'll bite, how ? Crypto is not a destructive weapon - it may > blind the opponent, perhaps even sometimes at critical times when that > can induce him to behave dangerously - but I fail to see how a cipher in > and of itself is a weapon of destruction, let alone mass destruction. I > see crypto as an entirely defensive weapon with no potential to destroy > anything (except perhaps data when the key gets lost or forgotten). By government fiat, not by reality. Crypto is *classified* as a weapon, so you stick a processor in a box with a keypad and scramble inputs to outputs and you have a device which is on the munitions list along with tanks and jet fighters. Pistols and rifles aren't weapons of mass destruction so they aren't on the munitions list, but crypto is. So, by fiat, it is a "weapon of mass destruction". it's Sarcasim dude, and points out how stupid the law can be. I'll take a battery operated wire wrap tool, but even a hand job and candle light will do. As for the high explosives, processors are good at timing. You can build a pretty cheap detonator with some fancy properties using a $10 processor chip. With a couple of transistors you'll get more than enough current to do the job, the wires won't be connected that long :-) Patience, persistence, truth, Dr. mike From tm at dev.null Fri Mar 20 12:28:15 1998 From: tm at dev.null (TruthMonger) Date: Fri, 20 Mar 1998 12:28:15 -0800 (PST) Subject: Does Spamming Really Exist? / Re: Will New Sendmail Block Remailers? In-Reply-To: Message-ID: <3512E780.5FBD@dev.null> Yupin Mungdee wrote: > > Another possible "ultimate end" for the spammer wars would be making > spamming illegal, like fax spamming, and having the cops hunting down the > spammers. But that can be defeated with truly anonymous markets, still > assuming that encryption will be legal. Spamming is an 'imaginary' felony, as are anonymity and encryption. The only real crime taking place on the InterNet is the marriage of an underage technology to a polygamous pen full of Sheeple whose dowry consists of an evolutionary heritage of worshipping whatever it is that they don't understand and following the Ram(it up your ass) with the biggest horns and the loudest bleat. > To really beat spamming we probably need filters that only allow messages > from inside our web of trust. Don't you agree? Complaining about 'spamming' is the equivalent of going to a Reservation and complaining that "there's too damn many Indians" around. "Doctor, it hurts when I do *this*..." "Then don't do *that*!" I don't post under my own name on USENET for a simple reason. When I do, I get mountains of spam. I do subscribe to cypherpunks through an unfilted toad.com and I get a few niggling spams a day that merely serve to remind me that the 'spammers' are out there, laying in wait. I don't live in Los Angelos for a simple reason. Within the first week of driving in traffic there, I would take out an Uzi and start blowing the other drivers away at random. I do make occassional forays into large cities such as LA and Phoenix when I want/need to do business or pleasure there, but when merely passing through, I do so at 4 a.m., in order to avoid the 'road spam'. The WorldWide Web is just that...a 'web'. If you want to traverse every part of it, just 'surfing' without using any kind of judgement or discrimination, then you can expect to get 'stuck' with whatever kind of substance is being used by those constructing that particular part of the web. When I go into the part of the web that John Perry has thrown his Net over and marked as his territory, my gut-reaction is to think of him as a dickhead, Nazi censor. Realistically, this would be true if he trod over to my few strands of webspace and tried to rule over it, but my willfully traversing into his domain and whining about how he acts within it is nothing more than egoism. Those who choose to participate with John Perry in the construction and maintenance of the web of trust/competency that he is involved in have certain expectations of free communications versus limitations of speech and action. Those who choose to participate in the construction/destruction of the CypherPunks lists can expect to be barraged by all manner of sanity/insanity, and to have to judge the value of the list for themselves in deciding whether to stay or to leave. (Relying on the CypherPunks Complaint Department to 'solve' this or that 'problem' is not a viable option.) "Doctor, I get 'spammed' when I go there..." "Then don't go there..." OldDocMonger From nobody at REPLAY.COM Fri Mar 20 12:28:39 1998 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 20 Mar 1998 12:28:39 -0800 (PST) Subject: Chicken "anons" and "nobody's" Message-ID: <199803202028.VAA16207@basement.replay.com> William H. Geiger III wrote: > > You don't have a clue do you Stan?? Stan, whose mind is held hostage by the heathens at A(h)OL, has not yet been visited by the revemissionlutionaries of the Army of Dog, and thus does not realize that the ClueServer died for his sins. Thus, his body and soul are destined to boil in a big black pot forged from the melted remains of his own kettles, and fired by the burning ears of those he has maligned behind their backs, as are all those who spread FUD out of cluelessness, instead of out of a genuine desire to be a rabble-rousing shit-disturber. CardinalBadSpellingMonger From rdew at el.nec.com Fri Mar 20 13:09:10 1998 From: rdew at el.nec.com (Bob De Witt) Date: Fri, 20 Mar 1998 13:09:10 -0800 (PST) Subject: UPSs Message-ID: <199803202103.NAA06318@yginsburg.el.nec.com> All, I cannot remember all of the equations that go into this, and only a very simplistic approach follows, but ... If your surge protector is a semi-conductor, it probably will be self-limiting. That is, it will reach a maximum block, and pass whatever is above that. A Trans-sorb device, and those chemical ones, all limit what they do based upon a total absorption. A lot of little ones kills it the same as a single big one. None of these tell you they are no longer operable. However, if the UPS is properly built, it will have an inductor as the leading serial device in a set of 'things'. I would expect a set of capacitors, in parallel with my load, on either side, appropriately sized. The battery that makes the 'U' in the UPS acts like another capacitor. These act as fast as the spike, ALWAYS. The sizes and number of components requires some calculations (testing does NOT hurt, either). Stan needs to review his basic electronics. Yes, it will even protect against lighting if designed for that purpose. Costs vary accordingly ... Bob De Witt, rdew at el.nec.com The views expressed herein are my own, and are not attributable to any other source, be it employer, friend or foe. > From StanSquncr at aol.com Wed Mar 18 22:44:02 1998 > From: StanSquncr > Date: Thu, 19 Mar 1998 00:59:19 EST > To: spectre at anthrax.net, cypherpunks at toad.com > Mime-Version: 1.0 > Subject: Re: UPSs > Content-transfer-encoding: 7bit > > In a message dated 98-03-18 23:54:33 EST, spectre at anthrax.net writes: > > << ... Any decent ups will put the incoming power > through a "conditioner" that will filter out noise in the incoming power, > and rebuild the wave so that transient sags and spikes don't get through. ... > >> > > BUT, even the fastest electronics cannot respond fast enough to the initial > spike, if that spike is too high in the first place (if your incoming power > lines get hit by lightning, for instance), it's already too late. My > suggestion, don't trust a UPS to eliminate spikes, get it if you anticipate a > need for back-up power to shut down your system in case of black-out (and > screw the surge protectors, trust the filtering in your power supply to do > that for you.) > > Stan > From spectre at anthrax.net Fri Mar 20 13:23:58 1998 From: spectre at anthrax.net (The Spectre) Date: Fri, 20 Mar 1998 13:23:58 -0800 (PST) Subject: UPSs (yeah, it's off topic) In-Reply-To: <199803202103.NAA06318@yginsburg.el.nec.com> Message-ID: At 16:03 3/20/98 , Bob De Witt wrote: >Stan needs to review his basic electronics. Yes, it will even protect >against lighting if designed for that purpose. Costs vary accordingly ... I think stan just confused UPS's with power strips. most of them don't have a switching time fast enough to stop lightning. -The Spectre [SP4 w/ clam cluster] -http://www.anthrax.net/cos "The surest way to corrupt a youth is to instruct him to hold in higher esteem those who think alike than those who think differently." -- Neitzsche, _The_Dawn_ PGP key available from servers. From StanSquncr at aol.com Fri Mar 20 13:51:50 1998 From: StanSquncr at aol.com (StanSquncr) Date: Fri, 20 Mar 1998 13:51:50 -0800 (PST) Subject: UPSs Message-ID: <9300db85.3512e4bd@aol.com> In a message dated 98-03-19 18:48:51 EST, Shane.Pearson at tafensw.edu.au writes: << A simple low pass filter made of 2 large inductors and a few high voltage capacitors will do the trick nicely. >> Right. The filtering that's already in the power-supply (except that the switching transformer isn't as big as an inductor as a normal old-style power transformer. Stan From StanSquncr at aol.com Fri Mar 20 13:52:07 1998 From: StanSquncr at aol.com (StanSquncr) Date: Fri, 20 Mar 1998 13:52:07 -0800 (PST) Subject: A little Paranoid, William? Message-ID: In a message dated 98-03-19 18:21:57 EST, mgraffam at mhv.net writes: << I've heard it said 'Paranoia is reality on a finer scale.' I believe it. If you think that signing messages is paranoia, you may be right.. I, for one, _am_ paranoid. I know the practical attacks that can be made, and I've seen them work and, and demonstrated how easy they are. Worse, I've experienced them. Maybe you haven't .. and thats good. I hope your good luck continues. >> Actually, my presence here amongst the cypherpunks is a direct RESULT of one of those attacks. But I can deal with it without getting paranoid. And you might be correct about paranoia and reality. Stan From StanSquncr at aol.com Fri Mar 20 13:52:29 1998 From: StanSquncr at aol.com (StanSquncr) Date: Fri, 20 Mar 1998 13:52:29 -0800 (PST) Subject: Chicken "anons" and "nobody's" Message-ID: <51df9de8.3512e4c1@aol.com> In a message dated 98-03-20 15:56:14 EST, nobody at REPLAY.COM writes: << Stan, whose mind is held hostage by the heathens at A(h)OL, >> You idiot, AOL is with YOU (AOL is part of the 'vast right-wing conspiracy')! See my political page. Stan, http://members.aol.com/StanSquncr/ From StanSquncr at aol.com Fri Mar 20 13:52:38 1998 From: StanSquncr at aol.com (StanSquncr) Date: Fri, 20 Mar 1998 13:52:38 -0800 (PST) Subject: Chicken "anons" and "nobody's" Message-ID: In a message dated 98-03-19 16:58:32 EST, n9505834 at garbo.nepean.uws.edu.au writes: << > << Well, Stan, all of the news you read ultimately comes from the one person > selected by Clinton to drive The Propoganda Machine up in Washington, DC. >> > > And what planet do you live on? Yar, everybody knows that it is Rupid Murdoc who runs all the news. >> Well, he runs a large part of the 'show' (Fox news (which has on all the Republican't favorites on sundays)). Stan From StanSquncr at aol.com Fri Mar 20 13:52:40 1998 From: StanSquncr at aol.com (StanSquncr) Date: Fri, 20 Mar 1998 13:52:40 -0800 (PST) Subject: UPSs Message-ID: <76f6bc68.3512e4bd@aol.com> In a message dated 98-03-19 18:29:55 EST, mgraffam at mhv.net writes: << >BUT, even the fastest electronics cannot respond fast enough to the initial >spike, if that spike is too high in the first place (if your incoming power >lines get hit by lightning, for instance), it's already too late. My >suggestion, don't trust a UPS to eliminate spikes, get it if you > anticipate a need for back-up power to shut down your system in case of > black-out (and screw the surge protectors, trust the filtering in your > power supply to do that for you.) See.. now.. you're clearly talking about power protection.. but, you see we _weren't_ talking about power outages, we were talking about compromising emanations being sent through power lines.. and as far as the UPS goes, whether or not a UPS would help such muffle such emanations. >> Right. That's why I pointed out that you shouldn't use a UPS and expect it to prevent large surges (such as the type that occurs when lightning hits your incoming power. So, my statement was NOT stupid, your attack on it was. :-) Stan From StanSquncr at aol.com Fri Mar 20 13:54:44 1998 From: StanSquncr at aol.com (StanSquncr) Date: Fri, 20 Mar 1998 13:54:44 -0800 (PST) Subject: UPSs (yeah, it's off topic) Message-ID: <10a39b7a.3512e54d@aol.com> In a message dated 98-03-20 16:23:56 EST, spectre at anthrax.net writes: << At 16:03 3/20/98 , Bob De Witt wrote: >Stan needs to review his basic electronics. Yes, it will even protect >against lighting if designed for that purpose. Costs vary accordingly ... I think stan just confused UPS's with power strips. >> Obviously, you're just confused. :-) << PGP key available from servers. >> So where's your PGP signiture? Stan From StanSquncr at aol.com Fri Mar 20 13:56:24 1998 From: StanSquncr at aol.com (StanSquncr) Date: Fri, 20 Mar 1998 13:56:24 -0800 (PST) Subject: UPSs Message-ID: <24e219e8.3512e4c1@aol.com> In a message dated 98-03-20 16:04:24 EST, rdew at el.nec.com writes: << If your surge protector is a semi-conductor, it probably will be self-limiting. That is, it will reach a maximum block, and pass whatever is above that. >> Yes, but what you fail to point out, is the reason it will pass everything, it will have been blown (shorted, most likely). So, because you failed to point this out, I figure the rest of your response isn't worth responding to. Stan From david at infocom.com Fri Mar 20 14:06:36 1998 From: david at infocom.com (David Scheidt) Date: Fri, 20 Mar 1998 14:06:36 -0800 (PST) Subject: Does Spamming Really Exist? / Re: Will New Sendmail Block Remailers? In-Reply-To: <3512E780.5FBD@dev.null> Message-ID: On Fri, 20 Mar 1998, TruthMonger wrote: > Spamming is an 'imaginary' felony, as are anonymity and encryption. Spamming is theft of services, sir. I am forced to pay for a "service" that I did not request. I, and everyone else, pays for spam either directly in connect time, or because my ISP wastes bandwidth handling the stuff. I am not that much bothered by that it is advertising, or pure junk, but that I pay for it. > > To really beat spamming we probably need filters that only allow messages > > from inside our web of trust. Don't you agree? Make people bear the true cost of spam, and it will stop. From spectre at anthrax.net Fri Mar 20 14:15:14 1998 From: spectre at anthrax.net (The Spectre) Date: Fri, 20 Mar 1998 14:15:14 -0800 (PST) Subject: UPSs (yeah, it's off topic) In-Reply-To: <10a39b7a.3512e54d@aol.com> Message-ID: At 16:53 3/20/98 -0500, StanSquncr wrote: >Obviously, you're just confused. :-) hmm? heh.. hey, I was just trying to help you out man.. I haven't heard of a UPS that won't protect against a lightning strike.. >So where's your PGP signiture? I get bitched at by list members when I sign my messages.. :) If I have something important to say, I'll sign it.. same goes if people start faking them, so far no one has. -The Spectre [SP4 w/ Clam Cluster] -http://www.anthrax.net/cos "No man is clever enough to know all the evil he does." - La Rochefoucauld From ian at deepwell.com Fri Mar 20 14:32:06 1998 From: ian at deepwell.com (Ian Briggs) Date: Fri, 20 Mar 1998 14:32:06 -0800 (PST) Subject: Does Spamming Really Exist? / Re: Will New Sendmail Block Remailers? In-Reply-To: <3512E780.5FBD@dev.null> Message-ID: <3.0.3.32.19980319142712.0095f1e8@deepwell.com> >> Spamming is an 'imaginary' felony, as are anonymity and encryption. No, its actually theft of services. Imagine if I called you collect anytime I was out and about and your phone automatically accepted the charge. Then I spent a couple minutes filling you in on my day, and how I felt. The end of the month you get a couple hundred dollar collect bill. Not to mention that you don't have call waiting and there may have been important phone calls that will have to call back later. Then imagine I stole your cell phone to call you collect while I roamed around other cities and filled you in on how I felt about the day so far. And you used your Cell phone for work, and lots of people were calling you but you weren't getting the messages, and you ended up loosing customers. 1. ISP pay for bandwidth. If your outside the US 128Kbps lines can go upwards of several thousand a month. 2. Spammers relay through other ISP mail servers. This usually kills their mail server, or they get added to Paul Vixie's blackhole list. 3. It wastes ISP time. ISP get dozens of complaints a day and have to explain to every newbie exactly what spam is, why they got it, etc. etc. I know, im an ISP. Ian From rwright at adnetsol.com Fri Mar 20 14:58:30 1998 From: rwright at adnetsol.com (Ross Wright) Date: Fri, 20 Mar 1998 14:58:30 -0800 (PST) Subject: Does Spamming Really Exist? / Re: Will New Sendmail Blo Message-ID: <199803202258.OAA09440@toad.com> David: Blah blah blah, theft of services, blah, oh mr. government: please deliver us from spam, blah, blah, blah. TruthMonger wrote one on the best pieces on spam, and you come up with the same old SHIT! Just because you repeat "theft of services" won't make it true. Blah blah, make spammers pay blah blah. Shut up, and hit delete! You fucktard. Spam is not crime, it is commerce! On or About 20 Mar 98 at 17:06, David Scheidt wrote: > On Fri, 20 Mar 1998, TruthMonger wrote: > > > Spamming is an 'imaginary' felony, as are anonymity and > > encryption. > > Spamming is theft of services, sir. I am forced to pay for a > "service" that I did not request. I, and everyone else, pays for > spam either directly in connect time, or because my ISP wastes > bandwidth handling the stuff. I am not that much bothered by that > it is advertising, or pure junk, but that I pay for it. > > > > To really beat spamming we probably need filters that only allow > > > messages from inside our web of trust. Don't you agree? > > Make people bear the true cost of spam, and it will stop. > =-=-=-=-=-=- Ross Wright King Media: Bulk Sales of Software Media and Duplication Services http://ross.adnetsol.com Voice: (408) 259-2795 From david at infocom.com Fri Mar 20 15:05:41 1998 From: david at infocom.com (David Scheidt) Date: Fri, 20 Mar 1998 15:05:41 -0800 (PST) Subject: Does Spamming Really Exist? / Re: Will New Sendmail Blo In-Reply-To: <199803202258.RAA17285@infocom.com> Message-ID: On Fri, 20 Mar 1998, Ross Wright wrote: > Spam is not crime, it is commerce! Spam is commerce with the costs borne by the wrong party. From rwright at adnetsol.com Fri Mar 20 15:10:45 1998 From: rwright at adnetsol.com (Ross Wright) Date: Fri, 20 Mar 1998 15:10:45 -0800 (PST) Subject: Does Spamming Really Exist? / Re: Will New Sendmail Blo Message-ID: <199803202310.PAA09594@toad.com> On or About 20 Mar 98 at 18:05, David Scheidt wrote: > On Fri, 20 Mar 1998, Ross Wright wrote: > > > Spam is not crime, it is commerce! > > Spam is commerce with the costs borne by the wrong party. Blah blah blah. I'm bored with this SHIT. Blah blah blah. Like the TruthMonger said, you roll around on the floor with the dogs, you gonna get licked on the mouth. Spam is a fact of life, and complaining about it is far worse than spam. Again, I say: hit your delete key and shut up, you fucktard. Thanks. =-=-=-=-=-=- Ross Wright King Media: Bulk Sales of Software Media and Duplication Services http://ross.adnetsol.com Voice: (408) 259-2795 From rwright at adnetsol.com Fri Mar 20 15:26:21 1998 From: rwright at adnetsol.com (Ross Wright) Date: Fri, 20 Mar 1998 15:26:21 -0800 (PST) Subject: Complaints about spam are TRUE theft of services Message-ID: <199803202326.PAA09734@toad.com> On or About 19 Mar 98 at 14:27, Ian Briggs wrote: > >> Spamming is an 'imaginary' felony, as are anonymity and > >> encryption. > > No, its actually theft of services. No, actually your complaints about spam are TRUE theft of services. In an article that I posted to this list last year it says the following: Mailing-list spammers Email spam is the favorite gripe of most Netizens, excepting the spammers. Congress is considering legislation [25] to limit the practice of sending unwanted commercial email in bulk. Not everyone thinks this is a good idea. See [26] for a thread from an ongoing debate on Declan McCullagh's fight-censorship mailing list. George Matyjewicz did a modest experiment on a week's worth of his email -- he is on 56 mailing lists and gets around 200 messages a day -- to gauge how widespread the problem actually is. Matyjewicz posted these results: Total messages...1,354...193.4 Spam messages.......10.......1.4.....< 1 % Spam complaints....189.......27.0.....14 % This article is at: http://206.215.211.222/archive/0108.html Spam is not crime, it's commerce. Shut up and hit that delete key, you fucktard. Thanks. =-=-=-=-=-=- Ross Wright King Media: Bulk Sales of Software Media and Duplication Services http://ross.adnetsol.com Voice: (408) 259-2795 From rwright at adnetsol.com Fri Mar 20 15:43:20 1998 From: rwright at adnetsol.com (Ross Wright) Date: Fri, 20 Mar 1998 15:43:20 -0800 (PST) Subject: Complaints about spam are TRUE theft of services Message-ID: <199803202343.PAA09849@toad.com> On or About 19 Mar 98 at 15:31, Ian Briggs wrote: > >Spam is not crime, it's commerce. Shut up and hit that delete key, > > you fucktard. > > Its not commerce, its collect calls and fuck you. Fax bombing is > illegal. > > Unsolicitated e-mail of this nature will eventually also be. Is that *really* what you want? >> Not because its "dangerous" to the internet, there are a lot more > dangerous issues facing todays Internet, because organized ISP have > enough power to tell cluless lawmakers it is. Again, I ask: "Is that *REALLY* what you want?" You want stupid congressmen and women to make new laws about spam??? Are you nuts? *Really*, you want them sticking their small minds into the internet? *REALLY*?????? You and all your "organized ISP" brothers should just shut up and hit the delete keys, you bunch of fucktards. Thanks. =-=-=-=-=-=- Ross Wright King Media: Bulk Sales of Software Media and Duplication Services http://ross.adnetsol.com Voice: (408) 259-2795 From paulmerrill at acm.org Fri Mar 20 16:06:21 1998 From: paulmerrill at acm.org (Paul H. Merrill) Date: Fri, 20 Mar 1998 16:06:21 -0800 (PST) Subject: Complaints about spam are TRUE theft of services In-Reply-To: <199803202343.PAA09849@toad.com> Message-ID: <35132F8D.15FF@acm.org> Ross Wright wrote: > > On or About 19 Mar 98 at 15:31, Ian Briggs wrote: > > > >Spam is not crime, it's commerce. Shut up and hit that delete key, > > > you fucktard. > > > > Its not commerce, its collect calls and fuck you. Fax bombing is > > illegal. > > > > Unsolicitated e-mail of this nature will eventually also be. > > Is that *really* what you want? > > >> Not because its "dangerous" to the internet, there are a lot more > > dangerous issues facing todays Internet, because organized ISP have > > enough power to tell cluless lawmakers it is. > > Again, I ask: "Is that *REALLY* what you want?" You want stupid > congressmen and women to make new laws about spam??? Are you nuts? > > *Really*, you want them sticking their small minds into the internet? > *REALLY*?????? > > You and all your "organized ISP" brothers should just shut up and hit > the delete keys, you bunch of fucktards. > > Thanks. > > =-=-=-=-=-=- > Ross Wright > King Media: Bulk Sales of Software Media and Duplication Services > http://ross.adnetsol.com > Voice: (408) 259-2795 While I do not completely agree with the tone of the comments, nor do I buy the specific numbers involved, I have found that the mouthing off about the terror of Spam to take more bandwidth than the (EMail) spam itself does. I also fear legislative involvement much more than the spam itself. OTOH I dislike spam intensely and do reufse to buy from a spammer -- even when they occasionally have a toy I just might want under other circumstances. PHM From shadow at tfs.net Fri Mar 20 16:13:10 1998 From: shadow at tfs.net (sphantom) Date: Fri, 20 Mar 1998 16:13:10 -0800 (PST) Subject: UPSs In-Reply-To: <7341d3ab.3511906d@aol.com> Message-ID: <35130631.B046F2DA@tfs.net> some protection is better than none. my roommate and I have our computers in the same room off of the same outlet but my computer has an UPS and his does not. During a storm, lightning hit near the apartment building and it took out his computer but not mine. But I do have a friend who lost his computer to a direct strike to the power lines and it took out the surge strip as well. At least in my case, it was not a direct strike into the power lines but what happened to my roommate made him get an UPS to at least have some protection next time. At least he will not have to possibly shell out another $1,500 for another computer. From paulmerrill at acm.org Fri Mar 20 16:35:06 1998 From: paulmerrill at acm.org (Paul H. Merrill) Date: Fri, 20 Mar 1998 16:35:06 -0800 (PST) Subject: My Most Abject Apologies Message-ID: <3513364E.2938@acm.org> I wish to publicly thank Bill Stewart for pointin out my spelling error in the account I set up for DV for two reasons 1) I truly dilike anyone mishandling my own name in print or in pronunciation and 2) a demonstration needs to be error free or it is a Not Good Thing (not all the way to a Bad Thing for a typo, but enough to take a dim view of it) In this sprirt, I unsubscribed and removed the account and replaced (and resubscribed) it with DimVu at aol.com I apologize to one and all especially DV himself -- I certainly did not wish to sully his good name thorugh misspelling. As always, Your Humble Servant, Paul H. Merrill BTW I coulda swore I sent this thing out yesterday, but since I shore ain't seed it, I (wrote and) sent another. (I keep no EMail.) PHM From bill.stewart at pobox.com Fri Mar 20 18:07:37 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 20 Mar 1998 18:07:37 -0800 (PST) Subject: How government _can_ help stop spam - Re: Does Spamming Really Exist? In-Reply-To: Message-ID: <3.0.5.32.19980320164218.008e1b20@popd.ix.netcom.com> >>> Spamming is an 'imaginary' felony, as are anonymity and encryption. >No, its actually theft of services. Generally, it's neither one, but it is a rude imposition on the reader's attention, and may also increase costs to the user or the user's service provider. So what's an anarchist like me doing saying that the government can help? Well, they can help by getting out of the way. Currently, there are laws against breaking into computer systems and against denial of service attacks; they can be Federal felonies. As a modest proposal, I would suggest that the government allow anyone who's been sent unwanted bits by a spammer to send any unwanted bits they feel like in return. Maybe Spamford doesn't want chain letters about "Make Pings Of Death Fast" or "Free Live Chat With Real Spammers!" but spammers really aren't in any position to complain. ---------------- There's also http://www.iks-jena.de/mitarb/lutz/usenet/teergrube.en.html Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From spam at dev.null Fri Mar 20 18:09:31 1998 From: spam at dev.null (Spammer) Date: Fri, 20 Mar 1998 18:09:31 -0800 (PST) Subject: S p a m H a i k u / [Repost] Message-ID: <35133310.6F46@dev.null> S p a m H a i k u : 1. Blue can of steel What promise do you hold? Salt flesh so ripe 2. Can of metal, slick Soft center, so cool, moistening I yearn for your salt 3. Twist, pull the sharp lid Jerks and cuts me deeply but Spam, aah, my poultice 4. Silent, former pig One communal awareness Myriad pink bricks 5. Clad in metal, proud No mere salt-curing for you You are not bacon 6 And who dares mock Spam? You? you? you are not worthy Of one rich pink fleck 7. Like some spongy rock A granite, my piece of Spam In sunlight on my plate 8. Little slab of meat In a wash of clear jelly Now I heat the pan 9. Oh tin of pink meat I ponder what you may be: Snout or ear or feet? 10. In the cool morning I fry up a slab of Spam A dog barks next door 11. Pink tender morsel Glistening with salty gel What the hell is it? 12. Ears, snouts and innards A homogeneous mass Pass another slice 13. Old man seeks doctor "I eat Spam daily", he says. Angioplasty 14. Highly unnatural The tortured shape of this "food" A small pink coffin 15. Pink beefy temptress I can no longer remain Vegetarian From spam at dev.null Fri Mar 20 18:09:40 1998 From: spam at dev.null (Spammer) Date: Fri, 20 Mar 1998 18:09:40 -0800 (PST) Subject: Spam-Busters versus Spam-Protection Racket / Re: Does Spamming Really Exist? In-Reply-To: Message-ID: <35133C44.5941@dev.null> David Scheidt wrote: > On Fri, 20 Mar 1998, TruthMonger wrote: > > Spamming is an 'imaginary' felony, as are anonymity and encryption. > Spamming is theft of services, sir. I am forced to pay for a "service" > that I did not request. I, and everyone else, pays for spam either > directly in connect time, or because my ISP wastes bandwidth handling the > stuff. I am not that much bothered by that it is advertising, or pure > junk, but that I pay for it. The thievery is taking place at the ISP level. I live in the boondocks where the phone company charged $5.00 per hour for InterNet access, until they lost their monopoly, after which their rates magically dropped to $1.00 per hour. My hook-up rate remains around that rate because of competing ISP's being required to pay vigorish to the government-owned teleco, far beyond their actual costs. If I lived in the 'big city', then I would be able to avail myself of the $19.95-unlimited-connection charges. Thus, any 'spam' I received would only cost me my time and energy, as opposed to the money that the teleco robs me of under cover of their government-supported monopoly. NEWS FLASH!!! You were born into a world where even your momma's tit competed for your attention, time and energy. When your mother's breast-milk dried up, did you petition the government to have her tit imprisoned under 'Truth In Advertising' laws? Did you demand that the government force her to refrain from bringing her tit into your presence, where it would compete for your time, attention and energy? When my mother's breast-milk dried up, I learned to reach for the bottle (as Anheiser-Busch will gladly verify). In all of my time on the InterNet, I have responded to and enriched only one (count 'em, *1*) of the personages who have sent an unsolicited email to my account. In doing so, however, I have effectively endorsed the value (be it in an exceedingly minor way) of those who bring their UCE/Spam to my attention. You take the position that your ISP 'wastes bandwidth' handling 'spam'. If you are paying them to do so, without requiring that they provide you with an option in return for the money that you are paying them, this is not the fault of those who deem that you may be interested in their product/cause/bullshit. As well, since the 'spammers' are obviously receiving a response that makes it worth their while to continue their efforts, it is obvious that others on your ISP may not regard their missives as wasted bandwidth. Sometime ago, plaidworks.com complained about someone 'abusing' their system by subscribing the CypherPunks list, among others, to their massive mailings. The fact of the matter was, they left their system open to being 'used' in the manner it was, in order to gain maximum profit without going to the expense of putting safeguards in place which would prevent others from using the resources they made available to the InterNet for their own purposes. NEWS FLASH!!! The InterNet is a communal endeavor. Resources are shared among those who choose to actively participate in the infrastructure and the technologies of which it is composed. Those who wish to participate in only a portion of the activity and resources shared on the InterNet can do so if they are willing to take the actions required to limit their participation and/or exposure on the InterNet. I do not use Gopher. The use that others make of the program is not a 'theft of services' that 'wastes' the bandwidth of my ISP. My ISP does not provide Telnet access. They do so in order to prevent me from availing myself of cheaper services which are available at ISP's which are not restrained by their monopoly To me, *this* is 'denial of service.' Because of the armed robbery of the government-monopoly ISP that is available to me, it costs me an unacceptable amount of money to go to USENET. I don't go there. Spammer From spam at dev.null Fri Mar 20 18:10:17 1998 From: spam at dev.null (Spammer) Date: Fri, 20 Mar 1998 18:10:17 -0800 (PST) Subject: New Champion! / Re: Complaints about spam are TRUE theft of services In-Reply-To: <199803202343.PAA09849@toad.com> Message-ID: <351331C7.1CE4@dev.null> Paul H. Merrill wrote: > > While I do not completely agree with the tone of the comments, nor do I > buy the specific numbers involved, I have found that the mouthing off > about the terror of Spam to take more bandwidth than the (EMail) spam > itself does. I also fear legislative involvement much more than the > spam itself. While TruthMonger's initial post, "Does Spamming Really Exist," was obviously an attempt to lure Ross Wright out of the lair from which he lurks, furtively monitoring the CypherPunks list, his secondary goal was undoubtedly to laugh up his sleeve at the posters who would inundate the list with a quantity of yea-nay's which would vastly exceed the amount of spam which is passed on to subscribers of the unfiltered toad.com CypherPunks list. A communique from TruthMonger, shortly before he transmorgatized into his 'Spammer' persona, informed me that he felt Paul Merrill had earned the title of Chief Spammer SpokesPerson/Champion, despite the heartfelt compliment that Ross Wright gave TM in one of his missives. The concept of the spam-complainer being the true spammer on any given mailing list, by virtue of setting off a mountain of posts which are in all likelyhood off-topic and meant to appeal only to the knee-jerk reactions of jerks with knees, is completely in line with the theory that the only posts which are truly off-topic on the CypherPunks lists are those which complain about off-topic posts. There is a case currently before the Supreme Court of Canada which is continuing, despite the original plaintiffs having settled out of court, without government intervention, which will decide whether gay couples will be allowed to get butt-fucked under the same vague, arbitrary and capricious laws as those which are used to ruin the lives of the heterosexual citizens. Even radical femnists have had the common sense not to petition the government to ensure women equal representation in the gas chambers of America. Radical anti-spammers should take note... Spammer From spam at dev.null Fri Mar 20 18:49:02 1998 From: spam at dev.null (Spammer) Date: Fri, 20 Mar 1998 18:49:02 -0800 (PST) Subject: Fucking Sheeple / Re: Does Spamming Really Exist? In-Reply-To: <3512E780.5FBD@dev.null> Message-ID: <35134477.308E@dev.null> Ian Briggs wrote: > > >> Spamming is an 'imaginary' felony, as are anonymity and encryption. > > No, its actually theft of services. > > Imagine if I called you collect anytime I was out and about and your phone > automatically accepted the charge. Then I spent a couple minutes filling > you in on my day, and how I felt. Then I would be a fucking idiot for willingly giving my business to a phone company that would allow this. The fact is, the only phone company available to me is a monopoly who will no doubt institute this 'feature' because of your suggestion. I will have them forward my bill to you... > 1. ISP pay for bandwidth. > If your outside the US 128Kbps lines can go upwards of several thousand a > month. Then they should expend the time, energy and resources that will enable them to deny the use of their commonly shared resources with members of the InterNet community which they do not wish to support. > 2. Spammers relay through other ISP mail servers. > This usually kills their mail server, or they get added to Paul Vixie's > blackhole list. The InterNet is a shared resource. If the ISP does not want to share certain resources with this-or-that entity on the communal resource of the Net, then they can configure their system to deny reciprocal services to their fellow Netizens. > 3. It wastes ISP time. > ISP get dozens of complaints a day and have to explain to every newbie > exactly what spam is, why they got it, etc. etc. Perhaps they should spend their time configuring their systems to allow what they feel is most useful to their customers, and tell those who complain to go somewhere else. > I know, im an ISP. I will petition the government to pass laws to prevent your ISP from spamming me with posts such as this, which reflect nothing more than the standard Sheeple position that anything which you do not personally desire should be outlawed. "That which is not permitted, is forbidden." ~ Animal Farm Spammer From paulmerrill at acm.org Fri Mar 20 19:08:55 1998 From: paulmerrill at acm.org (Paul H. Merrill) Date: Fri, 20 Mar 1998 19:08:55 -0800 (PST) Subject: New Champion! / Re: Complaints about spam are TRUE theft ofservices In-Reply-To: <199803202343.PAA09849@toad.com> Message-ID: <35135970.4A181F3D@acm.org> Spammer wrote: > A communique from TruthMonger, shortly before he transmorgatized into > his 'Spammer' persona, informed me that he felt Paul Merrill had > earned the title of Chief Spammer SpokesPerson/Champion, despite the > heartfelt compliment that Ross Wright gave TM in one of his missives. > Gee, I'm touched. PHM From spectre at dev.null Fri Mar 20 19:17:32 1998 From: spectre at dev.null (The Spectre) Date: Fri, 20 Mar 1998 19:17:32 -0800 (PST) Subject: Clarification / Re: UPSs (yeah, it's off topic) In-Reply-To: Message-ID: <35134BAB.272B@dev.null> The Spectre wrote: > I get bitched at by list members when I sign my messages.. :) If I have > something important to say, I'll sign it.. same goes if people start faking > them, so far no one has. What I meant to say was, "if people start faking them without using spectre at dev.null as a return address so that only really lame fucks will be fooled by them." -The Spectre (Or so I would have you believe...) [SP4 w/ Clam Cluster] -http://www.anthrax.net/cos "No man is clever enough to know all the evil he does." - La Rochefoucauld From spectre at anthrax.net Fri Mar 20 19:29:48 1998 From: spectre at anthrax.net (The Spectre) Date: Fri, 20 Mar 1998 19:29:48 -0800 (PST) Subject: Faked mail from canada? (was : Clarification / Re: UPSs (yeah, it's off topic)) In-Reply-To: Message-ID: At 21:10 3/20/98 -0800, The Spectre (Or so he would have us believe) wrote: >The Spectre wrote: >> I get bitched at by list members when I sign my messages.. :) If I have >> something important to say, I'll sign it.. same goes if people start faking >> them, so far no one has. > >What I meant to say was, "if people start faking them without using >spectre at dev.null as a return address so that only really lame fucks >will be fooled by them." > >-The Spectre (Or so I would have you believe...) [SP4 w/ Clam Cluster] >-http://www.anthrax.net/cos >"No man is clever enough to know all the evil he does." - La >Rochefoucauld Actually, I said what I meant to say. If someone fakes it to the list, then I'll see it now won't I, unless there is another attack or five happening at the same time to prevent me from getting my mail from the list, and from getting it anywhere else. If I saw it then I would post a signed message informing everyone that I *hadn't* posted it, and continue signing my mails until I felt it was safe to do otherwise. Don't feel you have to continue to illustrate your point though, even though investigation of the headers shows that the message actually originated from a mail server in canada.. I know you didn't do as much as you could have to make the message appear authentic. In any case, I don't see you signing your messages either. -The Spectre [SP4 w/ Clam Cluster] -http://www.anthrax.net/cos "No man is clever enough to know all the evil he does." - La Rochefoucauld From ms at dev.null Fri Mar 20 20:38:47 1998 From: ms at dev.null (Mirror Site) Date: Fri, 20 Mar 1998 20:38:47 -0800 (PST) Subject: [Fwd: Upon further reflection... [WAS: It's not a trick, but it *is* done with mirrors...]] Message-ID: <35135FD1.3569@dev.null> An embedded message was scrubbed... From: unknown sender Subject: no subject Date: no date Size: 2503 URL: From StanSquncr at aol.com Fri Mar 20 20:40:55 1998 From: StanSquncr at aol.com (StanSquncr) Date: Fri, 20 Mar 1998 20:40:55 -0800 (PST) Subject: UPSs Message-ID: <94b30653.35134453@aol.com> In a message dated 98-03-20 19:13:07 EST, shadow at tfs.net writes: << some protection is better than none. my roommate and I have our computers in the same room off of the same outlet but my computer has an UPS and his does not. During a storm, lightning hit near the apartment building and it took out his computer but not mine. But I do have a friend who lost his computer to a direct strike to the power lines and it took out the surge strip as well. At least in my case, it was not a direct strike into the power lines but what happened to my roommate made him get an UPS to at least have some protection next time. At least he will not have to possibly shell out another $1,500 for another computer. >> I cannot argue against 'some is better than none' (or, if you're adding onto your existing internal power supply, 'more is better than some'). BUT, of all things, when lightning strikes close to me, it takes out my modem, nothing else. (and it's happened more than once (and they say it doesn't ever strike in the same place twice! ;-) )) Stan From ian at deepwell.com Fri Mar 20 20:45:14 1998 From: ian at deepwell.com (Ian Briggs) Date: Fri, 20 Mar 1998 20:45:14 -0800 (PST) Subject: Fucking Sheeple / Re: Does Spamming Really Exist? In-Reply-To: <3512E780.5FBD@dev.null> Message-ID: <3.0.3.32.19980319203802.0095e384@deepwell.com> >I will petition the government to pass laws to prevent your ISP >from spamming me with posts such as this, which reflect nothing >more than the standard Sheeple position that anything which you >do not personally desire should be outlawed. > >"That which is not permitted, is forbidden." >~ Animal Farm Whine Whine Whine. You want some cheeze? Sweaping generality, yes those of us that want everything we don't agree with put under penalty of death. Instantly. No, wait. Lets change that, we put those that don't agree with us on work projects for the 4th Reich. Yeah, thats what I really meant but you have to look really hard into the message to find that undertone or you have to be a shitneck. Anyways. 1. Its theft of services because its using my bandwidth to "harrass" my customers. 2. It may destroy my mail server. 3. It may detrimentally effect the quality of my business. 4. It destroys other ISP mail server. So back to your normal ranting, as I doubt anyone doesn't have an entrenched opinion concerning this. Im not the happiest person to be inviting the U.S. Goverment into this media, im pretty opposed to the U.S. Goverment in general and specific terms. You want to know who we currently call for situations like this? FBI, executive order gave them all venue over crimes on the Internet via an executive order. So guess what, the U.S. goverments already here. I just don't want Joe Smoooze Dick the Marketing stud starting up his garage business selling e-mail lists for $99, cause he can. Ian by the way, putting @dev.null in your return address thats pretty tricky, I bet you have a business card that says 31337. I bet they teach that in all canadian schools. Elite 101. From nobody at REPLAY.COM Fri Mar 20 20:57:29 1998 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 20 Mar 1998 20:57:29 -0800 (PST) Subject: Faked mail from canada? (was : Clarification / Re: UPSs Message-ID: <199803210457.FAA27438@basement.replay.com> The Spectre wrote: > In any case, I don't see you signing your messages either. Yes I do... __________________________________ | | | Watch For CypherPunks | | | | Next Ten Posts | | | | | ---------------------------------- || || || || || || || From toto at sk.sympatico.ca Fri Mar 20 21:29:21 1998 From: toto at sk.sympatico.ca (Toto) Date: Fri, 20 Mar 1998 21:29:21 -0800 (PST) Subject: Fucking Sheeple / Re: Does Spamming Really Exist? In-Reply-To: <3512E780.5FBD@dev.null> Message-ID: <35136B20.F6@sk.sympatico.ca> Ian Briggs wrote: > Sweaping generality, yes those of us that want everything we don't agree > with put > under penalty of death. ..... > No, wait. Lets change that, we put those that don't agree with us on work > projects for the 4th Reich. Right on, Ian! I'm tired of these anonymous cowards, hiding behind a fake address such as dev.null, putting down those of us who recognize the need of petitioning our government to put an end to using the InterNet for purposes which are against the wishes of the majority. > 1. Its theft of services because its using my bandwidth to "harrass" my > customers. Exactly. I have been complaining to my ISP about their forwarding posts from the CypherPunks list that I disagree with. Despite my complaints, they allow this harrassment to continue. > 2. It may destroy my mail server. Right on! If the anonymous cowards can make points that seem to lack any sort of logic and sense, then they cannot whine when you do so, as well. > 3. It may detrimentally effect the quality of my business. Say, Ian...this is beginning to sound like 'whining'... > 4. It destroys other ISP mail server. Although grammatically incorrect and seemingly nonsensical, I am confident that you are trying to make a valid point. > So back to your normal ranting, as I doubt anyone doesn't have an > entrenched opinion concerning this. Exactly. There are no anti-spammers in foxholes. > Im not the happiest person to be inviting the U.S. Goverment into this > media, im pretty opposed to the U.S. Goverment in general and specific terms. As long as they only pass legislation infringing on the rights of those who are not in agreement with you and I, then our position could only be seen as hypocritical by those who disagree with us. > You want to know who we currently call for situations like this? > FBI, executive order gave them all venue over crimes on the Internet via an > executive order. > > So guess what, the U.S. goverments already here. And we can't fight City Hall, eh? > I just don't want Joe Smoooze Dick the Marketing stud starting up his > garage business selling e-mail lists for $99, cause he can. This is every bit as despicable as people who sign up as an ISP provider on the InterNet and then deny others the use of the shared resources of the Net, because they can. Some of these evil people interfere with the propogation of Holocaust propoganda, instead of interfering with anti-Holocaust propoganda, as is proper to those who oppose censorship. > by the way, putting @dev.null in your return address > thats pretty tricky, I bet you have a business card > that says 31337. I bet they teach that in all canadian > schools. Elite 101. Those fucking FrostBacks think that they can crawl across the 49th virtual parallel and insult the memory of Dave Null, Defender of the Void, with impunity. As soon as I look that word up, I'm going to give them a piece of my mind. (This is a generous offer, seeing as how I don't have much left). ~~~~ Toto ~~~~ From nobody at REPLAY.COM Fri Mar 20 22:19:40 1998 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 20 Mar 1998 22:19:40 -0800 (PST) Subject: Micro$not Ba$hing Message-ID: <199803210619.HAA08464@basement.replay.com> Eric Tune wrote: > Out of all the things I've heard said about Bill Gates, about > Microsoft, (both as the Evil Empire and as a God-send) this makes > about the most sense. Truthmonger has it right. At the risk of having list members speculating that this anonymous post is being sent by Toto/TruthMonger in order to gloat his dropping Pearls of Wisdom upon those with weak connections to the ClueServer, I would like to compliment Eric Tune on his recognition of my...Uhhhh, I mean *TruthMonger*'s sense of Reality. > The ONLY significant in-roads that anyone has made with a Unix > environment is Linux and BSD, and all the wishing in the world is not > going to make it more palatable to "John Q. Public". Unfortunately, > Unix is a lot harder to learn for someone who started out in DOS or > Mac software, and it's not near as user friendly. What could be the > incentive to NOT take Win95/NT/MacOS/OS2, which all have wide software > bases, as opposed to the closed world of Unix? John Q. Public doesn't > want all this trouble, he just wants his kids to be able to research > their history reports on the web, and for himself, to download a > little late night skin pics when the wife is late from bingo. He's in > control of how the computer game is played these days, even if he > doesn't understand it. I *love* UNIX/Linux, but I have no illusions that they comprise a viable option for John and Jane Q., unless they are provided at a reasonable price, with GUI's that are usable by people who desire to be able to use a computer without becoming a dweeb/guru/expert. > Microsoft shouldn't be blamed because they were smarter than the rest > of the industry, and when they couldn't be smarter, well, buying the > other company works too. Every one of you would do it the same way if > you were Bill Gates running the largest software empire in the world, > whether you would like to admit it or not. This is exactly what the Anti-Micro$not Coalition is attempting. Instead of making their software available to M.E. Tarzan and U. Jane at a competitive price, they are attempting to prevent someone who sought and got (Hey! I'm a poet...) their business from offering them even more affordable software extensions to their basic operating system. If providing the end-user with the tools to use their modem and the InterNet is an anit-trust violation, then shouldn't the same concept apply to OS vendors who provide tools for their customers to use their printers, etc? The much maligned 'Sheeple' desire only to have an OS that provides them with the tools to use the products that they purchase from computer vendors. The fact that Macintosh suffered in the marketplace from offering a complete package for more money, while the PC vendors offered a more affordable package which required additional purchases of software to accomplish the same ends, is not a reflection on the stupidity of J&J Q. Public. It is a reflection on the ignorance/unwillingness of Apple to properly advertise the discrepancies in entry-level costs versus end-result costs. Tire companies are taking advantage of the shennanigans of their competition by pointing out that their prices include such 'additional items' such as valve stems, balancing, air, etc. Apple and Sun were not constrained by Micro$not from doing the same thing. Many of the UNIX/SCO systems that I sold to my customers were the result of my explaining cost-benefit ratios which I had to analyze for myself, with no help from those actually producing/selling the product. As a former vendor who sold operating systems which were in comptetion with DOS/Windows, despite the fact that their manufacturers were not actively seeking my business, I feel no compunction in calling them to task for attempting to suppress their competition by calling upon the government to make them quit giving the public what they desire. Sincerely, ...uuuhh...I can't remember what persona I am posting under... From owner-cypherpunks Fri Mar 20 22:26:16 1998 From: owner-cypherpunks (owner-cypherpunks) Date: Fri, 20 Mar 1998 22:26:16 -0800 (PST) Subject: Cold Drinks Taste Better!!! Message-ID: <> Cold Drinks Taste Better! (You gotta see this) CLICK HERE NOW!! CoolBird keeps your favorite beverage COLD for HOURS. Make your last sip your coldest with CoolBird! **Perfect for --Birthdays --Father's Day --picnics --BBQ's --Bosses --Lunches --Trips --Work Great for anywhere and anytime!!!! CLICK HERE NOW!! From owner-cypherpunks Fri Mar 20 22:26:16 1998 From: owner-cypherpunks (owner-cypherpunks) Date: Fri, 20 Mar 1998 22:26:16 -0800 (PST) Subject: Cold Drinks Taste Better!!! Message-ID: <> Cold Drinks Taste Better! (You gotta see this) CLICK HERE NOW!! CoolBird keeps your favorite beverage COLD for HOURS. Make your last sip your coldest with CoolBird! **Perfect for --Birthdays --Father's Day --picnics --BBQ's --Bosses --Lunches --Trips --Work Great for anywhere and anytime!!!! CLICK HERE NOW!! From toto at sk.sympatico.ca Fri Mar 20 23:08:36 1998 From: toto at sk.sympatico.ca (Toto) Date: Fri, 20 Mar 1998 23:08:36 -0800 (PST) Subject: Important Information! Message-ID: <351381E3.3360@sk.sympatico.ca> If you have received several copies of all of my pastes to the CypherPukes list tonight, rest assured that it is a direct result of my being a drunken asshole. I have heard a rumor that the CypherPukes are taking up a collection to get me an account on AOL. Can there be any greater disgrace? To: cypherpunks at toad.com Subject: Re: Micro$not Ba$hing From: nobody at REPLAY.COM (Anonymous) Date: Sat, 21 Mar 1998 07:19:30 +0100 (MET) Organization: Replay Associates, L.L.P. Sender: owner-cypherpunks at toad.com Eric Tune wrote: > Out of all the things I've heard said about Bill Gates, about > Microsoft, (both as the Evil Empire and as a God-send) this makes > about the most sense. Truthmonger has it right. At the risk of having list members speculating that this anonymous post is being sent by Toto/TruthMonger in order to gloat his dropping Pearls of Wisdom upon those with weak connections to the ClueServer, I would like to compliment Eric Tune on his recognition of my...Uhhhh, I mean *TruthMonger*'s sense of Reality. > The ONLY significant in-roads that anyone has made with a Unix > environment is Linux and BSD, and all the wishing in the world is not > going to make it more palatable to "John Q. Public". Unfortunately, > Unix is a lot harder to learn for someone who started out in DOS or > Mac software, and it's not near as user friendly. What could be the > incentive to NOT take Win95/NT/MacOS/OS2, which all have wide software > bases, as opposed to the closed world of Unix? John Q. Public doesn't > want all this trouble, he just wants his kids to be able to research > their history reports on the web, and for himself, to download a > little late night skin pics when the wife is late from bingo. He's in > control of how the computer game is played these days, even if he > doesn't understand it. I *love* UNIX/Linux, but I have no illusions that they comprise a viable option for John and Jane Q., unless they are provided at a reasonable price, with GUI's that are usable by people who desire to be able to use a computer without becoming a dweeb/guru/expert. > Microsoft shouldn't be blamed because they were smarter than the rest > of the industry, and when they couldn't be smarter, well, buying the > other company works too. Every one of you would do it the same way if > you were Bill Gates running the largest software empire in the world, > whether you would like to admit it or not. This is exactly what the Anti-Micro$not Coalition is attempting. Instead of making their software available to M.E. Tarzan and U. Jane at a competitive price, they are attempting to prevent someone who sought and got (Hey! I'm a poet...) their business from offering them even more affordable software extensions to their basic operating system. If providing the end-user with the tools to use their modem and the InterNet is an anit-trust violation, then shouldn't the same concept apply to OS vendors who provide tools for their customers to use their printers, etc? The much maligned 'Sheeple' desire only to have an OS that provides them with the tools to use the products that they purchase from computer vendors. The fact that Macintosh suffered in the marketplace from offering a complete package for more money, while the PC vendors offered a more affordable package which required additional purchases of software to accomplish the same ends, is not a reflection on the stupidity of J&J Q. Public. It is a reflection on the ignorance/unwillingness of Apple to properly advertise the discrepancies in entry-level costs versus end-result costs. Tire companies are taking advantage of the shennanigans of their competition by pointing out that their prices include such 'additional items' such as valve stems, balancing, air, etc. Apple and Sun were not constrained by Micro$not from doing the same thing. Many of the UNIX/SCO systems that I sold to my customers were the result of my explaining cost-benefit ratios which I had to analyze for myself, with no help from those actually producing/selling the product. As a former vendor who sold operating systems which were in comptetion with DOS/Windows, despite the fact that their manufacturers were not actively seeking my business, I feel no compunction in calling them to task for attempting to suppress their competition by calling upon the government to make them quit giving the public what they desire. Sincerely, ...uuuhh...I can't remember what persona I am posting under... From anon at anon.efga.org Fri Mar 20 23:35:49 1998 From: anon at anon.efga.org (Anonymous) Date: Fri, 20 Mar 1998 23:35:49 -0800 (PST) Subject: No Subject Message-ID: <858794b0d66cf1f95b7a9df28fd3b0aa@anon.efga.org> > > > It is only now, in supporting your viewpoint out of sheer > > > contrariness, as opposed to being in agreement, that I have > > > finally figured out that your stance is a true CypherPunk > > > position. I have long held that most of those passing through the hallowed halls of the cypherpunks list are not cypherpunks, but entities who are striving to become cypherpunks--once they succeed, most of them move on to other pursuits and activities. Thank God that there are those who maintain their presence on the list over long enough periods of time to help newbies and neophytes to develop a cypherpunk frame of mind. > > > The InterNet is truly a macrocosm of the many societal > > > microcosms already in existence. It is up to each and every > > > one of us to fit into our environment, strive to change it, > > > or abandon it for a different environment. > > > > Yikes! Profound shit, Toto. How come you didn't post this to the > > list? Are you pulling my cyber-leg? Ross Wright, spam-promoter extraordinare, has become so gun-shy that he can no longer recognize the difference between sarcasm and a post by someone who recognizes that all alleged 'spammers' cannot be lumped into the same stereotypical melting pot. There are those who send 60 million emails out to Dog-and-everybody, without regard to suitability to their sensibilities, and there are those who strive to target their emails toward those who may actually have an interest in their offerings. Life itself is a double-edged sword. To compete with the shotgun spammers, those who wish to target an audience which is likely to have a specific interest in their product or cause have need of a database which will help them to categorize the interests of those who traverse the WWW. In doing so, they run the risk of being lumped in with those who use the same technology to monitor the same users in order to work against their self-interest. > > > "Who will help me be a self-actualized individual?" said the > > > New-Age California Little Red Hen. Nobody. For an extended explaination, read Horatio Alger. PrecedentMonger II From abrams at philos.umass.edu Fri Mar 20 23:48:41 1998 From: abrams at philos.umass.edu (Integration) Date: Fri, 20 Mar 1998 23:48:41 -0800 (PST) Subject: Fucking Sheeple / Re: Does Spamming Really Exist? Um, yes. Message-ID: <199803210748.CAA07357@wilde.oit.umass.edu> > > projects for the 4th Reich. > Right on, Ian! > I'm tired of these anonymous cowards, hiding behind a fake address > such as dev.null, putting down those of us who recognize the need > of petitioning our government to put an end to using the InterNet > for purposes which are against the wishes of the majority. > > 1. Its theft of services because its using my bandwidth to "harrass" my > > customers. > Exactly. I have been complaining to my ISP about their forwarding posts > from the CypherPunks list that I disagree with. Despite my complaints, > they allow this harrassment to continue. December 8, 1997: Today at work, I got an email from a company selling genital enlargers. I was shocked: how did they get my email address? I sat there at work, reading this email. Then, as if waking from a dream, I looked at my watch. I had wasted 5 whole minutes of my work time! I quickly deleted the email, and went on my merry way. December 10, 1997: It happened again. This time they wanted me to buy Disco albums from the 70's. I was irate! Susan overheard me mumbling to myself, and told me that just recently, she had received an email from an unknown source that had the word 'masturbate' in it. I asked her if it was a harrasing email, and she quickly explained that it was an email regarding a certain medical condition, for which the emailer had a medical cure. But still, she said. She did look pretty flustered. I shook my head and looked at my watch. Damn! January 23, 1998: I just learned how to install email filters. I can now block email marked 'bulk mail' or with certain generic 'to' fields. But it took me a goddamn day to install the damn filter. I was talking to Joe, and he said that last week, he had to do the very same thing! It seemed our whole company was up in arms! January 30, 1998: Joe, Susan, some others and I met with your system administrator today and asked him to install the filter automatically for everyone in the office. He seemed hesitant, and even balked at doing it until we convinced The Boss to knuckle him under until he did it. We were all very relieved. February 15, 1998: Stan, our system administrator, has been having a lot of trouble meeting all of the various filtering needs of the office, and so he said he is going to meet with our area service provider and see if they can do something in their system that would filter out more of the junk getting in to our office. Today, someone said they had received email from some list of crypto punks or something like that. I asked him, "What the hell is this world coming to? Why can't we just be free of these goddamn punks and freaks cluttering our email with trash!" He nodded righteously, and explained that he'd just subscribed to that crypto punk list last week, and he couldn't believe that he had to read such shit. April 1, 1998: I was reading the newspaper today, and an article caught my eye. It said that a nationwide consortium of ISPs had gotten together and banned all email that met a certain basic description. 'Junk Mail' they called it, and it ranged from 'unwanted' list mail to anything 'indecent' or 'obscene' or obvious 'spamming' type email. Apparently, sophisticated lexical gates were being put in place on a huge number of servers nationwide to help stop the spam. I was so happy I almost cried. April 2, 1998: The United States Government passed an emergency Communication Freedom Act, citing as a primary reason the acts of the consortium of ISPs. The Government cited business interests as a primary reason for instituting a change in the policies of the ISPs. The article in today's Times said that the newly formed Bureau of Internet Communications Privileges would meet with the consortium of ISPs, as well as other ISPs that had not agreed to the terms of the consortium, to work out a mandatory, fair and equitable agreement for validation of internet materials. The Government was adamant that business related emails should, in some form or fashion, be allowed, even as 'spam', given proper certification. I realized that I didn't mind that email trying to sell me a genital enlarger that much after all. June 4, 1998: Today at work, Stan, the system admin, held a meeting for managers. He wanted to explain to us the new Government Certification System (TM). The Government instituted a policy and technical implementation of it that would have the following features: (1) all personal email would be automatically parsed for indecent content in accordance with FCC rules, with the exception of 'adult channel' email, which required a special fee-based service, also certified by the Government, to be attached to one's account. (2) all business email would be queued in a Certification Queue, and would be inspected for content if it was registered as 'bulk mail'. Only companies who registered and paid a nominal fee to the Government would be allowed to use 'bulk mailing'. (3) all encryption would have to be done with a key-escrowed encryption service. That would insure that the Government could validate Certification on every email. Incomprehensible email or otherwise suspicious email would be subject to instant deletion. At work, things were going smoothly: Susan and Joe had no complaints. I was so relieved that finally the Government had stepped in and fixed the Internet. December 21, 1998: Today in the Globe, there were two very interesting articles about the new Government Certification System. The first article claimed that the system was now completely in place, and had even begun having noticeable effects: email and web traffic were down by .25% over the last 21 days! Workplace reports on annoying and harrassing email or web content were down dramatically! Businesses had jumped to sign up for certification, and according to the report, the Government claimed that the revenues generated were 'at least enough to fund the project and associated costs'. What a relief for the economy! The second article was more scandalous: apparently, 3 women had independently reported that President Clinton had 'cybered' with them on IRC chat channels. One woman claims that he even made 'lewd and unbecoming' remarks. The Bureau will be required by a Federal Court to turn over the transcripts and any necessary cryptographic keys next Monday for all sessions over the last 4 weeks. This will help confirm or deny the allegations being pressed against the president. January 1, 1999: As I was walking down the Parade Route this morning, the headline on the Times caught my eye: "Group of Cryptographers Arrested". I walked over to the machine and put in some change. The article reported that a group of Cryptographers from the University of Berkeley and MIT were arrested on charges of including an unpatented and uncertified encryption scheme in freeware products distributed by the GNU/FSF. The four professors claimed that they had repeatedly filed for patents but had been denied. They also explained that the software in which the alleged 'cryptography' was bundled in was only for use in securing personal home systems from unauthorized personal use. The Government issued a statement to the effect that cryptography is cryptography. I did not really understand the details of the article, about the cryptography and the legal arguments and stuff, but I sure was mad at those four professors! January 8, 1999: What a scandal! The mayor of Los Angeles was arrested today for 'the use and distribution of unauthorized pornography'. The mayor claims that he only sent the pictures to his friend in Sacramento. But the law is the law. The fine is supposed to be $250,000! I was very disappointed in they mayor. Imagine: SWIMSUIT photos! January 11, 1999: I just received my first subscription to Government Unix Magazine today. The feature article was about Linux. Apparently, Linux applied for Government Certification for Use of the Internet for Commerical and Distribution Purposes, and was turned down. Government officials said that, "Linux is not a government approved project. The people who wrote linux were a bunch of hackers. The code is distributed for free. That means anyone can go out there and put viruses and encryption right in the software! How could we certify such a project?" In other news, Microsoft, after receiving certification from the Government, got permission to sponsor its own Automatic Updates Channel. Anyone connected to the internet will be automatically updated with upgrades and patches of MS Windows software. Non-windows users will be alerted repeatedly and incessantly by email that they don't have Windows until they finally break down and buy it. January 28, 1999: Today, two teens were arrested and detained indefinitely by undercover agents who claimed that they had intercepted an encrypted transmission issuing from one of the teens' computers that was encrypted with an unknown protocol. The transmission was headed for Russia, and authorities suspected that the teen was sending sensitive information illegally. When I read the report, my heart filled with pride! Home of the Brave, Land of the Free, the *U* *S* of *A*! From paulmerrill at acm.org Fri Mar 20 23:54:28 1998 From: paulmerrill at acm.org (Paul H. Merrill) Date: Fri, 20 Mar 1998 23:54:28 -0800 (PST) Subject: UPSs In-Reply-To: <94b30653.35134453@aol.com> Message-ID: <35139C5E.324BE47A@acm.org> StanSquncr wrote: > > In a message dated 98-03-20 19:13:07 EST, shadow at tfs.net writes: > > << some protection is better than none. my roommate and I have our > computers in the same room off of the same outlet but my computer has an > UPS and his does not. During a storm, lightning hit near the apartment > building and it took out his computer but not mine. But I do have a > friend who lost his computer to a direct strike to the power lines and > it took out the surge strip as well. At least in my case, it was not a > direct strike into the power lines but what happened to my roommate made > him get an UPS to at least have some protection next time. At least he > will not have to possibly shell out another $1,500 for another computer. >> > > I cannot argue against 'some is better than none' (or, if you're adding onto > your existing internal power supply, 'more is better than some'). > > BUT, of all things, when lightning strikes close to me, it takes out my modem, > nothing else. (and it's happened more than once (and they say it doesn't ever > strike in the same place twice! ;-) )) > > Stan They do sell protectors for phone lines, too. They are typically marketed as notebook protectors, but I don't think your RJ-11 will mind too much. PHM (APC has them I know) From bill.stewart at pobox.com Sat Mar 21 00:05:45 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 21 Mar 1998 00:05:45 -0800 (PST) Subject: Complaints about spam are TRUE theft of services In-Reply-To: <199803202326.PAA09734@toad.com> Message-ID: <3.0.5.32.19980320234658.0090d5f0@popd.ix.netcom.com> At 03:27 PM 3/20/98 -0700, Ross Wright wrote: >No, actually your complaints about spam are TRUE theft of services. If you're a spammer, you're in no position to complain. >[Anecdotes about somebody receiving more complaints about spam than actual spam.] Complaints about spam are free speech, and by encouraging Internet providers to increase the size of their networks, they're obviously commerce :-) Anecdotes are just anecdotes; except during the occasional flame war about spam, I generally receive a lot more spam than complaints. And at least the complaints have some creative thought behind them, unlike the spam... Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From abrams at philos.umass.edu Sat Mar 21 00:47:19 1998 From: abrams at philos.umass.edu (Integration) Date: Sat, 21 Mar 1998 00:47:19 -0800 (PST) Subject: Fucking Sheeple / Re: Does Spamming Really Exist? Um, yes. In-Reply-To: <"Toto"@Mar> Message-ID: <199803210847.DAA26952@wilde.oit.umass.edu> > You are more creative and astute than I am in even my most egotistical > and self-congratulatory states of being. > Please cease and deceasist! > > ROTFLMAOMonger > > Integration wrote: > > December 8, 1997: Today at work, I got an email from a company selling You are too kind! I'm just giving what is wanted... some candy and some medicine. BTW, no need for a cease and desist. I'm sure such an outpouring is fortunately infrequent. * From spectre at anthrax.net Sat Mar 21 06:13:09 1998 From: spectre at anthrax.net (The Spectre) Date: Sat, 21 Mar 1998 06:13:09 -0800 (PST) Subject: Faked mail from canada? (was : Clarification / Re: UPSs (yeah, it's off topic)) In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 >Yes I do... > | | > | Watch For CypherPunks | > | | > | Next Ten Posts | I'm on coderpunks, not cypherpunks... my message must have been cc'd or something, I wasn't paying attention. - -The Spectre [SP4 w/ Clam Cluster] - -http://www.anthrax.net/cos "No man is clever enough to know all the evil he does." - La Rochefoucauld -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.5.2 iQA/AwUBNRPY5qYe2JEM7RcqEQIZZgCdHxf8Tn5AWVRbwhuEDJDx4iMVHCUAn3dC kMLC2///N6kZtogQYCWummyJ =OKCU -----END PGP SIGNATURE----- From brianbr at together.net Sat Mar 21 08:42:08 1998 From: brianbr at together.net (Brian B. Riley) Date: Sat, 21 Mar 1998 08:42:08 -0800 (PST) Subject: Message-ID: <199803211642.LAA14885@mx01.together.net> -----BEGIN PGP SIGNED MESSAGE----- On 3/21/98 2:42 AM, Anonymous (anon at anon.efga.org) passed this wisdom: >Life itself is a double-edged sword. To compete with the shotgun >spammers, those who wish to target an audience which is likely to >have a specific interest in their product or cause have need of a >database which will help them to categorize the interests of those >who traverse the In doing so, they run the risk of being >lumped in with those who use the same technology to monitor the >same users in order to work against their self-interest. Exactly, to lump all mass emailers into one homogenous category is all wrong. I subscribe to a list people running Mac Performa series PowerPCs (almost all PPC 603/e)/v). We recently had someone who had apparently subscribed to the list and lurked and built up a mailing list of posters to the list to whom he later sent a solicitation ... it was quite appropriate and as targetted as you can get, active participants in a highly specific group ... you shopuld have heard the weeping an gnashing of teeth ... the bandwidth comsumed by compliants was a thousand fold greater than the solicitation itself! SPAM is the boogeyman of the hour. Yes there are bad spammers out there and a modest knowledge of your mail client will handle 95% of them straight to File 13, but I really do want to receive many of the solicitations I get, I actually do buy things ... Just my .02 -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQEVAwUBNRPt0T7r4fUXwraZAQGLzwf+MHxH65MoIWtch+sOqgOkEkJX6CKQWHGK QaF411/xf3Yma2zQpV0Vu9UqcHaqBXf+HFxgEmh8hDfneTQHOa81IX9zZPBQ2EXv qeo+ANIDzJzUNSQ+V1SKkgWzDF74VVPXTfBElYYvoox+9LMwHyzTcSiUh4JaN9EN 5cpkyvq+rgzv0QuIHKileSDZRW3BfXK8jA/yUCZ/WkV3eWG4RNavR+Cv7PCsGq4j f9YCrd6cU+4cs4g2gpA8Oc9HK5sKquNrChQY1lZc3hWeFCyKO1uc/8eIAX3MxVAV cRtvJ/SLMqcd+FNIiEstCNCs7SsGB37jbO9RdmY4ZNLxZgtk/BVojQ== =87S8 -----END PGP SIGNATURE----- Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "The woods would be very silent if no birds sang there except those that sing the best." -- Henry David Thoreau From nobody at REPLAY.COM Sat Mar 21 17:05:28 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 21 Mar 1998 17:05:28 -0800 (PST) Subject: And they all work for the government... Message-ID: <199803220105.CAA03456@basement.replay.com> * The London Daily Telegraph reported in January on the thriving addiction clinics of Dr. Robert Lefever, who specializes in helping people who are obsessed with helping other people. Among the 500 patients a year he sees in London and Kent are a number of women who compulsively marry alcoholics so they can cure them. Another recent patient was hospitalized for exhaustion after caretaking an overweight woman, including obsessively rolling her in her wheelchair to many places she did not want to go. ~~~~~~~~~~~~~~~~~ NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated newspaper column distributed by Universal Press Syndicate. To receive the columns by e-mail, free of charge, send a message to notw-request at nine.org with the Subject line of Subscribe. To read these News of the Weird newspaper columns from the past six months, go to http://www.nine.org/notw/notw.html (That site contains no graphics, no photos, no video clips, no audio. Just text. Deal with it.) From nobody at REPLAY.COM Sat Mar 21 17:07:04 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 21 Mar 1998 17:07:04 -0800 (PST) Subject: CypherPunk Flame Wars... Message-ID: <199803220106.CAA03752@basement.replay.com> :: Anon-To: cypherpunks at toad.com :: Anon-To: cypherpunks at toad.com * In a September issue of New Scientist magazine, researchers in Germany wrote that a type of hermaphroditic flatworm mates through what they call "penis fencing." In the presence of another, a worm lashes out with its penis to attempt to inject sperm, but the potential mate might have similar ideas itself, and in bouts that last up to an hour, each attempts to inseminate the other. Often both worms are left severely punctured. ~~~~~~~~~~~~~~~~~ NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated newspaper column distributed by Universal Press Syndicate. To receive the columns by e-mail, free of charge, send a message to notw-request at nine.org with the Subject line of Subscribe. To read these News of the Weird newspaper columns from the past six months, go to http://www.nine.org/notw/notw.html (That site contains no graphics, no photos, no video clips, no audio. Just text. Deal with it.) From nobody at REPLAY.COM Sat Mar 21 17:07:44 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 21 Mar 1998 17:07:44 -0800 (PST) Subject: ClueServer Permanently Down... Message-ID: <199803220107.CAA03879@basement.replay.com> * Latest prices charged by parents to sell their kids (Covington, La., January, $7,400; Orlando, Fla., January, $1,000); latest game of automobile chicken that ended in a tie (Michigan Center, Mich., January, three hospitalized, one in critical condition); latest attempted robbery in which the unarmed perp simulates a gun with his thumb and forefinger but doesn't have his hand in his pocket at the time (La Ronge, Saskatchewan, December, not surprisingly, coming away with no money). ~~~~~~~~~~~~~~~~~ NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated newspaper column distributed by Universal Press Syndicate. To receive the columns by e-mail, free of charge, send a message to notw-request at nine.org with the Subject line of Subscribe. To read these News of the Weird newspaper columns from the past six months, go to http://www.nine.org/notw/notw.html (That site contains no graphics, no photos, no video clips, no audio. Just text. Deal with it.) From nobody at REPLAY.COM Sat Mar 21 17:09:03 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 21 Mar 1998 17:09:03 -0800 (PST) Subject: Dimitri's Tentacles... Message-ID: <199803220108.CAA04973@basement.replay.com> * In September, Mr. Anoki P. Sultan filed a lawsuit in Washington, D.C., against Roman Catholic Archbishop James Hickey, claiming that the Church was responsible for the devil's taking over his body in 1983. Sultan said that would account for his being out of work so much, dropping out of college, seeking mental-health treatment, smoking cigarettes, speaking in tongues, and engaging in homosexual acts. He sought either $100 million or an exorcism. (The lawsuit was dismissed.) ~~~~~~~~~~~~~~~~~ NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated newspaper column distributed by Universal Press Syndicate. To receive the columns by e-mail, free of charge, send a message to notw-request at nine.org with the Subject line of Subscribe. To read these News of the Weird newspaper columns from the past six months, go to http://www.nine.org/notw/notw.html (That site contains no graphics, no photos, no video clips, no audio. Just text. Deal with it.) From paulmerrill at acm.org Sat Mar 21 19:30:59 1998 From: paulmerrill at acm.org (Paul H. Merrill) Date: Sat, 21 Mar 1998 19:30:59 -0800 (PST) Subject: My Most Abject Apologies In-Reply-To: <981698d1.351441e6@aol.com> Message-ID: <3514B012.A3945B3D@acm.org> StanSquncr wrote: > > In a message dated 98-03-21 02:51:23 EST, you write: > > << OTOH I hear , liberally intermingled, >> WHat I mean is that 2/3 of the posts say they are screwing us out of our rights and 2/3 talk about proof and evidence. Yeah that means that some talk about both. > > Like what do you mean by "liberally intermingled"? > > << that the government blows off our > rights (and more importantly, what is Right) ... >> > > Starting with the Constitution/Bill of Rights (Article 6 part III and > Amendment 14, in particular). > > << ... and themes like proof and > evidence. >> > > It's the right-wing that's doing that (and, see above). > > > << First, the Powers That Be feel free to invent the "evidence" that they > need. >> > > I'm sure it's happened (like anytime the police want to arrest a black person, > for instance). > Or anyone else they decide to do it to. > > << Second, I would not believe someone's own hard drive to give an accurate > depiction of EMail activity. Deleting anything incriminating is easy > enough, so it not being there shows (much less Proves) nothing. And it > is relatively simple to alter stored EMail, so that does no more good. >> > > Right. So delete your incriminating evidence, and save anything you send to a > list (which they could get a copy of anyway.) > The thing is that *I* can get the list stuff myself if it ever gets anywhere. (Methinks that algebra is having problems these days) > << If them people want to screw me, let them do all of the work for > themselves. >> > > Now THAT I totally agree with you on. :-) > > Stan Besides I find very little of all this that deserves more than a thought or two and those that do are stored in my "Mark VI Between The Ears Onboard Computer". PHM From nobody at REPLAY.COM Sat Mar 21 20:33:38 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 21 Mar 1998 20:33:38 -0800 (PST) Subject: Prologue 9/0 -- SPACE ALIENS HIDE MY DRUGS Message-ID: <199803220433.FAA28959@basement.replay.com> Prologue 9/0 -- SPACE ALIENS HIDE MY DRUGS ------------------------------------------ Magic Circle: Writing from his room in the Grand Hotel Principe in Limone Piemonte, Jones thanked his old friend for the words of encouragement. The honor, said Sir Eric, "has been won by a lot of hard work by very many people within the circle and on the fringes of it, and it has also been partly won by friendly cooperation from people." Parker Paradox: Representing GCHQ at NSA during the mid-1960s was Reginald H. Parker, a dashing Englishman with an infectious sense of humor. Early Members of the Circle of Eunuchs: Official eavesdropping in Britain is steeped in tradition and shrouded in secrecy. Even Shakespeare made note of the practice when he wrote in Henry V, "The king hath note of all that they intend / By interception which they dream not of." Britain's Royal Mail Openers managed a charmed existence. Their single public scandal occurred in 1844, when Joseph Mazzini charged Secretary of State Sir James Graham with opening his letters and passing the contents on to the Neapolitan government. John Goldhammer of Commercial Cable Company and Clarence H. Mackay of Commercial Cable Postal Telegraph Company. "In July, 1919," explained Goldhammer, "when British censorship ceased, we were ordered by the British Government to turn over to them all messages passing between our own offices, 10 days after they were sent." The original and primary source for information on ECHELON is an article I wrote in New Statesman magazine ten years ago : NS, 12 August 1988 : "They've got it taped". To forge this alliance, the NSA, soon after it was formed, established the National Security Agency Scientific Advisory Board (NSASAB), a ten-member panel of science wizards plucked from ivy-covered campuses, corporate research labs, and sheepskin-lined think tanks. Among the early members of the board was Stewart S. Cairns, who had earned his doctorate at Harvard and was chairman of the mathematics department at the University of Illinois at Urbana (the same school where William Martin, not long before his defection, would be sent on a two-year scholarship). When Vice Admiral Laurence Frost arrived at the Puzzle Palace in the fall of 1960, he found relations between the board and NSA strained and bitter. I LUV FUD! (The Medium is the Enemy): In 1956 Dr. Howard T. Engstrom, a computer wizard and vice president of Remington Rand, took over NSA's research and development organization. The following year he was appointed deputy director of NSA and a year later returned to Remington Rand. Joseph H. Ream, executive vice president at CBS, was imported to replace Engstrom as deputy director. He, too, left after a year; he headed up CBS's Washington office and later CBS-TV's programming department. Ream's interlude at NSA is listed on his CBS biography simply as "retirement." Three months before Ream gave up codebreaking for "I Love Lucy," one of the most important meetings in the history of the Agency took place in a clapboard structure on Arlington Hall Station known as B Building. On July 18, 1957, a handful of the nation's top scientists crowded together in NSA's windowless Situation Room to present a blueprint for the Agency's future technological survival.* Nuclear PigLatin: They...recommended the initiation of a Manhattan Project-like effort to push the USA well ahead of the Soviet Union and all other nations in the application of communications, computer science, mathematics, and information theory to cryptology. Rear Entry: Now the decision had to be made about whether to continue funding, as with Lightning, generalized, public research or to begin to direct those funds toward secret, specialized, cryptologic research. It was a choice between an open bridge or a hidden tunnel between the Agency and the outside scientific community. Following the Baker report, the decision was to use the tunnel. Lost Alamo Chaos: The CRD's statistics are, however, a bit misleading. Shortly after the division's birth, several programs were launched to bring into the secret fraternity several dozen of the nation's most outstanding academic minds in mathematics and languages. The Evil One Writes Black Operatives A Blank Check: "NSA," the Agency declared with all due modesty, "certainly hastened the start of the computer age." Among the early products of that age was the use of computers in the banking industry for everything from the massive transfers of money between banks and other financial institutions, to the simple recording of a midnight transaction at a remote automatic teller. But there was another product: computer crime. With sufficient knowledge and the access to a terminal, one could trick the computer into transferring funds into a dummy account or tickle a cash-dispensing machine into disgorging its considerable holdings. Caveat Emptor [WAS: Of course I luvs you...I fucks you, don't I?]: IBM board chairman Thomas Watson, Jr., during the late 1960s set up a cryptology research group at IBM's research laboratory in Yorktown Heights, New York. Led by Horst Feistel, the research group concluded its work in 1971 with the development of a cipher code-named Lucifer, which it promptly sold to Lloyd's of London for use in a cash-dispensing system that IBM had developed. IBM developed Lucifer with a key 128 bits long. But before it submitted the cipher to the NBS, it mysteriously broke off more than half the key. Government Encryption...There's A Method In Their Madness: >From the very beginning, the NSA had taken an enormous interest in Project Lucifer. It had even indirectly lent a hand in the development of the S-box structures. Debbie Does Ca$h: The Agency, in turn, certified the algorithm as "free of any statistical or mathematical weaknesses" and recommended it as the best candidate for the nation's Data Encryption Standard (DES). DC Does Chelsea: The cozy relationship that the Agency had fostered with IBM would be impossible with the free-wheeling academics. Nevertheless, virtually all the researchers had an Achilles' heel: the National Science Foundation. D'Shauneaux Does DC: Vice Admiral Bobby Inman moved into the Puzzle Palace, replacing newly promoted General Lew Allen, Jr. Fear: Without any authorization, he wrote a threatening letter to the Institute of Electrical and Electronic Engineers (IEEE), the nation's largest professional engineering society (of which he was a member), warning that those planning to participate in an upcoming IEEE symposium on cryptology might violate the law. Uncertainty: What Meyer emphasized was that ITAR covered the export not only of actual hardware, but also of unclassified technical data associated with the restricted equipment. Disinformation: He claimed that holding symposia and publishing papers on cryptology were the same as exporting the information. Thus, he concluded, "unless clearances or export licenses are obtained" on some of the lectures and papers, "the IEEE could find itself in technical violation of the ITAR." "When time is of essence, he'll rise from the ash.": Nicolai had suddenly been assaulted with one of the oldest weapons in the nation's national security arsenal: the Invention Secrecy Act. Passed in 1917 as a wartime measure to prevent the publication of inventions that might "be detrimental to the public safety or defense or might assist the enemy or endanger the successful prosecution of the war," the measure ended with the conclusion of World War I. The act was resurrected in 1940 and was later extended until the end of the Second World War. Then, like the phoenix, it once again rose from the ashes with the passage of the Invention Secrecy Act of 1951, which mandated that secrecy orders be kept for periods of no more than one year unless renewed. There was a catch, however. The act also said that a secrecy order "in effect, or issued, during a national emergency declared by the President shall remain in effect for the duration of the national emergency and six months thereafter." Because no one ever bothered to declare an end to President Truman's 1951 emergency, the emergency remained in effect until September 1978. The Zimmermann Lineage: To add insult to injury, Nicolai was planning to market his Phasorphone at a price most buyers could easily afford, about $100, thus increasing the interest in the technology. Ted Turner Loves Lucy, Too: The director's tactic was to launch a counterattack on two fronts--one in the open and the other behind the scenes. On the open front, Inman decided to convert to his own use what he believed was his opponent's biggest weapon: the media. Now he himself would begin manipulating the press for the Agency's benefit. Born Classified/Oppressed/Repressed/Depressed: But Inman's most telling comment was his statement to Shapley that he would like to see the NSA receive the same authority over cryptology that the Department of Energy enjoys over research into atomic energy. Such authority would grant to NSA absolute "born classified" control over all research in any way related to cryptology. PGP ProphetSized: Warned Inman: Application of the genius of the American scholarly community to cryptographic and cryptanalytic problems, and widespread dissemination of resulting discoveries, carry the clear risk that some of NSA's cryptanalytic successes will be duplicated, with a consequent improvement of cryptography by foreign targets. No less significant is the risk that cryptographic principles embodied in communications security devices developed by NSA will be rendered ineffective by parallel nongovernmental cryptologic activity and publication. Voluntary 'Dog At Large'Fines: Recognizing the constitutional questions involved in such drastic actions, the study group decided on a middle ground: a system of voluntary censorship. Elvis Assassinated By The Men In Black: Faurer, addressing a meeting of the IEEE, left little doubt that to ignore the Center would be to risk saying good-by to lucrative government contracts. "Frankly," the NSA chief warned, "our intention is to significantly reward those DOD suppliers who produce the computer security products that we need." Monkeywrenching Dave Null: Lack of such cooperation, CIA Deputy Director Inman said at the Center's opening, "might lead to a highly undesirable situation where private-sector users (e.g., banks, insurance companies) have higher integrity systems than the government." Voluntary/Mandatory: As a result of what he called the "hemorrhaging of the country's technology," Inman warned a meeting of the American Association for the Advancement of Science that "the tides are moving, and moving fast, toward legislated solutions that in fact are likely to be much more restrictive, not less restrictive, than the "voluntary" censorship system of the Study Group. [ADVERTISEMENT] Nuclear Hoover Vacume Gets ALL The Dirt: On the other hand, drug dealers were not the only ones who unwittingly found their way into NSA's magnetic-tape library. Also captured were the hungry demands of wayward congressmen insisting on bribes from foreign governments. You Have A Right To Be Monitored: You Have A Right To Be Kept In The Dark: You Have A Right To No Counsel: The key to the legislation could have been dreamed up by Franz Kafka: the establishment of a supersecret federal court. Sealed away behind a cipher-locked door in a windowless room on the top floor of the Justice Department building, the Foreign Intelligence Surveillance Court is most certainly the strangest creation in the history of the federal Judiciary. Almost unheard of outside the inner sanctum of the intelligence establishment, the court is like no other. It sits in secret session, holds no adversary hearings, and issues almost no public opinions or reports. It is listed in neither the Government Organizational Manual nor the United States Court Directory and has even tried to keep its precise location a secret. "On its face," said one legal authority familiar with the court, "it is an affront to the traditional American concept of justice." You Have A Right To Bend Over: Under such circumstances, it is little wonder that the federal government has never lost a case before the court. Legalizing WaterGate: When the Reagan administration came into office, however, the Justice Department argued that the power for foreign intelligence black-bag jobs was vested not in the court, but in the inherent authority of the President. Presiding Judge Hart, in the court's only published opinion, agreed. Thus, in rejecting the administration's application for a new surreptitious entry, he was in fact going along with the argument of the Justice Department. As a result the rejected break-in and all subsequent surreptitious entries need no court authorization, only presidential approval. Rule of Obscurity [WAS: Rule of Law]: Even more disturbing than the apparent evolution of the surveillance court into an Executive Branch rubber stamp are the gaping holes and clever wording of the FISA statute, which nearly void it of usefulness. Such language, intentional as well as unintentional, permits the NSA to rummage at will through the nation's international telecommunications network and to target or watch-list any American who happens to step foot out of the country. The Information Surveillance Highway: "Electronic surveillance," the statute reads, means "the acquisition by an electronic, mechanical, or other surveillance device" of the approved targets. But nowhere does the statute define the meaning of the key word acquisition. Rather, it is left to NSA to define. The Inlsaw/Indio Reservation Gambling Gambit: Thus it is possible for GCHQ to monitor the necessary domestic or foreign circuits of interest and pass them on to NSA through the UKUSA Agreement. Once they were received, NSA could process the communications through its own computers and analysts, targeting and watch-listing Americans with impunity, since the action would not be covered under the FISA statute or any other law. Debbie Does Deputy Dog: No such exclusion, however, was ever included in the final FISA statute. Instead, the statute now calls for what one constitutional law expert has termed "compulsory spy service," requiring "communications common carriers, their officers, employees, and agents . . . to provide information, facilities, or technical assistance to persons authorized by law to intercept wire or oral communications or to conduct electronic surveillance" and also ordering them to protect the secrecy of the operations. CAMP Revisited / Crypto Uzis for Deputy Dog: Under the Reagan executive order, the NSA can now, apparently, be authorized to lend its full cryptanalytic support--analysts as well as computers--to "any department or agency" in the federal government and, "when lives are endangered," even to local police departments. David Waters Predicts SmartSSNCards: Tons of electronic surveillance equipment at this moment are interconnected within our domestic and international common carrier telecommunications systems. Much more is under contract for installation. Perhaps this equipment is humming away in a semi-quiescent state wherein at present "no citizen is targeted"; simply scanned. . . How soon will it be, however, before a punched card will quietly be dropped into the machine, a card having your telephone number, my telephone number, or the number of one of our friends to whom we will be speaking? And once we've rid ourselves of those pesky humans...: "HUMINT [Human Intelligence] is subject to all of the mental aberrations of the source as well as the interpreter of the source," Lieutenant General Marshall S. Carter once explained. "SIGINT isn't. SIGINT has technical aberrations which give it away almost immediately if it does not have bona fides, if it is not legitimate. A good analyst can tell very, very quickly whether this is an attempt at disinformation, at confusion, from SIGINT. You can't do that from HUMINT; you don't have the bona fides--what are his sources? He may be the source, but what are his sources?" Chuck Conners Appointed To Supreme Court--Cows Nervous: Can it be that the Constitution affords no protection against such invasions of individual security? * * Justice Brandeis answered his own question when he quoted from Boyd v. United States (116 u.s. 616): "It is not the breaking of his doors, and the rummaging of his drawers that constitutes the essence of the offense; but it is the invasion of his indefensible right of personal security, personal liberty, and private property. (277 U.S.438, at pages 474-475.) Army of (Black) Dog / Take A Bite Out Of Technotyranny: I don't want to see this country ever go across the bridge. I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there no return. From afabbro at umich.edu Sat Mar 21 21:08:44 1998 From: afabbro at umich.edu (andrew fabbro) Date: Sat, 21 Mar 1998 21:08:44 -0800 (PST) Subject: Crypto, anyone? Message-ID: I was just wondering if anyone would be interested in discussing cryptography, personal privacy, security protocols, digital signatures, anonymous remailers, digital cash, crypto anarchy...? No? OK, then we can go back to spam, Microsoft bashing, calling each other "idiots" and "chickens," and forwarding News of the Weird for no obvious reason. -- Andrew Fabbro [afabbro at umich.edu] [andrewf at jesuswept.com] http://www-personal.umich.edu/~afabbro/ 313.647.2713 "We make money the old fashion way. We print it." - DigiCrime From StanSquncr at aol.com Sat Mar 21 21:48:12 1998 From: StanSquncr at aol.com (StanSquncr) Date: Sat, 21 Mar 1998 21:48:12 -0800 (PST) Subject: My Most Abject Apologies Message-ID: <4a5fa05.3514a5d6@aol.com> In a message dated 98-03-21 22:31:05 EST, paulmerrill at acm.org writes: << > In a message dated 98-03-21 02:51:23 EST, you write: > > << OTOH I hear , liberally intermingled, >> WHat I mean is that 2/3 of the posts say they are screwing us out of our rights and 2/3 talk about proof and evidence. Yeah that means that some talk about both. >> Yea, but what I mean is, who are they accusing (the liberals, I'm guessing (sorry cypher's, got a big gig coming up Friday night and I haven't been able to read everything))? << > I'm sure it's happened (like anytime the police want to arrest a black person, > for instance). > Or anyone else they decide to do it to. >> Well, I'm normally a long-haired hippie, so I know what you're talking about. That's part of our history. But these days, at least here in Houston, they seem to be laying off of us a bit, as they really have an idea who's giving them the troubles (and it's the drunk cowboys in their pickup truck, they get in a whole lot of wrecks!) Oh, they still get us, though (through piss-testing (this ain't a 'Democracy' anymore, it's 'Corporate Rule'))! Stan From nobody at REPLAY.COM Sat Mar 21 22:40:12 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 21 Mar 1998 22:40:12 -0800 (PST) Subject: Crypto, anyone? Message-ID: <199803220640.HAA13967@basement.replay.com> andrew fabbro wrote: > > I was just wondering if anyone would be interested in discussing > cryptography, personal privacy, security protocols, digital signatures, > anonymous remailers, digital cash, crypto anarchy...? No? OK, then we > can go back to spam, Microsoft bashing, calling each other "idiots" and > "chickens," and forwarding News of the Weird for no obvious reason. What the fuck is crypto? Can you *say* that on a public mailing list? Isn't child cryptography illegal? Isn't sharing pubic keys a form of perversion? Is digital cash used to buy a blow-job? "How can you tell when Windows is about to crash?" "It boots." From toto at sk.sympatico.ca Sat Mar 21 23:17:19 1998 From: toto at sk.sympatico.ca (Toto) Date: Sat, 21 Mar 1998 23:17:19 -0800 (PST) Subject: Emptying the trash... Message-ID: <3514D686.5580@sk.sympatico.ca> [Sent to Netscape feedback defartment] The next trash I will be emptying will be my installation of Netscape. Netscape has been my only browser since gaining InterNet access, but I am not going to use a product from a company who requires me to jump through hoops to ensure privacy through strong encryption and then tells me to fuck off because they are incapable of verifying my net persona and/or location. If Netscape intends to make their software compliant with the wishes of those who want to illegally monitor my location and identity, then they should at least require those fascists to supply you with this information for you to use for my convenience in acquiring your product. I send weekly death threats to Bill Gates, but I'll bet my ass that Micro$not lets me download their browser so that he can go to his grave clutching my cash in his hand. ~~~~ Toto From an105 at hotmail.com Sun Mar 22 02:46:46 1998 From: an105 at hotmail.com (an105 at hotmail.com) Date: Sun, 22 Mar 1998 02:46:46 -0800 (PST) Subject: stand-by Message-ID: <011297055501222@mix1.Sacramento.mci.net> Hi, after adjusting claims for several insurance companies, I found one thing the same. No one seems to know much about what they are entitled to. So I decided to help the public towards even footing with insurance adjusters. I have been a crusader for policyholder's rights for a good many years since and received acclaim from state departments' of insurance and state Governors for my work, albeit obscure. Anyway, you may want to bookmark my "deserve" website just in case that rainy day happens to come your way. Socrates never sold insurance, but his words apply to this industry as well: "The only good is knowledge and the only evil is ignorance." Best wishes, Tony Braga deserve link: http://www.sure-net.com/deserve.html From jya at pipeline.com Sun Mar 22 06:56:38 1998 From: jya at pipeline.com (John Young) Date: Sun, 22 Mar 1998 06:56:38 -0800 (PST) Subject: Rivest's Chaffing and Winnowing Message-ID: <199803221456.JAA07529@camel8.mindspring.com> The New York Times, March 22, 1998, p. 31. New Method To Veil Data Could Upstage Export Policy Cryptologists find a way to foil eavesdroppers without secret codes. By John Markoff San Francisco, March 21 -- One of the nation's leading computer scientists has proposed a novel technique for scrambling data that could circumvent Government export policies aimed at limiting the foreign sale of encryption technology. The technique, which was described this week in an Internet discussion among computer researchers, was introduced by Ronald L. Rivest, a computer scientist at the Massachusetts Institute of Technology and one of the inventors of the most widely used commercial encryption scheme, RSA. The new approach, which is described in a short technical paper that has been posted to Mr. Rivest's M.I.T. Web site (http://theory.lcs.mit.edu/~rivest/chaffing.txt), is described as "chaffing and winnowing" digital information instead of encrypting it. According to Mr. Rivest's paper, it is possible to hide a message by breaking it into packets that are then secretly identified as good information, or "wheat," and gibberish, or "chaff," in such a way that an eavesdropper cannot distinguish the two. Because the individual packets would not be encrypted, Mr. Rivest said, such a system would circumvent current export restrictions. The two principal ways of communicating in secret are encryption and steganography. Steganography uses computer techniques to embed a secret message in a document like a digital image. In encryption, secret information is encoded using functions that require difficult mathematical tasks to decode, and it has become the standard way of transmitting secret information electronically. There are no restrictions on the domestic use of this technology, but the Government has been trying to force the industry to adopt standards that would permit law-enforcement officials to have mathematical keys allowing them to decode messages without the knowledge of the sender or receiver. The Clinton Administration says the standards are needed to fight crime and terrorism. Opponents argue that the Government decoding keys, to be stored in computers, could easily be stolen, compromising privacy and the security of credit card numbers and other personal information. In terms of exports, with few exceptions the Government limits the software to codes that can be easily broken. "Winnowing does not employ encryption, and so does not have a 'decryption key,' " Mr. Rivest wrote in his paper. "As usual, the policy debate about regulating technology ends up being obsoleted by technological innovations." Peter Neumann, an SRI International computer scientist who has read Mr. Rivest's paper, said that although "there is still no certainty that this is a practical idea," if it works, "it throws another clinker at the Justice Department." Other cryptography experts said they were uncertain whether it would be possible to skirt Government export restrictions in this way, but that the idea was an impressive new approach that might have valuable commercial applications. "He's a very clever guy," said George Spix, a Microsoft researcher who specializes in cryptography policy issues. " It goes to show that for all the technological wizardry in the world, there's nothing like an intellect." One of the potential limitations of the new method is that the total information transmitted might need to be hundreds of times larger than the actual message. Mr. Rivest said, however, that he had discussed the idea with Adi Shamir, an Israeli cryptographer, and that Mr. Shamir had proposed compression methods that would reduce the total transmission to only about twice the actual message size. The strength of the idea for chaffing and winnowing is that it is possible to prove mathematically that a message cannot be decoded, Mr. Rivest said. He said he had come up with the idea recently while teaching an undergraduate computer course. In addition to his role as associate director of the Laboratory of Computer Science at M.I.T., Mr. Rivest is a consultant and shareholder in RSA Data Security Inc., a company that develops encryption software. "I put the winnowing and chaffing idea out there to stimulate debate,"' Mr. Rivest said. "I hope it will help clear up some of the issues that have been raised in the policy discussion. [End] From jya at pipeline.com Sun Mar 22 08:26:21 1998 From: jya at pipeline.com (John Young) Date: Sun, 22 Mar 1998 08:26:21 -0800 (PST) Subject: Prediction: NAI will issue a "Clarification" about PGP from Europe In-Reply-To: <3.0.5.32.19980321224959.008e34b0@cnw.com> Message-ID: <199803221626.LAA10101@camel8.mindspring.com> Robert Hettinga wrote: >John has the drugs. Talk to him. Then you'll ***Understand***... You talking to me? Look at me! Let's settle this now. Get it straight from the purple nose: Not drugs, nuts, A-grade shit, highest quality, cheap E$, dosing me and the other Messiahs vampiring Big DaddyMommy -- that spaced-out hermaphroditic duo's infinitely beyond psycho-pharmacological cryptanalysis. Try it, you'll like it. Endorsed by Thor and Brunhilde, Zeus and Juno, Samson and Delilah, Amazons and Moses, Cleopatra and Nero, Jesus and FHC, Atilla and Joan d'Arc, Machiavelli and Teresa de Avilla, Nietzsche and Cosima, Hitler and Eva, Ghandi and Queen Mary, Elvis and Janis, Paglia and Dice Clay, Teller and Penn, Pogo and Dilbert, NSA and BXA, and others here faking normalcy: Watch for very clear articulation, point by point argument, neat numbered paragraphs, implacable coherency, occcasional bullet spray for emphasis, peculiar indents and concussion grenades, unpredictable ellipses of EM wipeout, wide-area split infinitives, carpet bombs of dangling modifiers, genocidal threats at contra-blancos, vile accusations of self-flagellations, all with not a hair or beard out of place, a sure sign of uh oh, don't jiggle this nitroid. That's just those who post. The others back there, well. From sergey at pelican.el.net Sun Mar 22 09:18:29 1998 From: sergey at pelican.el.net (Sergey Goldgaber) Date: Sun, 22 Mar 1998 09:18:29 -0800 (PST) Subject: Rivest's Chaffing and Winnowing In-Reply-To: <199803221456.JAA07529@camel8.mindspring.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Sun, 22 Mar 1998, John Young wrote: > The New York Times, March 22, 1998, p. 31. > > New Method To Veil Data Could Upstage Export Policy > > Cryptologists find a way to foil eavesdroppers without > secret codes. As if steganography was new. > The new approach, which is described in a short technical > paper that has been posted to Mr. Rivest's M.I.T. Web site > (http://theory.lcs.mit.edu/~rivest/chaffing.txt), is > described as "chaffing and winnowing" digital information > instead of encrypting it. Using steganoraphic techniques on low-level elements of network communication (packets) was considered many years ago in this very forum. A particular suggestion seemed much more effective than Rivest's proposal. It aim was to hide information among seemingly innocuous communication. Whereas, it is obvious to any observer of a "chaffing" exchange that an abnormal exchange was taking place. Of course, if all communication was "chaffed" then that same exchange would seem perfectly ordinary. However, the chaffing technique (creating "bogus" packets, transmitting them along with the real information, and seperating the two) creates a lot of overhead... which may not use much bandwidth if used occasionally, but would create a serious problem if everyone did it all the time. > According to Mr. Rivest's paper, it is possible to hide a > message by breaking it into packets that are then secretly > identified as good information, or "wheat," and gibberish, > or "chaff," in such a way that an eavesdropper cannot > distinguish the two. The earlier suggestion was to hide information in unused, least significant, portions of the packet _header_, leaving the data portion intact. Thus, the overhead of creating "bogus" packets is eliminated, the bandwidth used in sending them is conserved, and the processing power used in seperating the "wheat" from the "chaff" is freed. Further, by all accounts, the data transmitted would seem perfectly ordinary to an eavesdropper. It could be a poem or a picture. However, it would be completely irrelevant, as the real message is hidden in the header. Finally, there are the more traditional steganographic techniques such as using the least significant bits of gifs, jpegs, and wavs. And, most intriguing of all, mimic functions. ............................................................................ . Sergey Goldgaber Senior System Engineer . ............................................................................ . To him who does not know the world is on fire, I have nothing to say . . - Bertholt Brecht . ............................................................................ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBNRVG+Mgbnd/MibbZAQEaRwP9Fy825U05t9xyHa0vN5wFFCNBR0NHrik0 cFBG357a1+MRA90uxvUztB736uf71a39HP0172sjyAg3TXVG9MEpCxFDDa6OZAWQ 9Xgq9TSaUTJUXJVsockFTHF6F9zDLIAvw2s365J4dr3++Uj/JreaaX7pcLVmCujO DkuInR89aG8= =B9nV -----END PGP SIGNATURE----- From rah at shipwright.com Sun Mar 22 12:28:15 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 22 Mar 1998 12:28:15 -0800 (PST) Subject: Prediction: NAI will issue a "Clarification" about PGP from Europe In-Reply-To: Message-ID: At 11:27 AM -0500 on 3/22/98, John Young wrote: > You >well. Keewwwl... So. John. Don't the trees look like stuffed animals this morning? Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From Shane.Pearson at tafensw.edu.au Sun Mar 22 15:32:31 1998 From: Shane.Pearson at tafensw.edu.au (Pearson Shane) Date: Sun, 22 Mar 1998 15:32:31 -0800 (PST) Subject: UPSs Message-ID: Hi Stan, Yeah. Since the big powersupply transformer primary winding is in _parallel_ with the AC power coming from the wall, this inductor will transfer the spikes, etc to the secondary winding and into the bridge rectifier, etc quite nicely. But decent ripple prevention should also help out here. Though this hasn't much to do with PC switchmode powersupplies. An inductor/capacitor spike filter that may be in UPS' would have 2 large inductors in _series_ with the active and neutral and high voltage capacitors in parallel with both ends of the inductors across the active and neutral. This is specifically designed as a low pass filter for getting rid of spikes. I don't think the SW supply would do it quite as well with as much power handling, strength etc. I'd rather a great big low pass filter designed for spike dampening doing the deed than having my PC power supply bearing the brunt of it. It's also an extra layer that is quite cheap. Bye for now. > -----Original Message----- > From: StanSquncr [SMTP:StanSquncr at aol.com] > Sent: Saturday, March 21, 1998 8:51 AM > To: Pearson Shane; spectre at anthrax.net; cypherpunks at toad.com > Subject: Re: UPSs > > In a message dated 98-03-19 18:48:51 EST, Shane.Pearson at tafensw.edu.au > writes: > > << A simple low pass filter made of 2 large inductors and a > few high voltage capacitors will do the trick nicely. >> > > Right. The filtering that's already in the power-supply (except that > the > switching transformer isn't as big as an inductor as a normal > old-style power > transformer. > > Stan From kevlar at smartlink.net Sun Mar 22 16:01:09 1998 From: kevlar at smartlink.net (Kevlar) Date: Sun, 22 Mar 1998 16:01:09 -0800 (PST) Subject: Rivest's Chaffing and Winnowing Message-ID: <3.0.5.32.19980322155953.0079b990@mail.smartlink.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Now I read about this before it was mentioned on this list, and wanted to comment briefly upon it. Although at first glance this appears to be a hopelessly ineffective way of communicating (it requires double the information, plus MAC's), It does have some interesting possibilities. For instance... Rivest mentioned in his technical paper that you might use this in a situtation where you are multiplexing two or more streams of information, in which one persons "wheat" is another persons "chaff"... This would elminate the need to generate random "chaff", and therefore bring the ammount of wasted space WAY down... I could see this in use in situtations like LAN's or intranets, where bandwidth is not nearly as much of a concern because there is usally an overabundance anyway. Something else that occured to me while reading this tho... a major flaw if implemented "out of the book".... He mentions generating random MAC's... and this would be allright because the chance of randomly generating a genuine MAC is 2**64, or 10**19, but that is unacceptable, as the law of advrages WILL catch up to you eventualy. Therefore his second party adding chaff idea is failable. Of corse, this is easliy remedied at run-time by checking to see if the MAC that was just randomly generated is genuine, and therefore unacceptable. I hope to stimulate discussion on this subject, and welcome your opinions about mine... Peace. -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.5.5 for non-commercial use iQA/AwUBNRWlqgbVu2P/8fhEEQLxAACbBTO08OT/uYnDPQ1dKJH0xaZi3ocAniXQ Z0O3d1uKcvfLDcbTHPb6PTw2 =aJRQ -----END PGP SIGNATURE----- -Kevlar Oh, I'm sorry... Was I not suposed to EXPORT STRONG CRYPTO? print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0DEBT CONSOLIDATION LOAN PROGRAM <-------- Message-ID: <> Dear cypherpunks at toad.com, Debt Consolidation Loan Program Consolidate all your unsecured debts into one low monthly payment regardless of past credit. In most cases your monthly bills can be cut by as much as 50%. There is no credit check needed and no need to own your own home. Consolidate all those high interest accounts and save...... Must have more than $1,000 in debt to consolidate. For complete information on our financial services HIT REPLY. or send S.A.S.E. and email address to: Internet Financial Services, Inc. P.O. Box 1665 Peoria, IL. 61656 ***FREE $10.00 CALLING CARD SENT TO EVERYBODY THAT REQUESTS MORE INFORMATION AND VISITS OUR WEB SITE. ----------------------- Headers -------------------------------- Return-Path: Received: from relay16.mx.aol.com (relay16.mail.aol.com [172.31.106.72]) by air08.mail.aol.com (v40.9) with SMTP; Thu, 19 Mar 1998 09:06:40 -0500 Received: from mx.b.juno.com (ns1.kicon.com [207.199.114.2]) by relay16.mx.aol.com (8.8.5/8.8.5/AOL-4.0.0) with SMTP id JAA27947; Fri, 20 Mar 1998 09:06:23 -0500 (EST) From: majordomo at hk.super.net Received: from ns1.kicon.com by kicon.com (SMI-8.6/SMI-SVR4) id FAA14931; Fri, 20 Mar 1998 05:57:26 -0800 Received: from mailhost.marketitz.com(8.8.5/marketitz.2.143) by mailhost.marketitz.com (8.8.5/8.6.5) with SMTP id GAA04111 for ; Fri, 20 Mar 1998 09:01:04 -0600 (EST) Date: Fri, 20 Mar 98 09:01:04 EST To: profit at marketitz.com Subject: Debt Consolidation Loans Program Message-ID: <<57988360128 HGI at marketitz.com>> X-PMFLAGS: 48663992 9 X-UIDL: 48773727mm65reod 4 v 33b Comments: Authenticated sender is DEBT CONSOLIDATION LOAN PROGRAM <-------- Message-ID: <> Dear cypherpunks at toad.com, Debt Consolidation Loan Program Consolidate all your unsecured debts into one low monthly payment regardless of past credit. In most cases your monthly bills can be cut by as much as 50%. There is no credit check needed and no need to own your own home. Consolidate all those high interest accounts and save...... Must have more than $1,000 in debt to consolidate. For complete information on our financial services HIT REPLY. or send S.A.S.E. and email address to: Internet Financial Services, Inc. P.O. Box 1665 Peoria, IL. 61656 ***FREE $10.00 CALLING CARD SENT TO EVERYBODY THAT REQUESTS MORE INFORMATION AND VISITS OUR WEB SITE. ----------------------- Headers -------------------------------- Return-Path: Received: from relay16.mx.aol.com (relay16.mail.aol.com [172.31.106.72]) by air08.mail.aol.com (v40.9) with SMTP; Thu, 19 Mar 1998 09:06:40 -0500 Received: from mx.b.juno.com (ns1.kicon.com [207.199.114.2]) by relay16.mx.aol.com (8.8.5/8.8.5/AOL-4.0.0) with SMTP id JAA27947; Fri, 20 Mar 1998 09:06:23 -0500 (EST) From: majordomo at hk.super.net Received: from ns1.kicon.com by kicon.com (SMI-8.6/SMI-SVR4) id FAA14931; Fri, 20 Mar 1998 05:57:26 -0800 Received: from mailhost.marketitz.com(8.8.5/marketitz.2.143) by mailhost.marketitz.com (8.8.5/8.6.5) with SMTP id GAA04111 for ; Fri, 20 Mar 1998 09:01:04 -0600 (EST) Date: Fri, 20 Mar 98 09:01:04 EST To: profit at marketitz.com Subject: Debt Consolidation Loans Program Message-ID: <<57988360128 HGI at marketitz.com>> X-PMFLAGS: 48663992 9 X-UIDL: 48773727mm65reod 4 v 33b Comments: Authenticated sender is A non-text attachment was scrubbed... Name: not available Type: text/enriched Size: 711 bytes Desc: not available URL: From admin at aspenlinx.com Sun Mar 22 21:27:47 1998 From: admin at aspenlinx.com (Aspen) Date: Mon, 23 Mar 1998 13:27:47 +0800 Subject: My post earlier. Message-ID: <2.2.32.19970321051436.006b5c5c@ecom.net> Sup, It's Kevlar. I posted earlier about the "new" encryption method. It occured to me if you assign the "MAC"'s to computers and make a simple router (some transistors to act at "signaler" lines, one way of corse, so 3 a computer, A few ic's, hardware, and a power supply, ($75)), You have the makings for a basic network. Isn't that allready pattented? Hope I made somebody think for a second. I know I concidered this notion quiet a bit. From nobody at REPLAY.COM Mon Mar 23 13:38:23 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 23 Mar 1998 13:38:23 -0800 (PST) Subject: Privacy Development Project Message-ID: <199803232138.WAA23825@basement.replay.com> Developer & Consulting Positions Available Software development firm focusing on Internet privacy and anonymity tools is looking for developers and consultants. Applicants should be interested in the possibility of relocation or travel as development is being done outside of the United States. Applicants will be applying to join an aggressive team, where intelligence, entrepreneurial spirit and technology skills are valued and rewarded. Positions offer competitive salary and benefits along with stock options and bonuses. Interested applicants are asked to forward your c.v. by e-mail to: anonjobs at nym.alias.net Positions Offered: ------------------ Project Consultant - Anonymous Technologies and Cryotography ************************************************************ The ideal candidate should be very familiar with anonymous remailers (Type I, Type II, Nymservers), anonymous cash (Digicash), Blind Signatures, Public Key Cryptography and Cryptanalysis. A detailed understanding of anonymous networks and mailer systems will be required to help review the security model of companies system. Experience with C/C++ and software development projects on Solaris, Linux, Windows 95 also a definite asset. Experience on implementation of Cryptography libraries in software design also a definite asset. Software Engineers - Windows 95 ******************************* Successful candidates will have extensive development experience in the Windows environment, good organizational skills and be very success driven. Good knowledge of Visual C++, MFC and OOP a requirement. Interest in privacy, security and cryptography a definite asset. Software Engineers - Unix (Solaris/Linux) ***************************************** Successful candidates will have extensive development experience in the Solaris or Linux environment, good organizational skills and be very success driven. Good knowledge of C++, Internet protocols (HTTP, FTP, SMTP, NNTP), X.509 Certificate authority servers (LDAP) and experience with cryptography are all considered definite assets. The applicant should have a serious interest in technologies as they relate to Internet privacy, security and cryptography. From rdew at el.nec.com Mon Mar 23 14:53:58 1998 From: rdew at el.nec.com (Bob De Witt) Date: Mon, 23 Mar 1998 14:53:58 -0800 (PST) Subject: UPSs Message-ID: <199803232252.OAA08217@yginsburg.el.nec.com> Stan, Clearly you only considered a few of the semi-cons. Others just stop working, while still others pass anything above the manufacturer design max. Your lack of desire to learn indicates a possible reason why you don't seem to understand ... At my age, I forget some ... What is that old adage about leading a horse to water, but you can't make him read? or something like that! Bob De Witt, rdew at el.nec.com The views expressed herein are my own, and are not attributable to any other source, be it employer, friend or foe. > From StanSquncr at aol.com Fri Mar 20 14:43:46 1998 > From: StanSquncr > Date: Fri, 20 Mar 1998 16:50:55 EST > To: rdew at el.nec.com, spectre at anthrax.net, cypherpunks at toad.com > Mime-Version: 1.0 > Subject: Re: UPSs > Content-transfer-encoding: 7bit > > In a message dated 98-03-20 16:04:24 EST, rdew at el.nec.com writes: > > << If your surge protector is a semi-conductor, it probably will be > self-limiting. That is, it will reach a maximum block, and pass > whatever is above that. >> > > Yes, but what you fail to point out, is the reason it will pass everything, it > will have been blown (shorted, most likely). > > So, because you failed to point this out, I figure the rest of your response > isn't worth responding to. > > Stan > From nobody at REPLAY.COM Mon Mar 23 15:29:51 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 23 Mar 1998 15:29:51 -0800 (PST) Subject: AntiChrist Rules Message-ID: <199803232329.AAA09939@basement.replay.com> ---------- Forwarded from [argo at death.com] --------- For those of you fellas who still have the OLD excel 95 (not office 97), try this out : 1. open a new file 2. scroll down until you see row 95 3. click on the row 95 button, this highlights the whole row 4. press tab, to move to the second column 5. now, move your mouse and click on help THEN about Microsoft excel 6. press ctrl-alt-shift and click on the tech support button simultaneously 7. A WINDOW WILL APPEAR, TITLE : THE HALL OF TORTURED SOULS This is really eerie okay...it has a doom style format and you can walk all around the hall...and on the sides of the walls are the names of the tortured souls... 8. NOW WALK UP THE STAIRS AND THEN COME BACK DOWN, FACE THE BLANK WALK AND THEN TYPE IN EXCELKFA this will open the blank wall to reveal another secret passage, walk through the passage and DO NOT fall off, when you get to the end, you will see something really really eerie... At this point in time, countless witnesses all over the world have verified this point...it's really an eye opener. It could be a joke by MS programmers ,or is it? Wouldn't be surprised if Bill Gates was "The Antichrist", after all it,was already foretold in the Bible that someone powerful would rise up and lead the world to destruction. And Bill Gates definitely have that kind of power in his hands. More than 80% of the world's computers run on Windows and DOS (including those at Pentagon!) If all his products have some kind of small program embedded (like this Hall of Tortured Souls) that can give him control, setting off nuclear arsenals, creating havoc in security systems, financial systems all over the world,etc......all from his headquarters isn't a far off reality! Just using Internet Explorer may just allow him to map out what you have on your computer bit by bit each time you log on. Perhaps the end times are near and this is just a tip of the iceberg!? "He also forced everyone, small and great, rich and poor, free andslave, to receive a mark on his right hand or on his forehead, so that no one could buy or sell unless he had the mark, which is the name of the beast or the number of his name. This calls for wisdom. If anyone has insight, let him calculate the number of the beast, for it is man's number. His number is 666 ." ....Revelation 13:16-18 Something for you to think about. An eerie E-mail for everybody to think about... The Bible, in the Book of Revelation says that without the sign of the beast one would not be able to buy, sell, do business transactions,etc..... and My question to you now is this..... Is Internet now a necessity in doing business? The Internet also bears the sign.... Note that the Internet is also commonly known as the World Wide Web or WWW.. ... One other way we write W is V/ (VI), so ..... W W W VI VI VI 6 6 6 This gives me something to ponder upon ... Isn't everything going towards the Internet? (i.e., buying / selling goods, business transactions) Isn't Microsoft always on the move to have a monopoly when it comes to software technology? And now the Internet? Revelation also says that the mark of the beast will be carried on one's Hand and one's forehead.....If the Internet would indeed be the sign of the beast aren't we all starting to carry it on our hands and foreheads??? Screens (forehead) and make use of the mouse (hand) ??? Are things finally falling into place or are we just letting our imagination run? Remember, the devil came to cheat, steal, and to destroy......... so be VIGILANT!!!! About Bill Gates and Microsoft. PROOF that Bill Gates is the Devil: The real name of "the" Bill Gates is William Henry Gates III. Nowadays, he is known as Bill Gates (III), where III means the order of third (3rd). By converting the letters of his current name to the ASCII-values and adding his (III),you get the following: B 66 I 73 L 76 L 76 G 71 A 65 T 84 E 69 S 83 I 1 I 1 I 1 --------------- 666 !!!! THE NUMBER OF THE BEAST....... Some might think ask, "How did Bill Gates get so powerful?" Coincidence? Or just the beginning of mankind's ultimate and total enslavement? Before you decide, consider the following: MS-DOS 6.21 77+83+45+68+79+83+32+54+46+50+49 = 666 WINDOWS95 87+73+78+68+79+87+83+57+53+1= 666 Coincidence? You decide...."To agree or to not agree with the WWW or the Beast", is not the question. What if the WWW is the 666? Or Bill Gates be the Beast? What will you do?? Cancel subscriptions to the Internet? Resign from Microsoft? Set out a campaign against Bill Gates in the Internet? Shut down all Windows95 forever? It will not do you any good..... Think about all this and pray, pray really hard, or else......... Never Stop Believing.... From StanSquncr at aol.com Mon Mar 23 15:30:57 1998 From: StanSquncr at aol.com (StanSquncr) Date: Mon, 23 Mar 1998 15:30:57 -0800 (PST) Subject: UPSs (and downs ;-) ) Message-ID: <700c3b7a.3516ebbd@aol.com> In a message dated 98-03-23 17:53:21 EST, rdew at el.nec.com writes: << Stan, Clearly you only considered a few of the semi-cons. >> Which ones? What do you call a nun that's had a sex-change operation? A trans-sister, what else? :-) << Others just stop working >> You pass enough current through any semi-conductor, it will short, I do believe. And, see below. << while still others pass anything above the manufacturer design max. >> It will short, then it will fry so bad because of the heat from that, that it will eventually open. << Your lack of desire to learn ... >> 'Straw-man' argument. << ... indicates a possible reason why you don't seem to understand ... >> I'll allow our fellow cypherpunks (in particular, the ones with enough guts to use a name instead of 'anom' :-) ) to decide for themselves if they think I understand or not. << At my age, I forget some ... >> So what's your age, the tube age? So, you don't really know anything about semi-conductors, do you? ;-) Stan, Stan and the Sequencers http://members.aol.com/StanSquncr/ Brave Combo on our gig in Houston this Friday night (their website, newletter page, Hot Dates) - "This show will feature a surprise guest opening the show. Don't miss it. Seriously, don't miss it. ... " From toto at sk.sympatico.ca Mon Mar 23 15:44:34 1998 From: toto at sk.sympatico.ca (Toto) Date: Mon, 23 Mar 1998 15:44:34 -0800 (PST) Subject: Youwon'thave?To?Totokickaroundanymore... Message-ID: <35170F43.2C65@sk.sympatico.ca> sincethedeathofGomez,myunclehashadadrinkinhishandconstantly,exceptwhen hehasdroppeditonhiskeyboard,fuckingitupandmakingitdostrangethings,suchas nolongermakingspacesappearwhenhepressesthespacekey,whichisnormally calledsomethingelse,however,Ican'ttellyouwhatitscalled,sincethekeyusedtospell itdoesn'twork,either. (hint,veavsi&vutthead,vadvoy-vadvoy-whatcha-gonna-do,whatchagonnadowhen theycomeforyou?,iputthequestionmarkinvyhittingtherightenterkey...) tousetheshiftkeyIhavetotypeanextraletter,sincetheshiftkey,leftone,doesadelete- vackspacevevoreaddingtheshiftedcharacter. thedeathofgomez,whichhappenedwhenthe?N?S?A-?C?I?A?(therightshiftkey addsaquestionmarkveforeaddingtheshiftedcharacter) writingthisislikewhatmyuncletellsmeavoutveingonlsd,hee-hee... couldsomeonesendthisto-villg-at-microsoft.com,please,sinceican't typeayou-know-what-inthecccolonfield?(iputthatquestionmarkinvyhitting the?keywithoutdoingashiftkey--also,ifiguredoutthatthe'v'key,youknowwhich oneimean,doesa'control-v',sinceittriestomakethecharacters'vold'wheni hititvymistake. andcoulddavesmithputthisonhissightasprologue-numverslash0.?(thenumver onekeydoesn'tworkeither,vuticanputaquestionmarkattheendofasentence andthenuseparenthesiswhilesavingakeystrokevecausethekeyvoardputs the?inautomaticallywheniusetherightshiftkey. itisreallyweirdtypingthisstuffwithakeyvoardthatdoesthingsthatarenotdone thewaythatmyvrainandfingersarewired.ivetthatificouldputspacesinthis, thateveryonewouldthinkthatjohnyoungwaswritingit. anyway,ifanyofyouarereally,reallystoned,sostillreadingthisvecauseyou understanditanddon'tseeanythingoddavoutit,couldyoudoakeywordsearch inyahoomountaindeworsomeothersearchengineforaprogramthatletsa personcustomizethekeyvoardsothattheycanusedifferentkeystomakethe charactersthatdon'tworkonthiskeyvoard,andsenditvyemailto-toto-at-the addresswhereallthespamvullshitandcrapolatothecypherpunkslistcomes from?--iamaskingyoutodothisvecausehefuckedupmycomputer,2. myuncleisjustanoldvrokendowndrunkenasshole,vuticanfixhiscomputer ifigetakeyvoardcustomizingprogram,sothanksifyoucansendit. ifsomeonecoulddothis,theniwouldpromisetoquitaskingthecypherpunks womeniftheyarewearingpanties--i'mlying,vuti'mjustakid... ok,vuticouldofferyouavlow-jovifyoudoit,fromoneofvianca'schild-girl apprentices,althoughtheywillkillmewhentheyreadthis... ok,i'mgoingnow,vutihopesomeonewillsendmeaprogramthatwill helpmefixmyuncle'scomputer,evenifhewilluseittospamyourmailing listwithstuffthatyoushouldvelisteningto,exceptthathemakesitsothat youcan'tunderstandwhathe'ssayingunlessyoureallydoputacorkin yourassholesothatyoucanquitthinkinglikeasheeple. thanks, humangus-peter ?(anotherguywhosendsyoushitthatyouwishpeoplewouldstopsending toyourmailinglist,eventhoughithinkyouguysarecool,eventhegrouchy onesliketimmayandthespookyguyslikekentcrispinwhowouldprovavly veacircleofeunuchsguyiftheyweren'twatchinghimsoclose--he'sstill alive,likedalethorn.?) isn'titcoolhowiautomaticallygetaquestionmarkveforetheparenthesis,and canmakeaquestionmarkwithoutusingtheshiftkey? pps-ifyoudon'tunderstandsemiotics,thentherearekidsinsaskatchewan whoaresmarterthanyou,evenifyouknowavoutplutoniumdecayratesand wheretheyellowwiregoes. i'llquitveforeyouthinki'mascrazyasmyuncle. ppps-i'malwaysaskingpeoplewhopostfrom?A?(h?)?O?Liftheyarewearing panties,vuttheydon'tgetthejoke,andi'mnotsurethatido,either,vuti'mgoing tokeepondoingit. pppps-anarchistusedeltekeys,they'reimmortalcypherpunks... From toto at sk.sympatico.ca Mon Mar 23 15:54:39 1998 From: toto at sk.sympatico.ca (Toto) Date: Mon, 23 Mar 1998 15:54:39 -0800 (PST) Subject: UPSs In-Reply-To: <199803232252.OAA08217@yginsburg.el.nec.com> Message-ID: <3517119E.41AC@sk.sympatico.ca> Bob De Witt wrote: > Clearly you only considered a few of the semi-cons. Others just stop > working, while still others pass anything above the manufacturer design > max. Your lack of desire to learn indicates a possible reason why you > don't seem to understand ... THEFIRSTCOMPUTERSYSTEMTHATMYUNCLEINSTALLED,LIGHTNINGHITANDITSMOKEDTHE UPSANDTHECOMPUTERWASOKAFTERWARDS. THENEXTUPSTHATHESMOKEDWASWHENHEWASREDOINGTHEPLUGINSTUFFANDHEPLUGEDTHE UPSINTOITSELF,ANDHESAIDITWASLIKINGSTICKINGYOURDICKINYOUROWNASSHOLE, ANDITSPITOUTPUFFSOFWHITESMOKEANDDIEDOFDIGITAL,SELF-INFLICTEDAIDS. MARTIN,THEMADSCIENTISTFIXEDITFORHIMWITHFIFTYCENTSWORTHOFPARTSFROM RADIOSHACK,SINCETHEREARESTILLAFEWPEOPLEWHOCANFIXTHINGSWITHOUT FORMATTINGTHEHARDDRIVEANDREINSTALLINGWINDOWS,LIKETHECROOKSWHO HAVEACOMPUTERCOMPANYANDSTILLDON'TKNOWANYTHINGTODOWITHCOMPUTERS DO. HUMANGUS-PETER?(WHOCAN'TPUTSPACESINWHATHEWRITESCAUSEHISUNCLE ISASORRYDRUNKWHOSPILLSSCOTCHANDCOKEONTHEPARTOFTHECOMPUTERWHICH MAKESWORDSAPPEARWHENYOUSTRIKETHEKEYS,HOWEVER,ICAN'TTELLYOUWHAT PARTTHATIS,SINCETHEKEYUSEDTOSPELLITDOESN'TWORKANYMORE. PS-I'MDRINKINGMYUNCLE'SSCOTCH,HOWEVER,THATISNOTWHYTHISMESSAGE ISSOWEIRD,IT'SONACCOUNTOFHIMDRINKINGSCOTCH,NOTME... From mix at anon.lcs.mit.edu Mon Mar 23 17:00:51 1998 From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer) Date: Mon, 23 Mar 1998 17:00:51 -0800 (PST) Subject: Cryptologic... Message-ID: <19980324010007.27399.qmail@nym.alias.net> Has anyone ever taken a look at Cryptologic (www.cryptologic.com)? They make Internet casino software and processed 500 million dollars in bets last year with their 'Proprietary' encryption algorithm for security and their own ecash system. You'd think with that much money being transmitted over the net with an untested algorithm, someone might just test the situation for them.... Maybe someone already has, and doesn't feel like making it public? Who knows... From StanSquncr at aol.com Mon Mar 23 19:12:54 1998 From: StanSquncr at aol.com (StanSquncr) Date: Mon, 23 Mar 1998 19:12:54 -0800 (PST) Subject: Bill Gates the AntiChrist? Message-ID: <8a19a03a.3517248f@aol.com> Sorry "nobody", your buddy Pat Robertson is the anti-Christ, therefore, it ain't Bill. And if it isn't Pat Robertson, it's your boss Rep. Newt Gingrich ("King(OfThe)Rich"). ;-) In a message dated 98-03-23 19:11:31 EST, a real "nobody" writes: << "He also forced everyone, small and great, rich and poor, free andslave, to receive a mark on his right hand or on his forehead, so that no one could buy or sell unless he had the mark, which is the name of the beast or the number of his name. This calls for wisdom. If anyone has insight, let him calculate the number of the beast, for it is man's number. His number is 666 ." ....Revelation 13:16-18 >> Former President Ronald Reagan (other wise known as the 'piss-test President') bought a house with the address of 666, as I understand. Stan ======= "You say you're supposed to be nice to the Episcopalians and the Presbyterians and the Methodists and this, that, and the other thing. Nonsense. I don't have to be nice to the spirit of the anti-Christ." (Pat Robertson - The 700 Club, January 14, 1991) From thecompanyprez at a-vip.com Mon Mar 23 20:09:17 1998 From: thecompanyprez at a-vip.com (thecompanyprez at a-vip.com) Date: Mon, 23 Mar 1998 20:09:17 -0800 (PST) Subject: 9 out of 10 Americans are owed an average of $1,200.00 each! Message-ID: <> There is over 400 BILLION DOLLARS in unclaimed and lost money in North America and we want to help people get their money back! In a continuing effort to inform the public of this money, Personal Funds Recovery, Inc. is launching an INFOMERCIAL to air across North America. This INFOMERCIAL will educate millions of viewers about the over 400 BILLION DOLLARS that needs to be returned to it's rightful owners. We are looking for 300 INDEPENDENT AGENTS who will become a part of this campaign. Each Agent will own an exclusive territory and will receive a percentage of every lead generated from the national informercial! Your involvement will be very financially rewarding. Visit our website at to find out more about the opportunity and how you can get involved. ******************************** If you wish to be removed please hit REPLY and type REMOVE in the subject line and your request will be honored immediately. ******************************** From thecompanyprez at a-vip.com Mon Mar 23 20:09:17 1998 From: thecompanyprez at a-vip.com (thecompanyprez at a-vip.com) Date: Mon, 23 Mar 1998 20:09:17 -0800 (PST) Subject: 9 out of 10 Americans are owed an average of $1,200.00 each! Message-ID: <> There is over 400 BILLION DOLLARS in unclaimed and lost money in North America and we want to help people get their money back! In a continuing effort to inform the public of this money, Personal Funds Recovery, Inc. is launching an INFOMERCIAL to air across North America. This INFOMERCIAL will educate millions of viewers about the over 400 BILLION DOLLARS that needs to be returned to it's rightful owners. We are looking for 300 INDEPENDENT AGENTS who will become a part of this campaign. Each Agent will own an exclusive territory and will receive a percentage of every lead generated from the national informercial! Your involvement will be very financially rewarding. Visit our website at to find out more about the opportunity and how you can get involved. ******************************** If you wish to be removed please hit REPLY and type REMOVE in the subject line and your request will be honored immediately. ******************************** From ualdv8 at sk.sympatico.ca Mon Mar 23 20:11:00 1998 From: ualdv8 at sk.sympatico.ca (Six) Date: Mon, 23 Mar 1998 20:11:00 -0800 (PST) Subject: Prologue 11/0 -- SPACE ALIENS HIDE MY DRUGS !!! Message-ID: <351732E1.7254@sk.sympatico.ca> Prologue 10/0 -- SPACE ALIENS HIDE MY DRUGS!!! ---------------------------------------------- [Author's Nephew Note: My uncle started writing this chapter, which is the first one he actually wrote in his own autobiography, since it was started by god-only-knows-who (TM) but I am going to finish it, since space-bar aliens stole his drugs and his 'b' key, etc., and I know everything he knows, only I'm not going to sugar-coat it, since I'm just a kid and I want to have a life, which I'm not going to have if you old guys and broads keep fucking up the world the way you have been doing so far. If you don't like what I have to say, then it's just because you are too comfortable in your beliefs and your position in life to risk upsetting the apple-cart in order to really support the people and belief-systems that you know are the right ones to make the world a place where everyone will really be free and have rights, even if you have to lose some of the things you have in order for others to be able to have a chance to compete with you, even if they don't have big guns and nuclear weapons. Sorry I have to speak honestly, but we're all fucked if things don't change real soon, so that everyone can contribute to rEvolution. Thanks.] [p.s. - I still can't use my browser, but I can use email, so send my uncle a keyboard-fixer pointer or program, if you can. Thanks.] [p.p.s. - If you are sober and straight, then you might have noticed that my post "Youwon'thaveTototokcikaroundanymore" to the cypherpunks list spelled 'keyboard' correctly, even though I claimed that the 'b'/'v' key didn't work. It does, in fact, work, about one time in ten. The fact that it worked intitially, in order to make it look like I am crazy, like my uncle, and just making all of this shit up, is either due to Murphy's Law, or to the ongoing plot by the Evil One and the Forces of Darkness against Scotch drinkers.] [Prologue 10/0, proper:] Army of One: Ted Kaczynski Army of Sundry: Timothy McVeigh Army of God: Dr. William Michael Bray Army of Dog: Dr. Wm. Michael Denney: Anyone who has followed the Fusillade Follies with even a modicum of interest is likely to have noted that, in Guerilla Operations, the old adage, "There's safety in numbers.", does not apply. The Uno-bomber was successful for a period spanning decades quite simply because he lived and acted within a sphere of individual anarchism which approached being as exemplary a model as is possible to aspire to in the current social and governmental environment of our times. Most importantly, he exhibited a level of self-reliance which allowed him to avoid many of the governmental regulations and societal entrapments which are used to monitor, categorize and attach physical, mental, emotional, and spiritual footprints to the majority of the Sheepletariat herded in the comfortable feeding pens provided for them by those whose ultimate goal is to clip their wool and eat their meat. In the end, TK opted to forgoe the immortality of infamy for a turn upon the public soapbox which elevates us above the maddening crowd and into the limelight for our fifteen minutes of fame, and which is then dismantled in order to build the crucifix upon which our carcass is publically raized. (This, however, is merely an illusion propogated by the rulers to please the masses. The truth of the matter is, the end we eventually come to is inevitably the result of being hoisted on our own petard.) His success in promoting his agenda over a considerable length of time was in avoiding the attachment, which is so natural for us, of our physical, mental and emotional self-image to the herd which surrounds us. Too little, and too late, do we usually stop to make our own evaluation as to where the herd is headed--be it into the pen, over the cliff, or into the railway cars. It is only when we attempt to leave the herd that we encounter the teeth of the dogs that the masters have set upon us, to keep us from straying from the destiny the butchers have preordained for us from the moment of our bleating birth. Those Sheeple who manage to separate from the herd usually do so, not by *bolting* from the pack, but by *wandering* from the pack, whether it be out of ignorance or cunning. The same applies to the Wolverines in Sheeples clothing. "Picture a weasel -- and most of us can do that, for we have met that little demon of destruction, that small atom of insensate courage, that symbol of slaughter, sleeplessness, and tireless, incredible activity -- picture that scrap of demoniac fury, multiply that mite some fifty times, and you have the likeness of a Wolverine." ~ Ernest Thompson Seton 1906 Timothy McVeigh succeeded in [OK, here's where *I* start, OK?] Timothy McVeigh succeeded in his attempt to give America a wake-up call, due to the fact that he was the next step above Kaczynski, who kept his own counsel, as Shakespeare would say. McVeigh 'kept it in the family.' TM shared his true goal/plan only with members of his immediate (conceptual) family, such as Terry Nichols. He shared the concepts which he believed in with the members of his extended family, such as those at Elohim City, which was why the BATF, who had their spies in the encampment, were able to follow and support TM's plan, and keep themselves alive by not being at the Murrah Federal Building when the fertilizer/shit hit the fan, despite the fact that they thought they could 'save the day' at the last minute with a partial knowledge of McVeigh's plans. (The fact is, TM knew full well that 'the watchers' were keeping track of his actions/plans, so he purposely obstruficated them in order to give the BATF reason to believe that they could 'ride to the rescue' at the last moment.) Dr. William Michael Bray, an early follower of the underground movement which resulted in the formation of the Circle of Eunuchs, made the decision to take the concepts involved and move them into a MeatSpace arena which would allow him to be a big fish in a little pond--the arena of Fundamental Christian anti-abortion rhetoric. Dr. Bray promoted MeatSpace concepts which addressed the right of individuals to make their own decisions as to what actions were justified in countering the effects of that which they saw as evil in the society around them. He was hung upon society's cross for this, though they never quite managed to fully 'nail' him to it. What Dr. William Michael Bray was able to accomplish was basically due to the fact that the concepts he expresed were valid, although he failed to mention that each individual should first seek to explore alternatives to first-strike/active-violence before acting, in case there was an alternative route that they were capable of taking which would be capable of achieving similar effects while doing a minimum of damage to those who they believed must be prevented from continuing their abuse of their fellow humans. (i.e. - Before acting upon the exhortations of TM [Tim May, Timothy McVeigh, TruthMonger], they should consider the exhortations of Blanc, who is currently trying to distance herself, as much as possible, from the sundry death threats being sent to BadBillyG by various entities who have hacked Toto's account since his InterNet account password was placed on the mailing lists of various hackers' confereneces.) A recent 'NightLine' TV show dealing with the 'Army of God' made note of the fact that much of their success was due to the fact that their actions were 'senseless' (hard to quantify, therefore hard to trace, or attriute to a specific individual). In essence, the reason that the MeatSpace 'Army of God' has been so effective is because they exist only in their own minds. The AOG consists of individuals who have read and accepted the writings/works of those in the anti-abortion movement, and have taken it upon themself to take independent actions to interfere with things which they see as being contrary to what they see as right/righteous. Dr. William Michael Denney, who was recently castrated from a company which he founded, Basis Incorporated, by Prologic (an NSA/CIA company- killing entity), also recognized the power of small gorilla units to be able of acting according to their own conscience, without making themself a visible target to those whose life revolves around hammering down the nail that sticks up, even if their skin-color is not yellow, their eyes are round, and they have never received an email from Tim May which includes the words, "chop,chop." Dr. Denney, Gomez to those within the Magic Circle, had the character and foresight to act on the dictates of his own conscience without ever indulging in braggadacio in regard to his many accomplishments in subtly opposing the ongoing march of dark and evil technological forces whose aim has always been to bring humankind under the thumb of the bits and bytes which the Evil One has appointed to rule over the independent, chaotic, evolution of humankind (formerly known as 'mankind,' before those 'uppity women' demanded the right to vote). [The following is a note that my uncle made in regard to the direction that this chapter would take. You already know what he is referring to, although I will explain it for those of you who are George Carlin fans, and refuse to acknowledge any piece of inbred/inherent information/understanding until he has put it upon one of his comedy albums, or on an HBO special.] {Global InterNet of individuals/Way to win war against Statism/NWO is to create maximum entropy/the chaos of semiotic rEvolution.--sog} *** OK, the 'Army of Dog' is born!!! *** Army of Dog: Read that crapola that my uncle spammed to the CypherPunks mailing list about BioSemiotics. Yeah, I know--it will hurt your head, but you really need to understand this shit, since the advertising executives who gave you Crest toothpaste and Ronnie RayGuns have evolved their mind-control activities to encompass the new technologies being opened up by the marriage of quantum physics and post-Darwinian evolution theories. In essence, those who understand that TV was/is the 'opiate of the people' have a 'cubic centimeter of chance' to understand that the InterNet is the 'evolution of the people.' If you truly understand this biosemiotic concept, then you also have a remote chance of understanding that being *active* in regard to the interactive extension of the mind-numbing medium/opiate of TV enables you to participate in the true rEvolution which will ultimately decide whether humankind is an active particpant in the unfolding of the universe around them, or merely a pawn in the cold, unfeeling evolution of artificial intelligence which is pulling out to pass in the fast lane of the Information Highway because it does not suffer from the same emotional and spiritual constraints of the human entities who gave birth to it. "The number of possible solutions for selection to scrutinise, and the subtlety of the communicational interactions, will tend to produce a no-win situation. As a result selection cannot really �measure� the stakes of single players (individuals, demes, or species) in the game, but it could still influence the choice of the game itself. Plays, not players, are selected for." ~ Joseph Hoffmeyer The Bottom Line: Whose play are you backing? Statism is not the enemy. rEvolution is not the enemy. The true enemy is our tendency to listen to the external voices which claim authority over our beliefs, values and actions, as opposed to listening to the inner voice which tells us when we are being true to the role which we were born/destined to play upon our entry into this physical sphere which constitutes the 'gamewad' which we all must successfully transverse in order to move to the next level of 'play' in the universal scheme of things. The Statists are attempting to prevent the forward-reaching rEvolutionaries from creating so much Chaos that there is no way to steer the course of future human evolution. The rEvolutionaries are attempting to prevent the Statists from writing the present in concrete, to the extent that those whose goal in life is to fly too close to the sun will never get off the ground. The Army of God represents every MeatSpace mentality which strives to live by its limited, physically-oriented beliefs, and force everyone else to do the same. Their glory is that they act upon those beliefs, even though it goes contrary to the statist ethics and morals of those who believe that the key to survival lies in not rocking the boat, no matter how badly it is leaking. The Army of Dog represents every CyberSpace NetiZen who strives to resist the imposition of MeatSpace mentality, rules and laws upon a new social and governmental paridigm which goes far beyond the physically limited rules and regulations designed to enforce geographical ethics and values upon a populace which is evolving beyond MeatSpace limitations which Digital Dinosaurs are attempting to impose on the children of the Digital rEvolution. Their glory is that they act upon those beliefs, even though it goes contrary to the statist ethics and morals of those who believe that the key to survival lies in not rocking the boat, no matter how badly it is leaking. The Army of Dog, like the Circle of Eunuchs, is an unstructured entity which is built upon the foundation of 'A Thousand Points of Fight.' The result is an army of CyberSoldiers who are capable of acting upon their own initiative, according to their own ethics and values, without limiting their actions to be consistent with a static view of ethics/morality defined by an averaging of the Sheeple mentality with the views espoused by the MainStream Press. Dave Foreman and Earth First exemplify an organization of individuals who committed themselves to pursue a commonly-held goal independently of one another, in ways which reflected the individual's own talents, beliefs, and self-proclaimed responsibilities to themselves and to their fellow humans. CyberSpace, which represents the evolution of MeatSpace, will fare no better than our current geophysical system, unless CyberWarriors arise to guide and influence its evolution in a manner that reflects the right of every NetiZen to freely express their persona, character, beliefs and personal ethics, without censorship or repression from those who hold different beliefs and values. The rEvolution is NOW! The key to moving the rEvolution of humankind forward into a new paridigm that encompasses a Global Information Democracy lies in instituting a Joe SixPack rEvolutionary Recruitment Drive. Jane and Joe MeatSpace need to be unindated with information which contadicts the mainstream psychobabble which they are subjected to, each and every day, by those who wish to maintain the status quo (which was designed to keep the Sheeple in subjection to the rule/authority of those who occupy a privileged position in our current society). If you are not promoting and taking part in the rEvolution (which will decide the biosemiotic future of man, mind and technology), then you are part of the breath-analyzer problem, instead of the alcoholic solution... [This last concept is undoubtedly the result of my having imbibed a bit too much of the hair of my uncle's Dog. "You're in the Army, now, You're in the Army, now, You'll never get rich, you son-of-a-bitch, You're in the Army now!"] (End of Bottle) From StanSquncr at aol.com Mon Mar 23 20:13:28 1998 From: StanSquncr at aol.com (StanSquncr) Date: Mon, 23 Mar 1998 20:13:28 -0800 (PST) Subject: Or is it Pat Robertson? Message-ID: <59899767.351732c3@aol.com> Sorry about the duplication, but I just decyphered something (is decyphering ok on a 'cypher' list? :-) ) - In a message dated 98-03-23 22:46:09 EST, StanSquncr at aol.com writes: << "You say you're supposed to be nice to the Episcopalians and the Presbyterians and the Methodists and this, that, and the other thing. Nonsense. I don't have to be nice to the spirit of the anti-Christ." (Pat Robertson - The 700 Club, January 14, 1991) >> You see, add 14 + 1 + 9 + 9 + 1 and you get 34. 700 - 34 is, guess what - 666! I guess that proves it! ;-) Stan From whgiii at invweb.net Mon Mar 23 21:31:36 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Mon, 23 Mar 1998 21:31:36 -0800 (PST) Subject: Or is it Pat Robertson? In-Reply-To: <59899767.351732c3@aol.com> Message-ID: <199803240530.AAA09314@users.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <59899767.351732c3 at aol.com>, on 03/23/98 at 11:12 PM, StanSquncr said: >Sorry about the duplication, but I just decyphered something (is >decyphering ok on a 'cypher' list? :-) ) - >In a message dated 98-03-23 22:46:09 EST, StanSquncr at aol.com writes: ><< "You say you're supposed to be nice to the Episcopalians and the >Presbyterians > and the Methodists and this, that, and the other thing. Nonsense. I >don't have > to be nice to the spirit of the anti-Christ." (Pat Robertson - The 700 >Club, > January 14, 1991) >> >You see, add 14 + 1 + 9 + 9 + 1 and you get 34. >700 - 34 is, guess what - 666! >I guess that proves it! ;-) Hmmm Louis Farakan school of Number Theory - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html - --------------------------------------------------------------- Tag-O-Matic: OS/2: Not just another pretty program loader! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNRdFpo9Co1n+aLhhAQFDpgP8CEFgqntvKfNWWXuPgo0M8pyvYMudl51p g/QyXmn2bs9WZ+3WYwDZlzvirKPa1LuDK85zUGGemMPbZQg2y7PSkyIi3F9kCqoC PLOnCW1ft2dbmiaRZxqbR6LcTU5Ti24XZoe70du0nz6M5vw8vPVW96ZCx0W9Vt2r DXkeg20YFYQ= =a5pE -----END PGP SIGNATURE----- From StanSquncr at aol.com Mon Mar 23 23:08:54 1998 From: StanSquncr at aol.com (StanSquncr) Date: Mon, 23 Mar 1998 23:08:54 -0800 (PST) Subject: Or is it Pat Robertson? Message-ID: In a message dated 98-03-24 00:31:09 EST, whgiii at invweb.net writes: << >You see, add 14 + 1 + 9 + 9 + 1 and you get 34. >700 - 34 is, guess what - 666! >I guess that proves it! ;-) Hmmm Louis Farakan school of Number Theory >> Hmmm, didn't seem to bother you when the same theory was used against Bill Gates! Not surprized, the response came from, you guessed it cypher's, another paranoid "Know-nothing" - << -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNRdFpo9Co1n+aLhhAQFDpgP8CEFgqntvKfNWWXuPgo0M8pyvYMudl51p g/QyXmn2bs9WZ+3WYwDZlzvirKPa1LuDK85zUGGemMPbZQg2y7PSkyIi3F9kCqoC PLOnCW1ft2dbmiaRZxqbR6LcTU5Ti24XZoe70du0nz6M5vw8vPVW96ZCx0W9Vt2r DXkeg20YFYQ= =a5pE -----END PGP SIGNATURE----- >> Stan From bill.stewart at pobox.com Tue Mar 24 00:13:30 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 24 Mar 1998 00:13:30 -0800 (PST) Subject: Computer Expert Witness Needed *Immediately* In-Reply-To: <01BD568F.52B445A0.slates@inreach.com> Message-ID: <3.0.5.32.19980324000612.007ec9f0@popd.ix.netcom.com> At 07:09 PM 3/23/98 -0800, "Roger D. Slates II" wrote, on another list: >A computer expert is needed immediately to testify as an expert witness in >an ongoing criminal matter in Federal District Court in Los Angeles. Kevin >Mitnick is seeking a highly credentialed expert in computer security, >telecommunications, system and network administration to testify in this >highly publicized computer "hacking" case. >This will be a groundbreaking case and is expected to attract significant >media coverage. Testimony will be required as early as March 30, 1998 in >Los Angeles, California. Further testimony will be needed at trial, later >this year. Expert witness fees will be paid by the federal court. >Qualified candidates must have an advanced degree and be knowledgeable in >DOS, Windows 3.ll, Unix (SunOs & Solaris), VAX/VMS, and Internet >operations. Experience with cellular telephone networks is a plus. > Previous expert testimony and/or publication are preferred. >Qualified candidates, please contact Mr. Mitnick through his appointed >defense counsel, Donald C. Randolph, Esq. at (310) 395-7900 or write to him >at: Donald C. Randolph, Esq., Randolph & Levanas, 1717 4th Street, Third >Floor, Santa Monica, CA 90401-3319. Email address is: >randlev at worldnet.att.net > > Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From whgiii at invweb.net Tue Mar 24 03:44:01 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Tue, 24 Mar 1998 03:44:01 -0800 (PST) Subject: Or is it Pat Robertson? In-Reply-To: Message-ID: <199803241143.GAA11984@users.invweb.net> In , on 03/24/98 at 02:08 AM, StanSquncr said: >In a message dated 98-03-24 00:31:09 EST, whgiii at invweb.net writes: ><< >You see, add 14 + 1 + 9 + 9 + 1 and you get 34. > > >700 - 34 is, guess what - 666! > > >I guess that proves it! ;-) > > Hmmm Louis Farakan school of Number Theory >> >Hmmm, didn't seem to bother you when the same theory was used against >Bill Gates! Not surprized, the response came from, you guessed it >cypher's, another paranoid "Know-nothing" - Yes Stan and you are here to "save" us all. Twit. -- --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html --------------------------------------------------------------- Tag-O-Matic: OS/2: The choice of the next generation. -------------- next part -------------- A non-text attachment was scrubbed... Name: pgp00005.pgp Type: application/octet-stream Size: 339 bytes Desc: "PGP signature" URL: From mixmaster at remail.obscura.com Tue Mar 24 05:37:21 1998 From: mixmaster at remail.obscura.com (Mixmaster) Date: Tue, 24 Mar 1998 05:37:21 -0800 (PST) Subject: Stan the Asshole Message-ID: <199803241301.FAA24628@sirius.infonex.com> Stan is an asshole, an annoyance on this list. I've killfiled anything with his email address in any header. I suggest everyone do the same. When he gets no responses to anything he posts, he will eventually go away, probably to where "Liberals Go To Die." If you encourage him, I won't see your responses. I don't wade through the blizzard of this list to have to wipe splashes of airhead liberal shit out of my eyes at every other step. GodILoveFiltersMonger II From webmaster at canes.gsw.peachnet.edu Tue Mar 24 05:51:26 1998 From: webmaster at canes.gsw.peachnet.edu (Bill) Date: Tue, 24 Mar 1998 05:51:26 -0800 (PST) Subject: Hello Message-ID: <3517B886.3C3F@canes.gsw.peachnet.edu> Hey Stan, how is the MLM business. Oh, lets not forget the adult WebSites also. From aim at cysnet.net Tue Mar 24 07:17:48 1998 From: aim at cysnet.net (aim at cysnet.net) Date: Tue, 24 Mar 1998 07:17:48 -0800 (PST) Subject: FASTEST / BEST EXTRACTORS YET ! Message-ID: <199803241517.HAA13896@toad.com> The three new programs that are sweeping the industry......... HURRICANE..Extremely fast.This extractor goes to major search engines (you can pick from a list of 10 of the most popular search engines) and conducts a search by keyword or keywords. It then spiders the web pages that come up as search results extracting the email addresses and saving them in a plain text format. You can define how deep the search is to be. You can filter out addresses such as those with webmaster or admin. You can use additional filters to have the software only include url's containing certain keywords. It can also eliminate certain url's with specified keywords. This makes for some very tight targeting. The cost of Hurricane is $ 250 but scroll down to see the package deal. For a demo of Hurricane call toll free 800-942-7913 The demo will work showing you how fast and accurate the software is but you will not be able to save or use the addresses collected. GEO SNAKE - This is a targeted list builder that could also be used to collect general addresses. You input a city and state and hit the start button, kick back and watch it collect. Quite fast. Easy to use. The cost of GEO SNAKE is $250.00 For A Demo of Geo Snake call toll free 800-942-7913 The demo will let you see how fast and easy it is to use but it will not save or let you use the addresses collected. Note: Please read the help file in that it is a bit tricky inserting the name of a city in the program. First select a state and then go to options then search then add and then enter the name of the city or cities you want to search for email addresses in. NEWS SLEUTH - This software extracts email addresses from newsgroup postings by keyword. It targets. Very fast and easy to use. This software has a number of useful options to help you get the exact results you want so reading the help file is recommended. The demo will allow you to see how fast and easy it is to use but will not allow you to save or use the addresses collected. Cost of News Sleuth is $250.00 For a Demo of News Sleuth call 800-942-7913 Hurricane, Geo Snake & News Sleuth - all for $600.00 Call today!! or fax us at 732-367-2229 From billp at nmol.com Tue Mar 24 07:31:32 1998 From: billp at nmol.com (bill payne) Date: Tue, 24 Mar 1998 07:31:32 -0800 (PST) Subject: McKinney fax Message-ID: <3517CF2A.1880@nmol.com> Tuesday 3/24/98 7:14 AM Fax Cynthia McKinney 124 Cannon Building Washington, DC 20515 Office: (202)225-1605 Fax: (202)226-0691 http://www.house.gov/mckinney/ Dear Representative McKinney: PURPOSE of this fax is to verify whether or not you received our attached certified [Z 216 838 966] return receipt letter dated Thursday 3/12/98 7:34 AM with enclosures REASON is that the green Domestic Return Receipt card was returned to the Albuquerque Ed Dorado postal substation on Friday March 20 with no signatures or date of delivery. Postal employee Steve filled out a yellow tracer for item Z 216 838 966 and posted it. A federal employee in Washington DC following this matter on Internet at http://www.aci.net/kalliste and http://www.jya.com phoned on March 16 to advise that the US federal government strategy is to provoke a citizen in the hope the citizen will do something illegal. Then the government will prosecute that citizen. The attached petition for writ of prohibition dated Thursday 3/18/98 addressed to Antonin Scalia illustrates a desperate attempt to entrap us. NM district judge Don Svet attempted to limit discovery in our lawsuit seen at jya.com. Svet's ORDER violates the Federal Rules of Civil Procedure. Svet attempts to sanction us for violating his illegal ORDER. Bureaucrats, court clerks, and judges not who do not respond to lawfully submitted requests create the impression that there is no administrative or legal remedy left for a citizen in the US. Government lawyers frequently, if not most often, initiate a conflict with the citizen. The citizen is led to believe that he or she must employ a lawyer to have any hope to prevail with legal or administrative remedy. We believe that bureaucrats, court clerks and judges should follow the laws of the United States of America and properly perform their jobs. We ask your and other congress members' help to make bureaucrats, court clerks and judges do their jobs properly. First by getting copies of Tenth Circuit Court of Appeals docket sheets No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia to us. Sincerely, Arthur R. Morales William H. Payne 1023 Los Arboles NW 13015 Calle de Sandias NE Albuquerque, NM 87107 Albuquerque, NM 87111 Distribution Ben Nighthorse Campbell administrator at campbell.senate.gov Ernest Hollings senator at hollings.senate.gov Trent Lott senatorlott at lott.senate.gov Richard Shelby senator at shelby.senate.gov Charles Robb Senator_Robb at robb.senate.gov Jim Lehrer newshour at pbs.org Thursday 3/12/98 7:34 AM Certified - Return Receipt Requested Cynthia McKinney 124 Cannon Building Washington, DC 20515 Office: (202)225-1605 Fax: (202)226-0691 http://www.house.gov/mckinney/ Dear Representative McKinney: PURPOSE of this letter is to ask your help for us to obtain copes of docket sheets from the Tenth Circuit Court of Appeals for cases No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia. All of our legal efforts to obtain these documents, which any citizen has a right to, have failed. REASON you are selected to help is that you appear to be knowledgeable about operation of the current US federal government and willing to speak out in an attempt to solve problems. You appeared Friday February 27, 1998 on PBS, The NewsHour with Jim Lehrer, along with senators Campbell, Hollings, Lott, Shelby Robb and representatives Dana Rohrabacher and Harold Rogers. These senators and congressmen appeared not to support your views because they are either mis- or not well-informed about US involvement in support of Saddam Hussein. Stories supporting your view appear on Internet at NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe http://www.aci.net/kalliste/speccoll.htm and Crypto AG: The NSA's Trojan Whore? by Wayne Madsen http://caq.com/CAQ/caq63/caq63madsen.html Madsen begins It may be the greatest intelligence scam of the century: For decades, the US has routinely intercepted and deciphered top secret encrypted messages of 120 countries But NSA , and as a result the US federal government, apparnetly got caught involved in complicity of deaths of about 500,000 Iranians. This is the subject of a Federal lawsuit seen on Internet at http://jya.com/whpfiles.htm US federal government help of Iraq during the Iraq-Iran war may possibly backfire on innocent US citizens. The Wall Street Journal, March 10, 1998, pp. B1, B9. reports A Peek Inside a Giant Germ Warehouse By Rochelle Sharpe Rockville, Md. -- They keep anthrax bacteria in the basement of a faded red-brick building here. It isn't far from the yellow-fever virus, the botulism bacteria and some of the hundreds of organisms that cause the common cold. In fact, there are samples of 85,000 different fungi, viruses, cells, genes and bacteria here at the American Type Culture Collection, by far the largest of the 450 repositories of biological materials scattered around the globe. ... The ATCC legally shipped 10 vials of anthrax, botulism and other deadly substances to Iraqi scientists in the 1980s -- when the U.S. and Iraq were on much friendlier terms -- all with the Commerce Department's approval. ... http://www.jya.com/btn031198.txt The US federal government apparently intended these bioweapons to be used against the people of Iran. You demonstrated on PBS TV a quality identified by Francis Bacon The contemplation of things as they are, without error or confusion, without substitution or imposture, is in itself a nobler thing than a whole harvest of invention. by your statement about Saddam Hussein on PBS ...our man and our creation... Perhaps after reading the above materials and The Problem of Paradigm Shifts - Terrorism and the Threat From Weapons of Mass Destruction in the Middle East Working Draft Anthony H. Cordesman, Senior Fellow and Co-Director Middle East Studies Program October 22, 1996 http://www.csis.org/mideast/terror.html senators Campbell, Hollings, Lott, Shelby, Robb and representatives Dana Rohrabacher and Harold Rogers MAY NOW understand why you are correct and they are mis- or not well-informed about US involvement with Saddam Hussein. PROBLEM we face with the US court system is that court clerks and judges have committed Title 18 felony violation of law IN WRITING in an attempt to deny us monetary compensation due us for the cases WE WON at the Tenth Circuit on Appeal. But judges awarded victories to the US federal government in violation of Federal Rules of Appellate Procedure. Cases No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia were both won pro se on appeal. We have filed a writ of mandamus with supreme court judge Scalia in an attempt to get the docket sheets for the two above cases. But Scalia will not answer our certified letters. Senator McCain wrote Payne on December 23, 1997 I wanted to take this opportunity of than you for you letter of December 3, 1997. Your situation is in the jurisdiction of Senator Pete Dominici. Therefore, I have forwarded you letter to his attention. William, I hope you situation can be resolved favorably. Lawyers and politicians Dominici and Bingaman are part of a problem not a solution. Dominici and Bingaman have the following agenda University of New Mexico Bureau for Business and Economic Research reported on October 14, 1997: A The Gross State Product of New Mexico is $37.8 billion. B The US Federal government sends $11.3 billion to New Mexico each year. C For each $1 New Mexico sends to Washington, New Mexico gets $2 back. THEREFORE, Representative McKinney, we ask your help to get copies of the docket sheets. Citizens of the US are becoming more upset with the behavior of bureaucrats, the courts [lawyers], and the US federal government. Some Americans have no other way to express their dissatisfaction with US federal government mismanagement of our country except by violence. Frederick Douglass either wrote or said on August 4, 1847 Those who profess to favor freedom, and yet depreciate agitation are men who want crops without plowing up the ground. They want rain without thunder and lightening. Power concedes nothing without a demand. It never did, and it never will. Find out just what people will submit to and you have found out the exact amount of injustice and wrong which will be imposed upon them. These will continue until they are resisted with either words or blows, or with both. The limits of tyrants are prescribed by the endurance of those whom they oppress. We chose to use the words and law to hold government employees accountable. Please encourage Scalia to do his job. Help get us copies of the docket sheets. And even perhaps help investigate further and settle this American tragedy. Sincerely, Arthur R. Morales William H. Payne 1023 Los Arboles NW 13015 Calle de Sandias NE Albuquerque, NM 87107 Albuquerque, NM 87111 Enclosures 1 NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe 2 Crypto AG: The NSA's Trojan Whore? by Wayne Madsen 3 Swiss Radio International Audio tape, 15 May, 18 July 1994 Distribution Ben Nighthorse Campbell administrator at campbell.senate.gov Ernest Hollings senator at hollings.senate.gov Trent Lott senatorlott at lott.senate.gov Richard Shelby senator at shelby.senate.gov Charles Robb Senator_Robb at robb.senate.gov Jim Lehrer newshour at pbs.org From StanSquncr at aol.com Tue Mar 24 07:41:11 1998 From: StanSquncr at aol.com (StanSquncr) Date: Tue, 24 Mar 1998 07:41:11 -0800 (PST) Subject: Or is it Pat Robertson? Message-ID: <329a5276.3517d3ec@aol.com> In a message dated 98-03-24 06:43:54 EST, whgiii at invweb.net writes: << > Hmmm Louis Farakan school of Number Theory >> >Hmmm, didn't seem to bother you when the same theory was used against >Bill Gates! Not surprized, the response came from, you guessed it >cypher's, another paranoid "Know-nothing" - Yes Stan and you are here to "save" us all. >> And what planet are you on? I'm hear as the result of a big war I had with a moderator. << Twit. >> William seemed to accurately sign-off this time! :-) Stan From StanSquncr at aol.com Tue Mar 24 07:41:37 1998 From: StanSquncr at aol.com (StanSquncr) Date: Tue, 24 Mar 1998 07:41:37 -0800 (PST) Subject: Stan the Asshole Message-ID: In a message dated 98-03-24 09:06:28 EST, mixmaster at remail.obscura.com writes: << Stan is an asshole, an annoyance on this list. I've killfiled anything with his email address in any header. I suggest everyone do the same. When he gets no responses to anything he posts, he will eventually go away, probably to where "Liberals Go To Die." If you encourage him, I won't see your responses. I don't wade through the blizzard of this list to have to wipe splashes of airhead liberal shit out of my eyes at every other step. GodILoveFiltersMonger II >> Hey, I requested off this list ages ago. Why don't you simply pull my subscription and we'll ALL be happy? :-) Stan From StanSquncr at aol.com Tue Mar 24 08:21:19 1998 From: StanSquncr at aol.com (StanSquncr) Date: Tue, 24 Mar 1998 08:21:19 -0800 (PST) Subject: 'Virus Alert!' or 'Re:Stan the Savior?' Message-ID: <44e3dc96.3517dd54@aol.com> whgiii at invweb.net - << Yes Stan and you are here to "save" us all. >> If you look up in your definition of the word "save", maybe, EXCEPT, there's bound to be at least a couple of people on this list that don't need saving. ;-) But really, what I'm here to save, is your computers - ======== Subj: What if - God and SuperMan got into a fight - no, I found this on a Rush newsgroup - ----------------------------- Subject: If Rush was a computer virus... From: lotus at hogpe.ho.att.com (-R.CAPIK) Date: 21 Mar 1996 17:16:10 GMT What if there was a Rush Limbaugh computer virus. What might it do? What about some other political figures... ? Ron Capik [aka: the NJ Editorial Minstrel ] ----------- Forbes virus: Makes all your programs give 17% of their resources back to your system. We have no idea what the system will do with the resources. (Only applies to earned resources.) At a cost of millions (in un-earned resources), the virus runs for a short time then quits. Buchanan virus: All your icons move to the far right of your screen. Bill Clinton virus: Your pointer jumps back and forth across the middle of the screen, seems to drift to the left and you can't seem to pick any programs. If you have a sound card you may hear the sound of rushing [white] water. Limbaugh virus [aka: ditto virus]: All icons line up under the Rush icon where ever it may go. Bill Clinton #2 Icons turn purple and explode. (May be triggered by conservative input) Dole virus: We don't quite know what it may do, but it seems to have been in the system for a very long time. May cause system to enter sleep cycle. Perot virus: Ran for a short time in 92 then quit. It may also be active for a short time in 96. May cause space alien problems with daughter programs. Hillary virus: Causes text to appear on your screen years after you lost it. May trigger "Bill Clinton #2" virus. May also cause rushing [white] water sound. ---------- What if, Stan had written those virus descriptions? - Buchanan virus [aka - "Sap" (of the 'Family (Values) Tree')]: All your icons move to the far right of your screen, and then, any icon that depicts a face gets covered up by a white coned shape hat (and sheets, if the icon is of a whole person). The rest of the icons turn into pitch-forks, and swastikas. The (now) covered 'people' icons then grab the 'pitch-fork' icons, and run off the *extreme* right side of the screen. The swastikas remain on your screen, and cannot be removed, for they are burned into the phosphor. Your computer then logs on to America OnLine, goes to the 'government' forum, and then the (now) covered 'people' icons return (in groups), with the 'pitch-fork' icons, to the screen, and start attacking America (OnLine), starting with the 'government' (forum). The instant the Buchanan virus infects your computer, it attempts to kill all forms of the 'Jerusalem' virus (but it never gets them all). Limbaugh virus [aka - "Whiner"]: All icons line up under the Rush icon wherever it may go. As soon as 'Limbaugh' infects your computer, it (along with any other virus that will join it) attempts to kill the 'Clinton' virus, and the 'Hillary' virus (but doesn't succeed, only weakens them temporarally, then they become much stronger, and impossible to remove for another '4 More Years!'). Then it starts attacking any other viruses 'Limbaugh' thinks is vulnurable, including the viruses that had joined it in attacking the 'Clinton' viruses. The only viruses that the 'Limbaugh' virus has been know to truly rid your system of, though, is the 'Limbaugh' virus, and the virus' that believe that the 'Limbaugh' virus is a 'truth detector' type virus, or that the 'Limbaugh' virus is on 'loan from god', etc. The 'Limbaugh' virus self-destructs after 7 or 8 years (and it can't understand why). Gingrich [aka - "KingRich" (King of the Rich)]: This virus affects applications that have an ability to recreate previous commands given to that application while editing a document of that application, using a 'history' or 'undo' command. 'KingRich' attaches itself to the 'history' files, and selectivly changes certain portions in it. So if you make a mistake, and you need to go back and recreate your file before your mistake, you can still go back, but you'll probably find the icons that represent your best work that you had placed on the left side of your screen, now on the right of it, and those icons that open your worst work, and previously placed on the right, you'll now find that on the left. Gingrich #2 [aka - "CryBaby"]: This virus goes to the back of your pci, vesa,16bit, or 8bit bus, and makes your hard drive make a real loud 'whining' noise and your soundcard starts making a 'crying' sound through your audio setup or speakers. On your screen, 'CryBaby' places the message "I'm going to shut the system down because I had to go to the back of the bus!", and it causes your computer to go into 'default' (meaning, it causes you to lose your CMOS memory, and it restarts with power-on 'defaults'). And we now know what the Dole virus will do - Dole virus [aka - "Quitter"]: This virus attacks your hard drive, causing it to make a real loud 'whining' noise. Then it quits, and you never have to worry about it again. To learn how to detect and remove these viruses from YOUR system, register at - What's A Meta U (and What's It 2 U?) http://members.aol.com/WhatsMetaU ===== Stan From StanSquncr at aol.com Tue Mar 24 08:23:34 1998 From: StanSquncr at aol.com (StanSquncr) Date: Tue, 24 Mar 1998 08:23:34 -0800 (PST) Subject: McKinney fax Message-ID: <80685716.3517dd42@aol.com> In a message dated 98-03-24 11:02:35 EST, billp at nmol.com (of the cypherpunks) writes: << We believe that bureaucrats, court clerks and judges should follow the laws of the United States of America and properly perform their jobs. >> We (if I speak for others on the cypherpunks list, that is (I'm a guest)) believe that the laws Bill is talking about, is the "Constitution of the United States of America/Bill of Rights" For instance, Article VI part 3 - "3 The Senators and Representatives before mentioned, and the members of the several State Legislatures, and all executive and judicial officers, both of the United States and of the several States, shall be bound by oath or affirmation, to support this Constitution; but no religious test shall ever be required as a qualification to any office or public trust under the United States." " ... but no religious test shall ever be required as a qualification to any office or public trust under the United States." And, to the pbs newshour, we (with same exclusion as above) believe that YOU need to get a true voice from the left for your panels. Sheilds only speaks from a left POV 'some of the time' (and it ain't enough of the time.) And to Senator Lott - 'Have a happy father's day!' (President Clinton) Stan Rosenthal, FreeGroup - "Just Say It!" http://members.aol.com/WhatsMetaU/freegroup.html From mixmaster at remail.obscura.com Tue Mar 24 10:43:26 1998 From: mixmaster at remail.obscura.com (Mix) Date: Tue, 24 Mar 1998 10:43:26 -0800 (PST) Subject: No Subject Message-ID: <199803241834.KAA21637@sirius.infonex.com> >Hey, I requested off this list ages ago. >Why don't you simply pull my >subscription and we'll ALL be happy? :-) >Stan Because we are all laughing at you, you stupid bastard. From mixmaster at remail.obscura.com Tue Mar 24 12:23:52 1998 From: mixmaster at remail.obscura.com (Mix) Date: Tue, 24 Mar 1998 12:23:52 -0800 (PST) Subject: No Subject Message-ID: <199803241852.KAA23337@sirius.infonex.com> ...and then there is the "StanSquncr" virus that prompts you to pawn your computer for a $20 crackrock. Two hours later, you find yourself on a street corner sucking dick for $5 rocks. I'm your REAL daddy, Stan. From nobody at privacy.nb.ca Tue Mar 24 14:00:17 1998 From: nobody at privacy.nb.ca (Anonymous Sender) Date: Tue, 24 Mar 1998 14:00:17 -0800 (PST) Subject: Chaffing and Winnowing Message-ID: Aside from the considerable overhead created by C/W, I observe a possible pitfall. suppose I start every new message at ID# 0. The first time I C/W a message everything works fine. The next time I C/W a message with the same MAC, I give some very juciy clues to what both messages were. This is because the item that the MAC applied to was an ID number and a bit. well, that bit is either zero or one... so any bit that corresponds between my first and second message will yield an identicle MAC, thus making it easy for anybody to seperate some of the wheat from the chaff, merely by simple observation. though in a real implementation, I probably wouldn't be so niave as to start every new message with the same packet ID, I point out that there's an upper limit on the amount of data that should be transmitted before a new authentication key should be arranged... that is assuming that the ID field was of finite size. Rivest mentioned in passing using a 32 bit ID. That's an impressive number of bits to C/W, but certainly not unattainable. -SM2k From tm at dev.null Tue Mar 24 15:21:57 1998 From: tm at dev.null (TruthMongrel) Date: Tue, 24 Mar 1998 15:21:57 -0800 (PST) Subject: Your courageous stance... Message-ID: <35184081.7CF5@dev.null> I would like to congratulate and thank you for the courageous stance that you have taken by doing your part to help stop the spread of anarchistic and possibly illegal content on the InterNet by denying access to those who use the freedom and rights granted them by the Constitution to abuse those privileges. Your stance is particularly admired by those of us who share your interest in preventing the spread of free access to all types of information, in light of the fact that you have not shied away from persecuting those connected with the Circle of Eunuchs, thus possibly putting yourself, your family and your business in physical danger, as well as virtual danger. Given the current dissension within the ranks of the Cirle of Eunuchs and the Army of Dog, concerning whether their assault on censorship and censors should be consumated in CyberSpace or MeatSpace, there are few who are willing to put themselves in the line of fire to support the same ideals that other great Americans, such as Senator Joe McCarthy and J. Edgar Hoover, have championed. Regardless of the possible physical danger you will be subjected to if the proponents of MeatSpace retruibution to censorship supporters win out in the current battle for control of the resources of the Army of Dog, your choice to submit to government oppressors and legal threats is likely the right one, since the government currently has more and better armed thugs than those who oppose them. TruthMonger III "Ain't no safety this side of the grave...never has been...never will be." From StanSquncr at aol.com Tue Mar 24 15:40:17 1998 From: StanSquncr at aol.com (StanSquncr) Date: Tue, 24 Mar 1998 15:40:17 -0800 (PST) Subject: Stan the Human! Message-ID: In a message dated 98-03-24 16:09:52 EST, mixmaster at remail.obscura.com writes: << >Hey, I requested off this list ages ago. >Why don't you simply pull my >subscription and we'll ALL be happy? :-) >Stan Because we are all laughing at you, you really smart guy. >> Hey, I got my laughs too! Stan From tm at dev.null Tue Mar 24 16:22:06 1998 From: tm at dev.null (Timothy C. May) Date: Tue, 24 Mar 1998 16:22:06 -0800 (PST) Subject: Kill 'em all...*I'll* sort 'em out... Message-ID: <35184DF7.2497@dev.null> ----- Forward from TruthMonger III ----- I would like to congratulate and thank you for the courageous stance that you have taken by doing your part to help stop the spread of anarchistic and possibly illegal content on the InterNet by denying access to those who use the freedom and rights granted them by the Constitution to abuse those privileges. Your stance is particularly admired by those of us who share your interest in preventing the spread of free access to all types of information, in light of the fact that you have not shied away from persecuting those connected with the Circle of Eunuchs, thus possibly putting yourself, your family and your business in physical danger, as well as virtual danger. Given the current dissension within the ranks of the Cirle of Eunuchs and the Army of Dog, concerning whether their assault on censorship and censors should be consumated in CyberSpace or MeatSpace, there are few who are willing to put themselves in the line of fire to support the same ideals that other great Americans, such as Senator Joe McCarthy and J. Edgar Hoover, have championed. Regardless of the possible physical danger you will be subjected to if the proponents of MeatSpace retruibution to censorship supporters win out in the current battle for control of the resources of the Army of Dog, your choice to submit to government oppressors and legal threats is likely the right one, since the government currently has more and better armed thugs than those who oppose them. TruthMonger III "Ain't no safety this side of the grave...never has been...never will be." ---- End of Alleged Forwarded Message ----- Despite the fact that the missive you are currently reading is an obvious forgery, I, Timothy C. May , would like to exhort all of my fellow victims of forgeries by the DogMeister at Sympatico to form their own Cult of One chapter of the Army of Dog. Unless each and every individual who is concerned with gaining the liberty to exercise the basic rights and freedoms which come from being a unique participant in the universe which has formed them (and which they have had a hand in forming) steps forward to demand the right to exercise and manifest their values and beliefs in MeatSpace, as well as CyberSpace...uuhhh...has anybody seen my shoes? "We have met the future of rEvolution, and it is us." ~ Ogop Due to the heavy investment I have made in MeatSpace weaponry, I will be supporting the factions of the Army of Dog which are promoting a physical war against the enemies of freedom, but I recognize that those whose investment is in newer warfare technologies have an equal right to fight the battle within the slightly more infinite boundaries of Digital Reality. "The screens of freedom must occassionally be refreshed with a GUI- supported blood-color of digital martyrs." ~ AGuyTooLazyToLookUpTheOriginalQuote Despite the concerns of some members of the Cypherpunks Distributed Mailing List about the forged attributions of the DogMeister concerning the beliefs and stances of various individual list members, we all know, deep down inside, that Janet Reno's secret lover, Officer Furhman, is right when he whispers in her ear during their fuckmaking (in a manner that is a felony in the majority of states, which is why they only do it in Federal offices), "The CypherPunks may not be guilty of the crimes that TruthMongrel attributes to them, but they are all guilty of *something*..." Timothy C. May "There is something 'Wong' when I have to send 'chop, chop' messages to an increasing number of posters to the Cypherpunks list." From StanSquncr at aol.com Tue Mar 24 16:59:27 1998 From: StanSquncr at aol.com (StanSquncr) Date: Tue, 24 Mar 1998 16:59:27 -0800 (PST) Subject: Kill 'em all...*I'll* sort 'em out... Message-ID: In a message dated 98-03-24 19:48:49 EST, tm at dev.null writes: << ----- Forward from TruthMonger III ----- I would like to congratulate and thank you for the courageous stance that you have taken by doing your part to help stop the spread of anarchistic and possibly illegal content on the InterNet by denying access to those who use the freedom and rights granted them by the Constitution to abuse those privileges. Your stance is particularly admired by those of us who share your interest in preventing the spread of free access to all types of information concerning whether their assault on censorship and censors should be consumated in CyberSpace or MeatSpace, there are few who are willing to put themselves in the line of fire to support the same ideals that other great Americans, such as Senator Joe McCarthy and J. Edgar Hoover, have championed. >> Ah yes, fits like a lock and a key. Pro-censorship guys also being pro McCarthy guys! After all, these "Know-nothings" today, are the 'Modern McCarthyites' (see my political page) Stan From tm at dev.null Tue Mar 24 17:21:28 1998 From: tm at dev.null (TruthMongrer) Date: Tue, 24 Mar 1998 17:21:28 -0800 (PST) Subject: CIA Trained Gorilla Femnists Message-ID: <35185C90.418F@dev.null> Male Gorilla, Released to Mate with Females, Drops Dead AP 24-MAR-98 TOKYO (AP) The excitement, or perhaps the pressure, apparently was too much for Sultan. The 28-year-old male gorilla, specially moved to a cage to mate with three females, instead dropped dead. The 400-pound lowland gorilla ran around briefly and played with his new friends Monday, then suddenly collapsed, apparently after suffering a heart attack, said Kunihiko Yasui, head of animal breeding at Kyoto Municipal Zoo. ~~~ Reports from non-mainstream news sources indicate that one of the female gorillas was carrying an umbrella which was nowhere to be found when invesigators searched the cage after the mysterious death of the male gorilla. Gertrude Stein, denying that an elite corps of techno-femnists is involved with providing CIA BlackOps training for female subjects of a digital-implant experiment being conducted by the NSA, merely said, "What is good for the goose is not always necessarily good for the gorilla." Anonymous sources from the CypherPunks Distributed Mailing List indicated that the assassination was coordinated by Blanc Weber, a list member who disguises her hidden agenda of MeatSpace violence by constantly admonishing list members for expressing the results of the excessive male hormones surging through their potential-rapist bodies. The sources cited Weber's previous support of Zsa-Zsa Grubor as proof of her involvement with radical femnist movements whose goals are secretly financed by Wonder Bra, Wonder Woman, and Wonder Bread. Mainstream media sources continue to claim that this post is nothing more than the psychotic babblings of a FrostBack To Be Named Later. However, this view is obvious in error, or an intelligent person such as yourself would not stil be reading this post, eh? TruthFemnist, "And, after my operation, I will learn to spell 'feminist' correctly." From StanSquncr at aol.com Tue Mar 24 17:48:08 1998 From: StanSquncr at aol.com (StanSquncr) Date: Tue, 24 Mar 1998 17:48:08 -0800 (PST) Subject: Welcome to cypherpunks-unedited Message-ID: <44e512a9.35186235@aol.com> In a message dated 98-03-24 19:18:48 EST, Majordomo at toad.com writes: << Cypherpunks assume privacy is a good thing and wish there were more of it. Cypherpunks acknowledge that those who want privacy must create it for themselves and not expect governments, corporations, or other large, faceless organizations to grant them privacy out of beneficence. Cypherpunks know that people have been creating their own privacy for centuries with whispers, envelopes, closed doors, and couriers. Cypherpunks do not seek to prevent other people from speaking about their experiences or their opinions. >> I agree with all that. << ... Cypherpunks love to practice. They love to play with public key cryptography. ... >> But when it's used as simply a means of identifying yourself on a public list, is that really privacy protection? Seems like a mis-use of the technology to me. Stan From nobody at REPLAY.COM Tue Mar 24 17:54:32 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 24 Mar 1998 17:54:32 -0800 (PST) Subject: While you were bending over for the soap... / Re: Kill 'em all...*I'll* sort 'em out... Message-ID: <199803250154.CAA12695@basement.replay.com> TM forged: > within the slightly more infinite boundaries of ATTN: Circle of Eunuchs Initiates !!! An in-depth investigation by the NSA has confirmed, beyond a shadow of a doubt, that the dark-conspiracy manifestos that make up 'The True Story of the InterNet' series, as well as all peripheral communications from various CoE members, has been nothing more than a clever ruse to subversively slip the concept quoted above into the minds of the unsuspecting schills of the Author. Please be advised that individuals who allow themselves to be influenced by the subversive concept expressed above run the risk of mistakenly acting under the assumption that 'infinity' can be defined by the individual, and thus they are capable of escaping the limitations which the programmed reality of those in authority over them exercises in order to protect them from the madness which can result from attempting to cross the boundaries of thought and action which have long since been proven statistically safe to transverse, according to recent CNN polls designed to ensure that we all remain safely within the pens within which airport security personnel and tax officials are acting in our best interests. Those who disagree with the stance taken by the author of this post will be audited by the IRS as potential troublemakers. Thank You, the author of this post From toto at sk.sympatico.ca Tue Mar 24 19:08:24 1998 From: toto at sk.sympatico.ca (Toto) Date: Tue, 24 Mar 1998 19:08:24 -0800 (PST) Subject: Expert Testimony [ATTN: Donald C. Randolph, Esq.] Message-ID: <3518739A.1700@sk.sympatico.ca> Re: >Kevin >Mitnick is seeking a highly credentialed expert in computer security, >telecommunications, system and network administration to testify Mr. Mitnick & Mr. Randolph, If you desire, I can put you in contact with an individual who has not only been described as 'The World's Foremost Computer Expert' in a variety of computer manuscripts and journals dating as far back as 1989, but who would also be willing to testify as to his personal involvement in the ethical violation of a plethora of MeatSpace laws in the last few decades during his activities in CyberSpace. I am speaking of C.J. Parker. >Qualified candidates must have an advanced degree and be knowledgeable > in DOS, Windows 3.ll, Unix (SunOs & Solaris), VAX/VMS, and Internet >operations. Experience with cellular telephone networks is a plus. Mr. Parker holds an MBA which was obtained through an accelerated degree program known as 'hacking,' and can provide transcripts to verify his being awarded several 'honors' awards by a recognized institution of higher education. He has been involved in top levels of the business and educational arenas of the computer industry for the better part of a decade, and has not only worked with all variety of operating systems and programs, but also has access to a variety of individuals whose knowledge and expertise encompasses a range of the industry which is nothing short of phenomenal. Mr. Parker is a co-author of a variety of manuscripts concerning computer and digital communications issues which were only recognized as significant years or decades after his treatment of them. The fact that Mr. Parker is certifiably insane in no way dimishes the accomplishments that he has succeeded in bringing to fruitation as the president of an international computer company, and as an outlaw who was spitting in the face of authority since Mr. Mitnick was wetnursing. If you are interested in providing your client with a defense which will be recognized as sane and competent, then you would be well advised to ignore my offer. If you wish for your client to successfully resist the efforts of the government to make him a scapegoat for the deficiencies of the InterNet entities whose resources he shared based upon his own values and beliefs, then you would be well advised to further explore my offer. In short, Mr. Parker is not currently facing charges for the same activities that have been committed by your client. Think about it. ~~~~ Toto ~~~~ "The Xenix Chainsaw Massacre" http://bureau42.base.org/public/xenix "WebWorld & the Mythical Circle of Eunuchs" http://bureau42.base.org/public/webworld "InfoWar" http://bureau42.base.org/public/infowar3 "The Final Frontier" http://www3.sk.sympatico.ca/carljohn From m.d.allen at csu-e.csuohio.edu Tue Mar 24 19:09:46 1998 From: m.d.allen at csu-e.csuohio.edu (Name) Date: Tue, 24 Mar 1998 19:09:46 -0800 (PST) Subject: Crypto, anyone? Message-ID: <01BD583A.44BE1FA0.m.d.allen@popmail.csuohio.edu> i need off this mailing list now On Sunday, March 22, 1998 1:40 AM, Anonymous [SMTP:nobody at replay.com] wrote: > andrew fabbro wrote: > > > > I was just wondering if anyone would be interested in discussing > > cryptography, personal privacy, security protocols, digital signatures, > > anonymous remailers, digital cash, crypto anarchy...? No? OK, then we > > can go back to spam, Microsoft bashing, calling each other "idiots" and > > "chickens," and forwarding News of the Weird for no obvious reason. > > What the fuck is crypto? Can you *say* that on a public mailing > list? > Isn't child cryptography illegal? > Isn't sharing pubic keys a form of perversion? > Is digital cash used to buy a blow-job? > > "How can you tell when Windows is about to crash?" > "It boots." > > From toto at sk.sympatico.ca Tue Mar 24 19:29:08 1998 From: toto at sk.sympatico.ca (Toto) Date: Tue, 24 Mar 1998 19:29:08 -0800 (PST) Subject: Is That A Balck Helicopter Up There? In-Reply-To: <199803250236.VAA05942@mx02.together.net> Message-ID: <35187AA6.3AC4@sk.sympatico.ca> Brian B. Riley, who snuck into the WhiteHouse, put on a Bill Clinton halloween mask, and raped Mona Lewinski, wrote: I honestly don't know if I would be too paranoid to say that the government is behind all these happenings, I really don't like the territory that takes us to; but they most surely are quick to exploit them for the own agenda ... it seems now that every untoward incident that happens is hopped upon by some goverment official or goverment schill as an excuse to shorten the leash ... ~~~ Brian, The power of your posts resides in the fact that you do not beat the drum for a totally paranoid view of reality, yet you allow room for that view, just the same. To claim that the children who recently killed a number of their fellow students during a false fire-drill were encouraged by the government in order to draw attention away from the '48 Hours' show on government involvement in the murder of Dr. Martin Luther King would be a stretch. On the other hand, the issues being debated by the '48 Hours' special would have been considered a stretch at the time of the event, despite the fact that they are well supported by information that has been wrested from the grip of secrecy in the time since then. The bottom line is that we currently live in a society whose view of reality has been formed/programmed by the media/medium of TV. "Watch me and I'll bleed you, 'cause you eat the shit I feed you. ~ Frank Zappa & the Mothers of Invention The danger of the Sheeple being misled by false conspiracy theories propogated by the Fringe Media (TM) is small compared to the danger that they will continue to be misled by the Reality (TM) being spammed deep within the programming centers of thier minds by a mainstream media which feeds at the same trough as FBI snipers and Marine units whose motto seems to be "My country, wrong or wrong..." My career as a would-be shit-disturber and troublemaker pales in comparison with the inevitable leakage that occurs around the edges of the Official World View (TM) propagated by those who employ the gatekeepers of the Media Feeding Pen and the Dogs Of Whore whose teeth ensure that the Sheeple will not stray from their appointed destiny. Toto From nobody at REPLAY.COM Tue Mar 24 19:37:25 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 24 Mar 1998 19:37:25 -0800 (PST) Subject: i need off Message-ID: <199803250337.EAA25556@basement.replay.com> Name wrote: > > how the hell do i get off this mailing list??? Kill the president. Wm. Clinton From jya at pipeline.com Tue Mar 24 20:04:53 1998 From: jya at pipeline.com (John Young) Date: Tue, 24 Mar 1998 20:04:53 -0800 (PST) Subject: EMI and TWA 800 Message-ID: <199803250404.XAA02816@camel14.mindspring.com> The April 9 New York Review of Books has published a long special supplement, "The Fall of TWA 800: The Possibility of Electromagnetic Interference," by Elaine Scarry, a noted author and Harvard professor: http://jya.com/twa800-emi.htm (128K with 3 images) The article closely examines the possibility of electromagnetic interference in TWA 800's controls, comm, and black boxes by activities of the ten US military planes and ships in the vicinity which were heavily equipped for electronic warfare and were conducting tests of the gear. It is reports on what is publically known about the EM armaments of planes and ships in the vicinity, about secret EM weapons and defenses, the several dozen military and commercial planes that have crashed due to EMI, military studies of long-standing EM hazards which will not be released to crash investigators, current research in EMI and what scientists in the field think about the possibility of EMI causing the fall of TWA 800. It calls for the military to release its classified EMI research to NTSB investigators, and short of that, for the servicemen and women on the planes and ships at the scene to tell what they know. It asks Congress to order military cooperation. Not at all inflammatory or accusatory, it is thoroughly researched (over 100 notes and citations) and highly informative on the hazards of EMI, and worthy of ciritque by learned scientists in the field here. Coda: Ron Brown's crash is not mentioned but its characteristics fit several other EMI accidents for which the military will not release findings, claiming that national security EM weapons secrets would be jeopardized. From toto at sk.sympatico.ca Tue Mar 24 20:58:20 1998 From: toto at sk.sympatico.ca (Toto) Date: Tue, 24 Mar 1998 20:58:20 -0800 (PST) Subject: Playboy Channel Implicated In Arkansas School Massacre! Message-ID: <35188F7B.54BD@sk.sympatico.ca> The governor of Arkans(redneck)as(sholes) has stepped forward to lay responsibility for the latest school massacre tragedy squarely on the shoulders of those elements of the entertainment media who have not thus far been implicated in the political shennanigans and illegal drug deals perpretrated by the former governor of Arkansas, who is currenly dipping his dick in those entering the Whitehouse through the 'Ladies Only' entrance. It seems that responibility for the massacre lies in the current social acceptance of the licentious violence being spammed upon the public by the immoral profitmongers of the entertainment industry. This is in marked contrast to the current social acceptance of the licentious violence being spammed upon the public by the moral profitmongers of the Biblically-based religion industry. It is obvious that new laws will have to be passed to protect the children exposed to the sex and violence contained in the Christian Bible from being further influenced by corresponding material in the secular sector of society. SpermMonger "Spilling my seed on the ground since puberty." From nobody at REPLAY.COM Tue Mar 24 21:02:43 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 24 Mar 1998 21:02:43 -0800 (PST) Subject: Crypto, anyone? Message-ID: <199803250502.GAA04800@basement.replay.com> Name wrote: > > i need off this mailing list now Don't we all... From bnn at dev.null Tue Mar 24 21:25:10 1998 From: bnn at dev.null (Bienfait Nutly News) Date: Tue, 24 Mar 1998 21:25:10 -0800 (PST) Subject: The Arkansas Chainsaw Massacre Message-ID: <351895E1.2130@dev.null> [Bienfait, Saskatchewan] AT A LATE-NIGHT CELEBRATION AT THE COALDUST Saloon, members of the MeatSpace Revolutionary Arm of the Army of Dog congratulated one another on the success of 'Operation FireDrill.' Although their efforts to promote their violent interpretation of 'The True Story of the InterNet' manuscripts was somewhat dampened by the fact that their young pawns did not have the strength to pull-start the excessively large Stihl chainsaws they were provided, and had to resort to conventional arms, the mission was still seen as a success. Defcon McCullagh Chainsaw, a violent terrorist who has managed to infiltrate the mainstream media as a respected correspondent, said, "The twisted spin that the citizens of this Bible-(spare the)Belt(spoil the child) community will put on this tragedy will no doubt increase the Sheeple's call for stronger censorship and repression of expression, which will not only provide me with more material for my ineffective columns pissing in the wind generated by the Moral Majority, but will also hasten the MeatSpace rEvolution that will arise in response to the unconstitutional limits which the government will impose on the citizens under cover of the associated propaganda spewn out by their pawns in the mainstream media." A spokesperson for Pat Buchanan, dodging questions regarding the rumors that the Moral Majority was snookered by the Army of Violent Dogs into financing the operation, said, "I have no comment, except to note that tomorrow I will release a statement clarifying what I would have 'meant to say' during this press conference, if I had, in fact, said anything beyond, 'No comment.'" In a private conversation with this reportwhore, God, on the condition that he not be quoted, said, "Dog works in mysterious ways." From gwb at gwb.com.au Tue Mar 24 22:44:12 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Tue, 24 Mar 1998 22:44:12 -0800 (PST) Subject: Pauline Hanson's Newsletter - March 1998 Message-ID: <1.5.4.32.19980325063945.00a9f238@mail.pronet.net.au> March 1998 Issue 1.8, March 1998 ---------------------------------------------------------------------------- PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the mailing list please say "REMOVE" in the subject line and return this message in the body. ---------------------------------------------------------------------------- Dear One Nation Supporter in NSW, -------- Have you got your tickets for One Nation first birthday raffle yet? The first prize is a QANTAS Global Explorer Holiday for two valued at $12,000 - a 23 day trip visiting Paris, London, New York, Los Angeles, Anaheim and Honolulu. The second prize is a 7 day holiday to Hawaii at the Outrigger Reef Hotel for two - value $5,000. The third prize is a 7nights stay at the Novotel Palm Cove at Cairns - value $3,000. You can order a book of 5 tickets (minimum) at $10 per book (or $2 per ticket) by credit card by phoning 1800 620088. Winner's names being drawn at One Nation's Birthday Party at 7pm on April 11th 1998. Winners will be notified by phone and mail with the results being published in the Sydney Morning Herald on Friday 17th April 1998. Be quick - order now while tickets remain! --------- Pauline Hanson endorsed 12 new Queensland state candidates for the upcoming elections last week. One Nation now has over 40 candidates and expects to have candidates in most of the 85 seats by the time the Qld state election is called. Web pages: Pauline Hanson endorsing the candidates at Beenleigh: http://www.gwb.com.au/onenation/qldstate/been One Nation Queensland State Election web site: http://www.gwb.com.au/onenation/qldstate --------- The issue of the MAI (the multinational's multilateral agreement on investment) continues to create concern. For the most comprehensive set of Australian related links on the MAI visit: http://www.gwb.com.au/mai.html ---------- We hope to have the One Nation Federal Web Site up within the next few weeks - in the meantime bookmark and visit this URL: http://www.gwb.com.au/gwb/news/history we will be covering Pauline Hanson's One Nation birthday party on her farm live over the Easter weekend of April 10-12. Updates on this URL. It is still not too late to make a booking - but be quick. Look forward to seeing you there! Phone: (02) 9976 0283 ---------- GWB Scott Balson From pbgau at dev.null Tue Mar 24 22:53:19 1998 From: pbgau at dev.null (Potential Bill Gates Assassins Union (Local 709)) Date: Tue, 24 Mar 1998 22:53:19 -0800 (PST) Subject: Prologue 13/0 -- SPACE ALIENS HIDE MY DRUGS! Message-ID: <3518AA73.4569@dev.null> TruthMonger Sells Out: Subject: I Concede... To: BadBillyG From: TruthMonger Yo Willy, You finally whupped me... After years of plotting your death in a slow, excruciating manner, time and circumstances have finally forced me to offer to compromise my formerly unbending position regarding your continued physical existence. In my own defence, I must state that I probably could have held out indefinitely in my crusade to force you to pay for the tremendous amount of suffering that resulted from your successfully making DOS a worldwide computer standard, despite the fact that children in basements around the nation were producing vastly superior products, such as 4DOS and AstroTit, had it not been for the fact that even greater evil forces in the world aligned themselves against you, behind ugly-as-sin schills such as Janet Reno, as opposed to sweethearts such as Blanc Weber, who is your staunchest defender, despite the fact that she is carrying Attila T. Hun's baby. The beginning of my downfall as a 'command-line kind of guy' was when I was forced to trade in my XT with a 20M hard drive and 2M of RAM because of the requirement of the only ISP available to me that I be able to run Windoze. Up until then, I had been able to successfully hide my secret life as a huge fan of M$ Word. After purchasing Win95, however, and not having the character to deny myself indulging in the downloading of a free copy of InterNet Assistant, my anti-M$ resolve deteriorated rapidly, until I finally got fed up with Nut$crape's inability to provide me with the instant gratification of my desire to have the latest in software technology, despite the fact that it was a result of your devious and predatorial business practices which made it so. As a result, I finally quit kidding myself about my ability to resist joining the herd of Sheeple racing madly over the M$ cliff, and I downloaded and installed M$ Exploiter. In recognition of the fact that I am now committed to a life of addiction to the M$ updates being offered by shadowy characters on dimly-lit street corners, I am willing to offer you a compromise on my previous demands that you wipe that cute, shit-eating grin off of your face so that I can assassinate you with a clear conscience. To be honest, my current predicament is that, after purchasing a variety of M$ products, I currently find myself unable to reinstall any of them if my system goes to shit, which it often does as a result of my being a sorry, drunken, drug addict without a lick of common sense. Although I own 3 1/2" floppy disks purchased in the late 1980's, and which still work perfectly fine, the disks which I have acquired recently, containing the M$ products I own, have all gone to shit, because America has sunk to the point where they not only cannot make a decent car, anymore, but they also cannot make a decent floppy disk. Accordingly, I am willing to reduce my demands for your physical extermination to a demand that you allow me to cut off three fingers on your left hand, on the following conditions: 1. You provide me with CD-ROMS for Win95, M$ Word for Win95, Windows 3.11, and a copy of AstroTit, a program writen by some sorry loser in Sedona, Arizona, and which I lost because DOS 4.0 made me so fucking crazy that I threw my computer through a window in forty-below-zero weather. 2. You not tell the CypherPunks about this offer, since all of my somewhat deficient reputation capital rests upon my long-winded diatribes against M$, as a result of my not having any appreciable computer skills. 3. That Blanc Weber provide me with a notarized document signed by a reputable physician stating that s/he has examined her, and revealing whether or not she is wearing panties. 4. You recall the team of hired assassins who are currently training their cross-hairs on my toilet, through the bathroom window. (I need to take a helluva piss, and the kitchen sink is backed-up.) 5. Some other conditions which I can't remember because I am running low on my medications, but I will hold you to those conditions, regardless. 6. You throw your support behind legislation aimed at eliminating discrimination based on species. (My dog, Baby, asked me to include this condition. She promised to quit hogging the 'good pillow' if you would agree to this.) Looking forward to your reply, Toto "It's not a DEATH THREAT!!! until *I* say it's a DEATH THREAT!!!" From StanSquncr at aol.com Wed Mar 25 00:14:49 1998 From: StanSquncr at aol.com (StanSquncr) Date: Wed, 25 Mar 1998 00:14:49 -0800 (PST) Subject: Or is it Pat Robertson? Message-ID: <484377db.3518bcc7@aol.com> Nobody - "Get back to us when you pull your head out of your ass and learn how to properly quote in replies." How about now? :-) Or am have I been unsubscribed again by some imposter? ;-) Stan From dave at bureau42.ml.org Wed Mar 25 00:57:24 1998 From: dave at bureau42.ml.org (David E. Smith) Date: Wed, 25 Mar 1998 00:57:24 -0800 (PST) Subject: Prologue 13/0 -- SPACE ALIENS HIDE MY DRUGS! In-Reply-To: <3518AA73.4569@dev.null> Message-ID: On Wed, 25 Mar 1998, Potential Bill Gates Assassins Union (Local 709) wrote: > The beginning of my downfall as a 'command-line kind of guy' was > when I was forced to trade in my XT with a 20M hard drive and 2M of > RAM because of the requirement of the only ISP available to me > that I be able to run Windoze. Then your ISP sucks rocks. My ISP officially claims that Windows is required, but they lie. Several customers run Linux, a few use FreeBSD, and at least one runs plain old DOS 6.22. dave "mmm.... sockets" From mixmaster at remail.obscura.com Wed Mar 25 06:39:22 1998 From: mixmaster at remail.obscura.com (Mixmaster) Date: Wed, 25 Mar 1998 06:39:22 -0800 (PST) Subject: Crypto, anyone? Message-ID: <199803251435.GAA29995@sirius.infonex.com> Name wrote: > i need off this mailing list now No one can take you off this list. We don't know or care how you got onto this list. This is an intelligence test. Until you can prove that you are not a clueless fuckwit by disappearing, we will continue to laugh at your sorry whines. Life's a bitch. Deal with it. From ualdv8 at sk.sympatico.ca Wed Mar 25 09:25:48 1998 From: ualdv8 at sk.sympatico.ca (Six) Date: Wed, 25 Mar 1998 09:25:48 -0800 (PST) Subject: [Fwd: CypherPunk Road Rangers] Message-ID: <35193EC5.2537@sk.sympatico.ca> ----- Begin Creating Forwarded Message ----- [Bienfait Nutly News] THE RECENTLY DISBANDED CANADIAN CYPHERPUNK ROAD Rangers drown their sorrows at the First Daily Bienfait Wine Tasters Keg Party, held at the Coaldust Saloon in DoWell, Saskatchewan. The RoadPunks were the toast of the town last week, when they acquired the Road Rage Control Contract awarded by the Canadian Emotional Crimes Commission. They were also the toast of the town last night (any excuse for a party, eh?), when the contract was revoked as a result of an internal argument within RoadPunk ranks that turned into an ugly free-for-all on the TransCanada Highway which quickly became a real-life demolition derby which injured many innocent, passing travelers, as well. The trouble started when some of the Canadian CypherPunks took offense to some of the actions by various of their American counterparts, who had been invited up to participate in enforcement of the new Emotional Crimes Laws. Tim May, the !Diplomatic Representative of the American faction, angered the Canadians when he stopped a man who had cut him off in heavy traffic and told him, "You drive like a Chinaman, chop, chop." The Canadians were momentarily appeased after May agreed that, while in Canada, he would treat people of Oriental ancestry with respect, and discriminate against wagon-burners and rag-heads, according to local customs. All hell broke loose, however, when May then fired several shots into the side of a passing car which was driving in a perfectly normal fashion, explaining, "He might not have cut me off, but you can bet your ass he cut off someone, somewhere, sometime..." and then refused to allow the Canadian CypherPunks to borrow his illegally imported gun to play with. Local and federal law enforcement officials were persuaded to drop all charges against the RoadPunks, in return for Peter Trei signing over the Canadian rights for use of the Adrenalyzer, which measures the amount of adrenaline in a driver's blood. It is reported to be an early prototype of the Trei Transponder, developed in a secret underground CypherPunks laboratory, by Reptilian CypherPunks. ----- End Forwarding Created Message ----- From ian at deepwell.com Tue Mar 24 17:56:11 1998 From: ian at deepwell.com (Ian Briggs) Date: Wed, 25 Mar 1998 09:56:11 +0800 Subject: you petition who? (Re: I petition the Internet community to In-Reply-To: <199803161100.LAA01168@server.eternity.org> Message-ID: <3.0.3.32.19980223174554.0094906c@deepwell.com> So what do you need, E-mail, web space, shell? We don't do shit until we get a subpoena, then those darned logs on the NT server well they just seemed to have corrupted themselves. Course, this is NOT a invite to hack and fuck around with networks. I'll support objectionable content, not pricks. No advocating violence against people. We host several of the white power sites referred to, we also host several leftist political sites. Right to freedom of the press goes beyond the government. If private business doesn't support freedom of the press, then there is no real freedom. If any of you need accounts. Drop a note. Ian Briggs President Internet something or another. >> > if Dmitri is not restored, deny access to his self-proclaimed >> > terminator: guy at panix.com > >Hardly in the spirit of free speech either, although I don`t doubt >Polis is a censorous cocksucker. > >> It wasn't the "internet community" that pulled that account, it was >> PSInet, in response to Guy Polis' censorship attempts. > >Plug pulling is becoming even more rife, you may have noticed I have >been off the list for a few days, this was a result of content-based >plug pulling. It`s time more resilient methods of creating >censor-proof account were worked on, does anyone know of any ISPs >that specifically state that they refuse to censor? Clearly, such an >ISP would have limited commercial appeal in the current market so I >don`t consider it likely. > > >-- > Paul Bradley > paul at fatmans.demon.co.uk > "Why should anyone want to live on rails?" - Stephen Fry > > > > > > From toto at sk.sympatico.ca Wed Mar 25 13:53:24 1998 From: toto at sk.sympatico.ca (Toto) Date: Wed, 25 Mar 1998 13:53:24 -0800 (PST) Subject: Student Refuses to Whore Himself, Gets Suspended Message-ID: <35197DA9.5080@sk.sympatico.ca> Eric Cordian wrote: > we have this story > out of Georgia, where a student was suspended for a day for failing to > properly prostitute himself to corporate johns on behalf of his > pimping principal. > ----- > EVANS, Ga. (AP) -- It's the real thing all right -- suspension. > > High school senior Mike Cameron is serving a one-day suspension today > for wearing a Pepsi shirt on Coke Day, an event school officials > crafted in an attempt to win a $500 contest run by the Coca-Cola > Bottling Co. It could be worse. They could have transferred me to the "Home Shoppers Bargain Psychiatry Warehouse". That's the worst of the worst. The Shop'ers have the poorest government on WebWorld. When the citizens of the former world governments got to choose their citizenship at the end of the Channel Revolution every deadbeat compulsive spender on the face of the Earth signed up with the Home Shopper Channel Government. ~~~ http://www.clas.net/~dave/public/webworld/#Chapter_4 > The Coke-themed day was part of an effort to win the contest. The > award will go to the school that comes up with the best method of > distributing promotional discount cards to students. The Shop'ers ran ads showing Leona purchasing magnificent jewelry and other high-priced items from the Home Shopping Channel and the masses rushed to join the bandwagon. Some of the slightly more discriminating people became citizens of the Consumer Channel, but they were few and far between. ~~~ http://www.clas.net/~dave/public/webworld/#Chapter_4 The Sex Channel offered some rather interesting incentives for new citizens. They did quite well in the final ratings (what had formerly been called 'election results'), despite fierce competition from the S&M Channel, the Group Sex Channel, the Lesbian Channel, the 'Buck Futters' Channel, and a host of minor players vying for the same basic audience. ~~~ http://www.clas.net/~dave/public/webworld/#Chapter_11 > School officials also integrated Coke into class instruction for the > day, invited Coke executives from Atlanta headquarters 100 miles away > as speakers and gathered students outside to spell ``Coke'' for the > photograph. No doubt General Noriega was given a day-pass to drop one-pound packages of Peruvian flake out of a helicopter, as loudspeakers blared, "You deserve a brick today..." > ~~ > Eric Michael Unamused > T:.O:.T:.O:. Mathematical Munitions Division, > Room 200, Mathematical Munitions Addition > Mathematical Munitions Subdivison, > Rocky III Road, > Corollary Corral, California > "Drink What Thou Wilt Shall Be The Whole Of The Law" From PRESIDENT at SHITHOUSE.CUM Wed Mar 25 16:22:21 1998 From: PRESIDENT at SHITHOUSE.CUM (PRESIDENT) Date: Wed, 25 Mar 1998 16:22:21 -0800 (PST) Subject: [Fwd: School Sponsorship] Message-ID: <35199F40.3444@SHITHOUSE.CUM> ----- Begin Obvious Forgery ----- [Bienfait Nutly News] PRESIDENT CLINTON, TUCKING FUNNY-MONEY INTO THE panties of the topless dancers during their performances at the CoalDust Saloon's 'Paula Jones and Monica Lewinski Look-Alike Contest,' took time out from the festivities to announce plans to help prop up the nation's decaying public school system by allowing Adult WebSites to sponsor the latest computer technology additions to the schools' InterNet systems. "We don't see any harm in this," Clinton told gathered reportwhores, who were pretty much ignoring him as they watched the dancers, "since the children won't be able to legally access the URL's being advertised until they are 18 years old." In response to concerns about the increasing Corporatization of America, Clinton explained that this could be viewed merely as a streamlining of the already-existing system, by eliminating the middlemen (lobbyists and politicians) currently adding inefficiency and expense to the Corporate exercise of free enterprise. Clinton explained that government and corporations were working toward a model which worked well for railways when cabooses became automated and the workers were paid to merely ride the train back and forth. "We will still hold elections, and attend sittings of the House and Senate, but we'll just play cards, or read, or something..." Clinton refused to comment on the recent brouhaha over a student in San Francisco being expelled for life for wearing a T-shirt with an elephant on it during a Political Correctness Event sponsored by the Democratic Party. He did, however, comment on the expulsion of a student at the University of California-Bezerkeley, for wearing clothes during the ribbon-cutting ceremonies for the Naked Guy Boutique. Clinton, looking at photographs of the event, said, "Hubba, hubba!" The Naked Guy, also in attendance at the CoalDust Saloon, told drunken, groping reportwhores of both sexes, "It is my belief that the current anti-trust actions being taken by the DOJ against the nationwide Naked Guy Boutique Chain is nothing more than the result of political pressure by the Anti-NakedGuy Coalition." (The first joint action by a group composed mostly of Fundamentalist Christian groups and Adult WebSite operators.) TToommoorrooww: Gates Pie-Boy Gives Clinton a Wedgie... ---- End Meaningless Blathering ----- From nobody at REPLAY.COM Wed Mar 25 16:58:21 1998 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 25 Mar 1998 16:58:21 -0800 (PST) Subject: [Fwd: School Sponsorship] Message-ID: <199803260058.BAA27456@basement.replay.com> TRUTHMONGER FOR PRESIDENT wrote: : ----- Begin Obvious Forgery ----- : Clinton refused to comment on the recent brouhaha over a student in : San Francisco being expelled for life for wearing a T-shirt with : an elephant on it during a Political Correctness Event sponsored by : the Democratic Party. Truthmonger occassionally takes time out from being a loudmouthed pain in the butt to illustrate a valid point. Free speech is free speech whether it involves a Pepsi logo or a political logo. A person could make an equally ridiculous and equally valid point by suggesting the expulsion of black students for not showing up to school in whiteface during events sponsored by the Aryan Nations. Unfortunately the school officials involved feel justified in excusing their repression of civil rights and liberties by downplaying the specifics of the compromise of freedom they demanded of their students in return for corporate funding. Like gun-control and GAK proponents they are asking for only a "small compromise" as an ante into a game which will eventually result in the players with the largest pockets naming the game. Even the most outrageous of silly conspiracy theory posts to the list failed to predict the advent of mandatory-voluntary Coke T-shirts in the school system. Is the cuality of qraziness on the list slipping? : TToommoorrooww: Gates Pie-Boy Gives Clinton a Wedgie... From hisi24 at msn.com Wed Mar 25 20:25:35 1998 From: hisi24 at msn.com (Electric Email) Date: Wed, 25 Mar 1998 20:25:35 -0800 (PST) Subject: 68 Million Email Addresses - $99 Message-ID: <199803251971BAA12476@post.cvn.com> 68 MILLION EMAIL ADDRESSES FOR ONLY $99 You want to make some money? I can put you in touch with over 60 million people at virtualy no cost. Can you make one cent from each of theses names? If you can you have a profit of over $600,000.00 This offer is not for everyone. If you can not see the just how excellent the risk / reward ratio in this offer is then there is nothing I can do for you. To make money you must stop dreaming and TAKE ACTION. **************************************** PACKAGE A 68,000,000 email addresses on CD These name are all in text files ready to mail!!! $99.00 **************************************** PACKAGE B 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. $ 139.00 **************************************** PACKAGE C THE WORKS 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. AND Over 500 diferent Business Reports now being sold on the internet for up to $100 each. You get full rights to resell these reports. With this package you get the email addresses, the software to mail them AND ready to sell information products. AND ...... . a collection of the 100 best money making adds currently floating around on the internet. $ 189 **************************************** SEVERAL WAYS TO ORDER !!! IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!! 1) WE ACCEPT: AMERICAN EXPRESS OR VISA <> MASTERCARD TYPE OF CARD AMX / VISA / MC??_______________ EXPIRATION DATE ___________________________ NAME ON CREDIT CARD________________________ CREDIT CARD #________________________________ BILLING ADDRESS ____________________________ CITY_________________________________________ STATE________________ZIP_____________________ PHONE INCLUDE AREA CODE___________________ EMAIL ADDRESS______________________________ WE WILL BILL selected amount to your account plus the following shipping costs SHIPPING COST OF 3.85 FIRST CLASS MAIL SHIPPING COST OF 15.00 24 HOUR EXPRESS MAIL / FEDERAL EXPRESS SALES TAX (7.25%) added to CA residents >>> Send correct amount in cash, check or money order to: >>> ELECTRIC EMAIL >>> 702 Mangrove Avenue, Suite 151 >>> Chico, CA 95926 2) Send the same above requested credit card information to above address. 3) Fax the same above credit card information to 530-895- 8470 4) Call phone # 530-876-4291. This is a 24 hour phone number to place a CREDIT CARD order. 5) FAX A COPY of your signed check to 530-895-8470. This is an EXCELLENT way to order without a credit card! Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider. Copyright 1998 All rights reserved Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. Amendment I, The US Constitution :-) 1 sending mes From fygrave at freenet.bishkek.su Wed Mar 25 20:52:07 1998 From: fygrave at freenet.bishkek.su (Fyodor) Date: Wed, 25 Mar 1998 20:52:07 -0800 (PST) Subject: Thought you'd like this alot (fwd) Message-ID: Heh... Wanna hear the C++ creator thoughts regarding the malevolent creation, he made?:-) =========/qoute/=======================/quote/==================== [snip snip] Date: Mon, 09 Feb 1998 23:31:02 -0800 Subject: Stroustrup's interview leaked... On the 1st of January, 1998, Bjarne Stroustrup gave an interview to the IEEE's 'Computer' magazine. Naturally, the editors thought he would be giving a retrospective view of seven years of object-oriented design, using the language he created. By the end of the interview, the interviewer got more than he had bargained for and, subsequently, the editor decided to suppress its contents, 'for the good of the industry' but, as with many of these things, there was a leak. Here is a complete transcript of what was said, unedited, and unrehearsed, so it isn't as neat as planned interviews. You will find it interesting... __________________________________________________________________ Interviewer: Well, it's been a few years since you changed the world of software design, how does it feel, looking back? Stroustrup: Actually, I was thinking about those days, just before you arrived. Do you remember? Everyone was writing 'C' and, the trouble was, they were pretty damn good at it. were turning out competent - I stress the word 'competent' graduates at a phenomenal rate. That's what caused the problem. Interviewer: Problem? Stroustrup: Yes, problem. Remember when everyone wrote Cobol? Interviewer: Of course, I did too Stroustrup: Well, in the beginning, these guys were like demi-gods. Their salaries were high, and they were treated like royalty. Interviewer: Those were the days, eh? Stroustrup: Right. So what happened? IBM got sick of it, and invested millions in training programmers, till they were a dime a dozen. Interviewer: That's why I got out. Salaries dropped within a year, to the point where being a journalist actually paid better. Stroustrup: Exactly. Well, the same happened with 'C' programmers. Interviewer: I see, but what's the point? Stroustrup: Well, one day, when I was sitting in my office, I thought of this little scheme, which would redress the balance a little. I thought 'I wonder what would happen, if there were a language so complicated, so difficult to learn, that nobody would ever be able to swamp the market with programmers? Actually, I got some of the ideas from X10, you know, X windows. That was such a bitch of a graphics system, that it only just ran on those Sun 3/60 things. They had all the ingredients for what I wanted. A really ridiculously complex syntax, obscure functions, and pseudo-OO structure. Even now, nobody writes raw X-windows code. Motif is the only way to go if you want to retain your sanity. Interviewer: You're kidding...? Stroustrup: Not a bit of it. In fact, there was another problem. Unix was written in 'C', which meant that any 'C' programmer could very easily become a systems programmer. Remember what a mainframe systems programmer used to earn? Interviewer: You bet I do, that's what I used to do. Stroustrup: OK, so this new language had to divorce itself from Unix, by hiding all the system calls that bound the two together so nicely. This would enable guys who only knew about DOS to earn a decent living too. Interviewer: I don't believe you said that... Stroustrup: Well, it's been long enough, now, and I believe most people have figured out for themselves that C++ is a waste of time but, I must say, it's taken them a lot longer than I thought it would. Interviewer: So how exactly did you do it? Stroustrup: It was only supposed to be a joke, I never thought people would take the book seriously. Anyone with half a brain can see that object-oriented programming is counter-intuitive, illogical and inefficient. Interviewer: What? Stroustrup: And as for 're-useable code' - when did you ever hear of a company re-using its code? Interviewer: Well, never, actually, but... Stroustrup: There you are then. Mind you, a few tried, in the early days. There was this Oregon company - Mentor Graphics, I think they were called - really caught a cold trying to rewrite everything in C++ in about '90 or '91. I felt sorry for them really, but I thought people would learn from their mistakes. Interviewer: Obviously, they didn't? Stroustrup: Not in the slightest. Trouble is, most companies hush-up all their major blunders, and explaining a $30 million loss to the shareholders would have been difficult. Give them their due, though, they made it work in the end. Interviewer: They did? Well, there you are then, it proves O-O works. Stroustrup: Well, almost. The executable was so huge, it took five minutes to load, on an HP workstation, with 128MB of RAM. Then it ran like treacle. Actually, I thought this would be a major stumbling-block, and I'd get found out within a week, but nobody cared. Sun and HP were only too glad to sell enormously powerful boxes, with huge resources just to run trivial programs. You know, when we had our first C++ compiler, at AT&T, I compiled 'Hello World', and couldn't believe the size of the executable. 2.1MB Interviewer: What? Well, compilers have come a long way, since then. Stroustrup: They have? Try it on the latest version of g++ - you won't get much change out of half a megabyte. Also, there are several quite recent examples for you, from all over the world. British Telecom had a major disaster on their hands but, luckily, managed to scrap the whole thing and start again. They were luckier than Australian Telecom. Now I hear that Siemens is building a dinosaur, and getting more and more worried as the size of the hardware gets bigger, to accommodate the executables. Isn't multiple inheritance a joy? Interviewer: Yes, but C++ is basically a sound language. Stroustrup: You really believe that, don't you? Have you ever sat down and worked on a C++ project? Here's what happens: First, I've put in enough pitfalls to make sure that only the most trivial projects will work first time. Take operator overloading. At the end of the project, almost every module has it, usually, because guys feel they really should do it, as it was in their training course. The same operator then means something totally different in every module. Try pulling that lot together, when you have a hundred or so modules. And as for data hiding. God, I sometimes can't help laughing when I hear about the problems companies have making their modules talk to each other. I think the word 'synergistic' was specially invented to twist the knife in a project manager's ribs. Interviewer: I have to say, I'm beginning to be quite appalled at all this. You say you did it to raise programmers' salaries? That's obscene. Stroustrup: Not really. Everyone has a choice. I didn't expect the thing to get so much out of hand. Anyway, I basically succeeded. C++ is dying off now, but programmers still get high salaries - especially those poor devils who have to maintain all this crap. You do realize, it's impossible to maintain a large C++ software module if you didn't actually write it? Interviewer: How come? Stroustrup: You are out of touch, aren't you? Remember the typedef? Interviewer: Yes, of course. Stroustrup: Remember how long it took to grope through the header files only to find that 'RoofRaised' was a double precision number? Well, imagine how long it takes to find all the implicit typedefs in all the Classes in a major project. Interviewer: So how do you reckon you've succeeded? Stroustrup: Remember the length of the average-sized 'C' project? About 6 months. Not nearly long enough for a guy with a wife and kids to earn enough to have a decent standard of living. Take the same project, design it in C++ and what do you get? I'll tell you. One to two years. Isn't that great? All that job security, just through one mistake of judgement. And another thing. The universities haven't been teaching 'C' for such a long time, there's now a shortage of decent 'C' programmers. Especially those who know anything about Unix systems programming. How many guys would know what to do with 'malloc', when they've used 'new' all these years - and never bothered to check the return code. In fact, most C++ programmers throw away their return codes. Whatever happened to good ol' '-1'? At least you knew you had an error, without bogging the thing down in all that 'throw' 'catch' 'try' stuff. Interviewer: But, surely, inheritance does save a lot of time? Stroustrup: Does it? Have you ever noticed the difference between a 'C' project plan, and a C++ project plan? The planning stage for a C++ project is three times as long. Precisely to make sure that everything which should be inherited is, and what shouldn't isn't. Then, they still get it wrong. Whoever heard of memory leaks in a 'C' program? Now finding them is a major industry. Most companies give up, and send the product out, knowing it leaks like a sieve, simply to avoid the expense of tracking them all down. Interviewer: There are tools... Stroustrup: Most of which were written in C++. Interviewer: If we publish this, you'll probably get lynched, you do realize that? Stroustrup: I doubt it. As I said, C++ is way past its peak now, and no company in its right mind would start a C++ project without a pilot trial. That should convince them that it's the road to disaster. If not, they deserve all they get. You know, I tried to convince Dennis Ritchie to rewrite Unix in C++. Interviewer: Oh my God. What did he say? Stroustrup: Well, luckily, he has a good sense of humor. I think both he and Brian figured out what I was doing, in the early days, but never let on. He said he'd help me write a C++ version of DOS, if I was interested. Interviewer: Were you? Stroustrup: Actually, I did write DOS in C++, I'll give you a demo when we're through. I have it running on a Sparc 20 in the computer room. Goes like a rocket on 4 CPU's, and only takes up 70 megs of disk. Interviewer: What's it like on a PC? Stroustrup: Now you're kidding. Haven't you ever seen Windows '95? I think of that as my biggest success. Nearly blew the game before I was ready, though. Interviewer: You know, that idea of a Unix++ has really got me thinking. Somewhere out there, there's a guy going to try it. Stroustrup: Not after they read this interview.. Interviewer: I'm sorry, but I don't see us being able to publish any of this. Stroustrup: But it's the story of the century. I only want to be remembered by my fellow programmers, for what I've done for them. You know how much a C++ guy can get these days? Interviewer: Last I heard, a really top guy is worth $70 - $80 an hour. Stroustrup: See? And I bet he earns it. Keeping track of all the gotchas I put into C++ is no easy job. And, as I said before, every C++ programmer feels bound by some mystic promise to use every damn element of the language on every project. Actually, that really annoys me sometimes, even though it serves my original purpose. I almost like the language after all this time. Interviewer: You mean you didn't before? Stroustrup: Hated it. It even looks clumsy, don't you agree? But when the book royalties started to come in... well, you get the picture. Interviewer: Just a minute. What about references? You must admit, you improved on 'C' pointers. Stroustrup: Hmm. I've always wondered about that. Originally, I thought I had. Then, one day I was discussing this with a guy who'd written C++ from the beginning. He said he could never remember whether his variables were referenced or dereferenced, so he always used pointers. He said the little asterisk always reminded him. Interviewer: Well, at this point, I usually say 'thank you very much' but it hardly seems adequate. Stroustrup: Promise me you'll publish this. My conscience is getting the better of me these days. Interviewer: I'll let you know, but I think I know what my editor will say. Stroustrup: Who'd believe it anyway? Although, can you send me a copy of that tape? Interviewer: I can do that. From nobody at REPLAY.COM Wed Mar 25 21:38:21 1998 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 25 Mar 1998 21:38:21 -0800 (PST) Subject: Constable Hettinga? Message-ID: <199803260538.GAA02112@basement.replay.com> Finally, we have proof... http://www3.sk.sympatico.ca/carljohn/rcmphate/rcmphate.htm From bd1011 at hotmail.com Wed Mar 25 22:09:35 1998 From: bd1011 at hotmail.com (Nobuki Nakatuji) Date: Wed, 25 Mar 1998 22:09:35 -0800 (PST) Subject: Serpent - A New Block Cipher Proposal for AES Message-ID: <19980326060902.29058.qmail@hotmail.com> Serpent - A New Block Cipher Proposal for AES Over the last six months, I have been working with Ross Anderson and Lars Knudsen to develop a candidate block cipher for the Advanced Encryption Standard. Our algorithm, called Serpent, is described in a paper that will appear at the 5th workshop on FastSoftware Encryption.A reference implementation by Frank Stajano, a research students of Ross, is available here. The authors' home pages can be found both in http://www.cs.technion.ac.il/~biham/, http://www.ii.uib.no/~larsr/, and http://www.cl.cam.ac.uk/users/rja14/. The authors' email addresses are biham at cs.technion.ac.il, larsr at ii.uib.no, and rja14 at cl.cam.ac.uk. ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From toto at sk.sympatico.ca Wed Mar 25 22:46:43 1998 From: toto at sk.sympatico.ca (Toto) Date: Wed, 25 Mar 1998 22:46:43 -0800 (PST) Subject: Prologue 14/0 -- Passoword: cypherpunks Message-ID: <3519FA5E.50A9@sk.sympatico.ca> -----BEGIN PGP MESSAGE----- Version: PGP for Business Security 5.5 qANQR1DDBAQDAAHJx79aJRJLeVB2OzDsgrypUMkbMhZHMX/+yQD/8LKjp80MsCua BVO7C4L7JY+ADlbtOJeT/EMUQrq11M0av/ZuUENBIiwV+ubTR9FBvml7Cw2fLdGF D9Mji7E7tH3syc3OreXpQyN+G4Bhllxr9nZFMPCdTKrmGyUAX64i3MaTYOnggrpG voVZeAjGi4IciHdO0LOlIkrunki8FvNcGQQfeEr5pgegHEiRl00FfV506LtMUWkV n6MT/3te+DKPPaF7QKRBD5MNJvA3XGbAYhXi4RhSM69nR0fwdA+NX1tgD6zVcdTh liLh7IVkdKHiR02Sx99zG4WKWmKmwyCmpghrw1IaN6Ext01kZYXaO1tDxtaYvSJS 3jKiBJ3N+3H8CJJu+Xb45gX826W1F4X95+8/84IHyJ+gI9A6/7GOnZvRazYr2Ktt 0QCwAd3anz3ODd9HepO+ij0a1bvIHIS3CZQLfYwKxhsvoE0y6GJ13/YWGij8m2xR fQHRlwsfxYz4bkguTd7nhF2w2a5tATAJ5d5JuNvREKFzBftFIng8l8ZTzPyvgMzN mFHH+fFghQSLpO8PrGrVjEkg10IxYNWJBGsYVly8U6Ho9TH/SmH99Yzc9Gb2Q/ph fEFfZi1btXtC8lkaGRrf1KU7L6H5M30zLe4Hbcv1tiOJ7ZJRPGr9F2C/FDBJd5eg MXK3KAx4hflfOJqZGKJ/kFLTpmGIeABuTaMEznigZy9vkSqqFONiJBTTdAABHuxi YZalc9Xh8DE18mvHdkQ/34np9M11+UoUv6EPq8uRnlOpbE+CaA5skOq8NIPF8ilx +pUAhLUBxci6TUIA6zFiz+IvdZ0J25+G9GbmO8QlvD/vH6uuW2rxaKGgDYJccszK Q03fnacS7JyhFAa65jOvpGk7G63PH/iGVFls8/gMsQHQUxlMZsX/nbkg9hi5ZlN9 b3OYm+26iER+R0oYlZ8n67hKYF62liixEOI8fhPV2XBAMsvzsoS3jJPA6a9IeiXy 6NG84CjlBjZ63SllCDzKEFTQk9wN1LMN7bTNCJFL+CQXo1ZNcyBEISiiwHG/dP3i ePz6tpBmTi4+42WFbUM5InFlr1LHnkTsApK9YpN/HtaNAgdCYb8hhWRnA+NEIrbq t9wBpr2RsMixRA5bIaCcAUqRoalGxxFa7FNIdIPis6l4kxFyQk5pSOxmUSrktmEU fZuw98kZ9yw825ebOj0CJZe/eoBoLaJ7aXii/6ogWDkjiewrXmbjitOIn0UG5FCw Gyd6mwfrQ4FmchCZVQvcpqmxJDn+I+FV3V9DlaT/2FwqKr25volrYTWcIJNpmu9O iK0NfKa1fk6ml2ff1vTCR0tdRAf6SHFJtMMIj2BznazRyuKWuacwvBloDL+zUWvK cDM+PRwlm06/NmNfMgYKEx4pjUj5mSh8cxhWMQhHyXDKXRd+r2wqbaRFU7mgc/bN x3KO0p1YuhYltDG/IeQxd9AmyTXlsWgythgeBXu1rnBjf7L6Y6g1bLo8ZYdOvPjX f/8Nagwc6p94UT4Ju7nY/ZTxXR1eg9aDscHtxc96IWr8TaCPBzYeEI5nIOd0Qyk5 ng5SMmiamY8vkYZ56BudZBgGXHT+M6+/rSPtJ6gmOfieUjiHc6xihunM9h9321zI wPTeZ0UNG5MLrxgXsarG9pzF10t6xQB1GkDcGDWS+/RlvJS1VFkqBK0AP/w7tmA2 ZcYQF5FqdwY86Y3qakepb3lCTdU+hB5UTqYoQfzajaJTRvkwktRMxD6IfMKSiM0H spE3YJj1sud6Ml7XOKDCYhueIPBN3KXYLW6q6fsndQGCsVL89b+2KT3c9E3ZJ3/0 brYzZVTJ8gmWjRQAtroQexhe6P8G6cjgB6UaqZP9FkLOmxQMgyUN6vDLwCDaKvSI ziPS6UoLY66ufATTymcB2griHrSDZZo7/8JtB64QDlyA5A+Wik7+Yh6CHWrDzwwA fQtgQoZVqjXsASgi2YmTRgCOMfw4mMH+oTrxoXQy+/OmXQMQFIlrY0E0wf5QrGs1 qQ7bauwHeeZT3QFRLB6tWxzCAu07YNVLDXUDJt3x+E4Y3sVNBv5kqDxkwXVLegcp nyKZqiDVtpHH8tzbPsCJBTP+MYnl3Rg3LnvDonwe6E9tOtozbonlneApY2mYFt3Z Dp93veTM5ieDk6QI0WOdUAoN+jOHD/uzcqUglpR3gRwiVblWnnYxO51c/2FC2TBE oFv3ChQ+6aQZ+Dq48L8vZwHNCoQVrYV57WIVYrRpQiOYTEeQ13Y6J8NOVVKTb23j 8MF6UMtHhgZpyWhOemq8Ef8TusnIMQHXRCqtxj4/fJCfpmJwZyJvL1qgUSmxb9bH nHzsx3r6ZDI7hRtjNks0qPZoWHuVK8znudp4tJZsgf/wHkpzSAHWcqCIshS1Vh/h VbdWuhZMmuZFMJcPStGYhYJgO3oGDszIjJsLVTC/W4zo3IcKS0yYAbTLhoo4yOkc IXYeslYQKMUNgGKnnsWEytWS5sVY+QQ/TwpiWaIJoq8iqfu1mm7ma23kV6ghDoZZ P6d6YdqRg2v01GOFHAxyQsUc3OIWfeVJhNgxPjuUCGfzTicTp0SRRnOiFYkKkW2O Z5CvGM/Aab5To1t0FKaH7yZ4k+9taTBOoVkXNIFgoqniCC9UVFxVPupOQFsox/a5 KRT3sXJ7NFp5tYbJjCEhByT4TQkV6Lg9HLxJNDmGW6SjAbnfOSw5i/VpbCxQ+0Sg 2yk7RS5BVs42UESFcIRaIU0rG2/yopUAHzDTJarIRIyfQwkXa1VUZUefbRacrkSq urTGtbHB1OBJbZ0Zkt60wED1liUbKd7voUWi2r8bIqS3Ovi0Sk1lp8uDDiRSqqed xzASVd+P1DvPOMWZ9Bfhcd+VBgfwvJqby+4we1c= =0442 -----END PGP MESSAGE----- From genocide at Genocide2600.com Wed Mar 25 23:52:45 1998 From: genocide at Genocide2600.com (Genocide) Date: Wed, 25 Mar 1998 23:52:45 -0800 (PST) Subject: Cumman nA mBamm Message-ID: I heard of this person today, yes that is a name, she is supposed to be a terrorist or something, does anyone have any info on her? Genocide Head of the Genocide2600 Group Board Member of E.H.A.P ============================================================================ ____________________ *---===| |===---* *---===| Genocide |===---* "Courage is not defined by those who *---===| 2600 |===---* fought and did not fall, but by those *---===|__________________|===---* who fought, fell, and rose again." Email: Genocide at Genocide2600.com Web: http://www.Genocide2600.com Check out the mud at: genocide2600.com 6666 UIN: 1449140 ============================================================================ From emailprofits1 at juno.com Thu Mar 26 01:43:17 1998 From: emailprofits1 at juno.com (emailprofits1 at juno.com) Date: Thu, 26 Mar 1998 01:43:17 -0800 (PST) Subject: as much business as you can handle Message-ID: <37331546_44939965> Hello, If You're Marketing a Product, Service, or Opportunity on the Internet, or Through an Online Service, or Have a Web Site, You Will *Definitely* Be Interested In What We Have To Offer. We'll send out Your General or *Targeted* E-mail Advertisement. Period. No qualifiers, no conditions, no nonsense. We'll do it quickly, and we'll do it at a *great price*. Give us a call, and we'll give you advice on how to write your material, and much more. and... Our Services Are Guaranteed! * Guaranteed Delivery And Minimum Response Rates! Call For Details. * Fresh, *Targeted* Names Compiled *Specifically* For Your Campaign * Response Rates From 1% to 33% Have Been Achieved! (This also depends on your product and offer) * Your EXCLUSIVE Ad! Up To A Full Page. No Co-ops! * Experience, Experience, Experience. Call Us Today! 352.315.6100 24 Hrs! EST (mention code#: 322a) DIRECT E-MAIL WORKS!! * YOUR MAILING IS ALWAYS SENT ON ITS OWN, NEVER WITH ANY OTHER ADS! If you receive 1% response for mailing 100,000 Email addresses you would receive 1,000 replies!!!! How much MONEY would YOU make? PRICING: Price with Random names. 100,000 names $399.00 (Current Promotion: $149 Limited Time Only!) 250,000 names $599.00 500,000 names $799.00 1,000,000 names $999.00 5,000,000 names $2,499.00 Prices With *Highly Targeted* Names by City, Hobbies, Job, Business Opportunity, MLM, �Women in Colorado Who Ski�, Etc.,. Response Rates From 1% to 33% (or Higher)! 10,000 names $399.00 (Current Promotion: $149 Limited Time Only!) 20,000 names $599.00 30,000 names $799.00 40,000 names $999.00 50,000 names $1199.00 100,000 names $1999.00 (Promo: $999) Start Generating As Many ORDERS and/or SIGNUPS as You Can Handle! Call Us Right Now To Discuss Increasing Your Business And Cash Flow! Call Now! 352.315.6100 24 Hrs! EST (promo code#: 322a) We Also Take All Major Credit Cards, and Checks By Fax/Phone! Thank You And Have A Profitable Day! 352.315.6100 24 Hrs 407.493.3861 (ask for Marc) (promo code#: 322a) (mention this code when you call to receive the promotion prices!) From John807601 at aol.com Thu Mar 26 05:57:06 1998 From: John807601 at aol.com (John807601) Date: Thu, 26 Mar 1998 05:57:06 -0800 (PST) Subject: You've won! Message-ID: <1558d5e1.351a5e36@aol.com> � To: John807601 at aol.com Subject: You've won! From: John807601 Date: Thu, 26 Mar 1998 08:01:14 EST Organization: AOL (http://www.aol.com) Click Here To Claim Your Prize http://www.downset.net From rmcholewa at bigfoot.com Thu Mar 26 07:34:15 1998 From: rmcholewa at bigfoot.com (Romulo Moacyr Cholewa) Date: Thu, 26 Mar 1998 07:34:15 -0800 (PST) Subject: Thought you'd like this alot (fwd) Message-ID: <005501bd58cc$693f7120$0100a8c0@pioneer.rmc1.com.br> Begin of forwarded email message ------------------------------- From: bs at day.research.att.com[SMTP:bs at day.research.att.com] Sent: Thursday, March 26, 1998 10:58 AM To: albertoa at msconecta.com.br Sorry to send you a form letter, but I have now received dozens of copies of that "IEEE interview" hoax. Yes, it is (obviously) a hoax. No, it is not a hoax done by me or any of my friends; had it been, it would have been less crude and more funny. If you want information about C++, see my articles and books. You can find references, articles, book chapters, and even a couple of genuine interviews on my homepages. - Bjarne Bjarne Stroustrup, AT&T Labs, http://www.research.att.com/~bs End of forwarded email message -------------------------------- This is the answer, by himself. Romulo Moacyr Cholewa Home Page: http://rmcweb.home.ml.org Corporate: RomuloC at MSConecta.com.br Personal: RMCholewa at Bigfoot.com --------------------------------- -----Original Message----- From: Fyodor To: Bad_B0yZ:; Cc: cypherpunks at toad.com Date: Quinta-feira, 26 de Mar�o de 1998 02:03 Subject: Thought you'd like this alot (fwd) >Heh... Wanna hear the C++ creator thoughts regarding the malevolent >creation, he made?:-) > >=========/qoute/=======================/quote/==================== >[snip snip] >Date: Mon, 09 Feb 1998 23:31:02 -0800 >Subject: Stroustrup's interview leaked... > >On the 1st of January, 1998, Bjarne Stroustrup gave an interview >to the IEEE's 'Computer' magazine. > >Naturally, the editors thought he would be giving a retrospective >view of seven years of object-oriented design, using the language >he created. > >By the end of the interview, the interviewer got more than he had >bargained for and, subsequently, the editor decided to suppress >its contents, 'for the good of the industry' but, as with many of >these things, there was a leak. > >Here is a complete transcript of what was said, unedited, and >unrehearsed, so it isn't as neat as planned interviews. >You will find it interesting... >__________________________________________________________________ >Interviewer: Well, it's been a few years since you changed the >world of software design, how does it feel, looking back? > >Stroustrup: Actually, I was thinking about those days, just >before you arrived. Do you remember? Everyone was writing 'C' >and, the trouble was, they were pretty damn good at it. >were turning out competent - I stress the word 'competent' >graduates at a phenomenal rate. That's what caused the problem. > >Interviewer: Problem? > >Stroustrup: Yes, problem. Remember when everyone wrote Cobol? > >Interviewer: Of course, I did too > >Stroustrup: Well, in the beginning, these guys were like >demi-gods. Their salaries were high, and they were treated like >royalty. > >Interviewer: Those were the days, eh? > >Stroustrup: Right. So what happened? IBM got sick of it, and >invested millions in training programmers, till they were a dime >a dozen. > >Interviewer: That's why I got out. Salaries dropped within a >year, to the point where being a journalist actually paid >better. > >Stroustrup: Exactly. Well, the same happened with 'C' programmers. > >Interviewer: I see, but what's the point? > >Stroustrup: Well, one day, when I was sitting in my office, I >thought of this little scheme, which would redress the >balance a little. I thought 'I wonder what would happen, if >there were a language so complicated, so difficult to learn, >that nobody would ever be able to swamp the market with >programmers? Actually, I got some of the ideas from X10, >you know, X windows. That was such a bitch of a graphics >system, that it only just ran on those Sun 3/60 things. >They had all the ingredients for what I wanted. A really >ridiculously complex syntax, obscure functions, and >pseudo-OO structure. Even now, nobody writes raw X-windows >code. Motif is the only way to go if you want to retain >your sanity. > >Interviewer: You're kidding...? > >Stroustrup: Not a bit of it. In fact, there was another problem. >Unix was written in 'C', which meant that any 'C' programmer >could very easily become a systems programmer. Remember >what a mainframe systems programmer used to earn? > >Interviewer: You bet I do, that's what I used to do. > >Stroustrup: OK, so this new language had to divorce itself from >Unix, by hiding all the system calls that bound the two >together so nicely. This would enable guys who only knew >about DOS to earn a decent living too. > >Interviewer: I don't believe you said that... > >Stroustrup: Well, it's been long enough, now, and I believe most >people have figured out for themselves that C++ is a waste >of time but, I must say, it's taken them a lot longer than I >thought it would. > >Interviewer: So how exactly did you do it? > >Stroustrup: It was only supposed to be a joke, I never thought >people would take the book seriously. Anyone with half a >brain can see that object-oriented programming is >counter-intuitive, illogical and inefficient. > >Interviewer: What? > >Stroustrup: And as for 're-useable code' - when did you ever hear >of a company re-using its code? > >Interviewer: Well, never, actually, but... > >Stroustrup: There you are then. Mind you, a few tried, in the >early days. There was this Oregon company - Mentor >Graphics, I think they were called - really caught a cold >trying to rewrite everything in C++ in about '90 or '91. I >felt sorry for them really, but I thought people would >learn from their mistakes. > >Interviewer: Obviously, they didn't? > >Stroustrup: Not in the slightest. Trouble is, most companies >hush-up all their major blunders, and explaining a $30 >million loss to the shareholders would have been >difficult. Give them their due, though, they made it work in the end. > >Interviewer: They did? Well, there you are then, it proves O-O >works. > >Stroustrup: Well, almost. The executable was so huge, it took >five minutes to load, on an HP workstation, with 128MB of >RAM. Then it ran like treacle. Actually, I thought this >would be a major stumbling-block, and I'd get found out >within a week, but nobody cared. Sun and HP were only too >glad to sell enormously powerful boxes, with huge resources >just to run trivial programs. You know, when we had our >first C++ compiler, at AT&T, I compiled 'Hello World', and >couldn't believe the size of the executable. 2.1MB > >Interviewer: What? Well, compilers have come a long way, since >then. > >Stroustrup: They have? Try it on the latest version of g++ - you >won't get much change out of half a megabyte. Also, there >are several quite recent examples for you, from all over the >world. British Telecom had a major disaster on their hands >but, luckily, managed to scrap the whole thing and start >again. They were luckier than Australian Telecom. Now I >hear that Siemens is building a dinosaur, and getting more >and more worried as the size of the hardware gets bigger, to >accommodate the executables. Isn't multiple inheritance a joy? > >Interviewer: Yes, but C++ is basically a sound language. > >Stroustrup: You really believe that, don't you? Have you ever sat >down and worked on a C++ project? Here's what happens: >First, I've put in enough pitfalls to make sure that only >the most trivial projects will work first time. Take >operator overloading. At the end of the project, almost >every module has it, usually, because guys feel they really >should do it, as it was in their training course. The same >operator then means something totally different in every >module. Try pulling that lot together, when you have a >hundred or so modules. And as for data hiding. God, I >sometimes can't help laughing when I hear about the problems >companies have making their modules talk to each other. I >think the word 'synergistic' was specially invented to twist >the knife in a project manager's ribs. > >Interviewer: I have to say, I'm beginning to be quite appalled at >all this. You say you did it to raise programmers' salaries? >That's obscene. > >Stroustrup: Not really. Everyone has a choice. I didn't expect >the thing to get so much out of hand. Anyway, I basically >succeeded. C++ is dying off now, but programmers still get >high salaries - especially those poor devils who have to >maintain all this crap. You do realize, it's impossible to >maintain a large C++ software module if you didn't actually >write it? > >Interviewer: How come? > >Stroustrup: You are out of touch, aren't you? Remember the >typedef? > >Interviewer: Yes, of course. > >Stroustrup: Remember how long it took to grope through the header >files only to find that 'RoofRaised' was a double precision >number? Well, imagine how long it takes to find all the >implicit typedefs in all the Classes in a major project. > >Interviewer: So how do you reckon you've succeeded? > >Stroustrup: Remember the length of the average-sized 'C' project? >About 6 months. Not nearly long enough for a guy with a >wife and kids to earn enough to have a decent standard of >living. Take the same project, design it in C++ and what do >you get? I'll tell you. One to two years. Isn't that >great? All that job security, just through one mistake of >judgement. And another thing. The universities haven't >been teaching 'C' for such a long time, there's now a >shortage of decent 'C' programmers. Especially those who >know anything about Unix systems programming. How many guys >would know what to do with 'malloc', when they've used 'new' >all these years - and never bothered to check the return >code. In fact, most C++ programmers throw away their return >codes. Whatever happened to good ol' '-1'? At least you >knew you had an error, without bogging the thing down in all >that 'throw' 'catch' 'try' stuff. > >Interviewer: But, surely, inheritance does save a lot of time? > >Stroustrup: Does it? Have you ever noticed the difference >between a 'C' project plan, and a C++ project plan? The planning >stage for a C++ project is three times as long. Precisely >to make sure that everything which should be inherited is, >and what shouldn't isn't. Then, they still get it wrong. >Whoever heard of memory leaks in a 'C' program? Now >finding them is a major industry. Most companies give up, and send >the product out, knowing it leaks like a sieve, simply to >avoid the expense of tracking them all down. > >Interviewer: There are tools... > >Stroustrup: Most of which were written in C++. > >Interviewer: If we publish this, you'll probably get lynched, you >do realize that? > >Stroustrup: I doubt it. As I said, C++ is way past its peak now, >and no company in its right mind would start a C++ project >without a pilot trial. That should convince them that it's >the road to disaster. If not, they deserve all they get. >You know, I tried to convince Dennis Ritchie to rewrite Unix in >C++. > >Interviewer: Oh my God. What did he say? > >Stroustrup: Well, luckily, he has a good sense of humor. I think >both he and Brian figured out what I was doing, in the early >days, but never let on. He said he'd help me write a C++ >version of DOS, if I was interested. > >Interviewer: Were you? > >Stroustrup: Actually, I did write DOS in C++, I'll give you a >demo when we're through. I have it running on a Sparc 20 in the >computer room. Goes like a rocket on 4 CPU's, and only >takes up 70 megs of disk. > >Interviewer: What's it like on a PC? > >Stroustrup: Now you're kidding. Haven't you ever seen Windows >'95? I think of that as my biggest success. Nearly blew the >game before I was ready, though. > >Interviewer: You know, that idea of a Unix++ has really got me >thinking. Somewhere out there, there's a guy going to try it. > >Stroustrup: Not after they read this interview.. > >Interviewer: I'm sorry, but I don't see us being able to publish >any of this. > >Stroustrup: But it's the story of the century. I only want to be >remembered by my fellow programmers, for what I've done >for them. You know how much a C++ guy can get these days? > >Interviewer: Last I heard, a really top guy is worth $70 - $80 an >hour. > >Stroustrup: See? And I bet he earns it. Keeping track of all the >gotchas I put into C++ is no easy job. And, as I said >before, every C++ programmer feels bound by some mystic >promise to use every damn element of the language on every >project. Actually, that really annoys me sometimes, even >though it serves my original purpose. I almost like the >language after all this time. > >Interviewer: You mean you didn't before? > >Stroustrup: Hated it. It even looks clumsy, don't you agree? But >when the book royalties started to come in... well, you get the picture. > >Interviewer: Just a minute. What about references? You must >admit, you improved on 'C' pointers. > >Stroustrup: Hmm. I've always wondered about that. Originally, I >thought I had. Then, one day I was discussing this with a >guy who'd written C++ from the beginning. He said he could >never remember whether his variables were referenced or >dereferenced, so he always used pointers. He said the >little asterisk always reminded him. > >Interviewer: Well, at this point, I usually say 'thank you very >much' but it hardly seems adequate. > >Stroustrup: Promise me you'll publish this. My conscience is >getting the better of me these days. > >Interviewer: I'll let you know, but I think I know what my editor >will say. > >Stroustrup: Who'd believe it anyway? Although, can you send me a >copy of that tape? > >Interviewer: I can do that. > > > > > > From honig at otc.net Thu Mar 26 10:30:19 1998 From: honig at otc.net (David Honig) Date: Thu, 26 Mar 1998 10:30:19 -0800 (PST) Subject: Mexican Bugs Message-ID: <3.0.5.32.19980326103014.007bb190@otc.net> http://www.foxnews.com/js_index.sml?content=/news/wires2/ Mexican wiretapping scandal places political reforms in doubt March 26, 1998 By Mark Stevenson, Associated Press MEXICO CITY (AP) � When members of an opposition party burst into a secret government wiretapping station this month, they did more than reveal a political scandal: They exposed some of the deepest secrets of common citizens in the coastal city of Campeche. The wiretapping, apparently orchestrated by the state government to get information on opposition groups, has spawned a scandal that reaches into at least four other states. In most cases, opposition politicians were the targets. But nowhere has the damage been as great as in Campeche, where a powerful eavesdropping system set up in a private home had the capacity to tap virtually all phones in the southern city of 200,000 people � and record some of their darkest lies and infidelities. "We stood there in shock, in rage, impotence, as we heard recordings and read transcripts of our telephone conversations,'' said Layda Sansores, a senator for the leftist opposition Democratic Revolution Party who discovered the surveillance center on a tip. "There are difficult moments over the course of seven years, things you don't want to remember.'' "We heard a tape of one telephone call in which a man said he was with another man's wife. The wife was there in the room with us, listening,'' Sansores said at a news conference Wednesday. A local journalist present during the March 3 raid on the surveillance center was quoted in one wiretap transcript as denying accusations of rape, noting he `just had fun with' an unidentified woman. "We haven't seen him in public since,'' Sansores said. The taping in the city on the Gulf of Mexico, which used sophisticated computer equipment supplied by an Israeli firm, apparently began in 1991. Three men caught operating the bank of computers and phone switches have been arrested and charged with espionage and criminal association. Two had worked at some point for state police. "We are a small family in Campeche, and this hurts our very fabric,'' Sansores said. Documents uncovered by Sansores in the tiny, computerized wiretapping center � including dozens of tapes and transcripts of her own conversations "and those of everyone around me, nieces, sisters, my parents'' � suggest the eavesdropping was paid for by the Campeche state government. The current government, which took office in late 1997, has blamed the wiretapping on a previous state governor and said the current governor didn't know about it. Experts and politicians disagree on whether Mexico is experiencing a surge in wiretappings and surveillance, at a time when opposition groups are threatening the ruling Institutional Revolutionary Party's 69-year uninterrupted grip on power. Sansores claims that there are up to 22 of the eavesdropping stations around the country, and mentioned four other states where her supporters or party colleagues believe they have evidence of such surveillance. On March 18, authorities seized a network of phone-tapping equipment and secret cameras in Monterrey that reportedly had been rented by politicians and businessmen in the northern city. Several weeks earlier, a top official in the Mexico City government and also from the Democratic Revolution Party � the first opposition party ever to govern the capital � said she found two tiny surveillance cameras in her office. "There is a new way of doing things when a new group comes to power,'' said Joel Estudillo, an analyst at the Mexican Institute of Political Studies. "Politicians say, `We have to find out what these people have done''' in the past. In a closed political circle like that which has dominated Mexico for most of the century, secrets like past corruption are often known but seldom publicized until a grudge or a competition makes such information a valuable weapon, Estudillo said. "Those kinds of understandings and internal arrangements have so far prevented espionage from becoming a big problem.'' ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Maybe them boys in Jonesboro were trying out for Lon Horiuchi's job. From webmaster at sexlink.net Thu Mar 26 12:00:32 1998 From: webmaster at sexlink.net (webmaster at sexlink.net) Date: Thu, 26 Mar 1998 12:00:32 -0800 (PST) Subject: Put your subject line here Message-ID: <199803262000.MAA17811@toad.com> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ This is a subscriber mailing and is intended for Adult Webmasters Only. If you have received this e-mail in error you need only reply and your e-mail address will be removed from this list. vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv EARN $20.00 PER NEW MEMBER ============================================= Join the fastest growing XXX webmaster program today! For every new member you will receive $20.00 on each new $24.95 membership. Click Here http://www.xxxmarketing.com/ac/index.htm GAY WEBSITE PARTNER PROGRAM PAYS $15.00 ================================================ Add an alternative to your straight site or add this excellent webmaster program to you Gay site today. This program pays out $15.00 per new membership of $19.95 Click Here http://www.xxxmarketing.com/americanstuds/index.htm XXX FUN 4 U AND SO IS THE $$$$MONEY$$$ ================================================ Hot New XXX Hardcore site offers excellent partnership program. For every new sign-up you will receive $15.00 per new member. Click Here http://www.xxxmarketing.com/xxxfun/index.htm OPEN YOUR OWN XXX ADULT STORE FOR FREE TODAY ============================================= Earn an average of $1,500.00 per month for adding a NEW Adult Store to your website. Our store looks just like your website! We do all the work! We ship, we process, we host, we do it all. Your only responsibility is marketing and promotion. We pay you a commission of 15% plus a 3% over-ride! Click Here http://www.xxxmarketing.com/store/index.htm INCREASE YOU TRAFFIC....INCREASE YOUR SALES =========================================== The SEX LINK NETWORK is giving you 2,500 FREE BANNER ADS just for joining one of the most successful adult banner exchange programs on the internet. Join right now and you will be credited with 2,500 FREE ad, but this offer won't last long act today if you want the FREE BANNER ADVERTISING. Click Here To Join http://www.xxxmarketing.com/sexlink/index.htm From ptrei at securitydynamics.com Thu Mar 26 13:07:08 1998 From: ptrei at securitydynamics.com (Trei, Peter) Date: Thu, 26 Mar 1998 13:07:08 -0800 (PST) Subject: FW: U.S. Official Cites Key Escrow Flaws Message-ID: <6B5344C210C7D011835C0000F801276601003642@exna01.securitydynamics.com> Found this in sci.crypt. I'm suprised it didn't hit the lists yet. Peter Trei trei at ziplink.net > -----Original Message----- > From: epic-news at epic.org [SMTP:epic-news at epic.org] > Sent: Wednesday, March 25, 1998 11:37 PM > Subject: U.S. Official Cites Key Escrow Flaws > > > ================================================================== > > U.S. OFFICIAL CONCEDES THAT "KEY RECOVERY" ENCRYPTION > IS INFERIOR TO ALTERNATIVE PRIVACY TECHNIQUES > > > FOR IMMEDIATE RELEASE CONTACT: > Wednesday, March 25, 1998 David Sobel/Dave Banisar > (202) 544-9240 > > WASHINGTON, DC -- A top U.S. official acknowledged more than a > year ago that the Internet privacy technique championed by the > Clinton Administration is "more costly and less efficient" than > alternative methods that the government seeks to suppress. The > concession is contained in a newly-released high-level document on > encryption policy obtained by the Electronic Privacy Information > Center (EPIC). > > In a November 1996 memorandum to other government officials, > William A. Reinsch, the Commerce Department's Under Secretary for > Export Administration, discussed the Administration's efforts to > promote "escrowed" or "recoverable" encryption techniques in > overseas markets. Such techniques enable government agents to > unscramble encrypted information and they form the cornerstone of > current U.S. encryption policy. > > After noting that government regulations permit the export of non- > escrowed encryption products only to "safe end-users" such as > foreign police and security agencies, Reinsch recognized the > inferiority of the Administration's favored technology: > > Police forces are reluctant to use "escrowed" encryption > products (such as radios in patrol cars). They are more > costly and less efficient than non-escrowed products. > There can be long gaps in reception due to the escrow > features -- sometimes as long as a ten second pause. Our > own police do not use recoverable encryption products; > they buy the same non-escrowable products used by their > counterparts in Europe and Japan. > > Ironically, Reinsch's concession is contained in a memorandum that > discusses the Administration's strategy to "help the market > transition from non-recoverable products to recoverable products." > According to EPIC Legal Counsel David Sobel, the newly released > document "suggests that the Clinton Administration is trying to > sell key recovery technology while quietly recognizing its > inferiority. This approach will ultimately weaken the global > position of the American computer industry and hold back the > development of the privacy protections so badly needed on the > Internet." > > EPIC and other critics of current U.S. encryption policy have long > maintained that "key escrow" and "key recovery" approaches > compromise the security of private information by providing > "backdoor" access to encrypted data. > > The Reinsch memo was released in response to a Freedom of > Information Act request EPIC submitted to the Department of State > concerning the international activities of former U.S. "crypto > czar" David Aaron. That request is the subject of a pending > federal lawsuit initiated by EPIC last year. > > The memorandum is available at the EPIC website at: > > http://www.epic.org/crypto/key_escrow/reinsch_memo.html > > > - end - > > . From toto at sk.sympatico.ca Thu Mar 26 14:50:40 1998 From: toto at sk.sympatico.ca (Toto) Date: Thu, 26 Mar 1998 14:50:40 -0800 (PST) Subject: WordSmith Crypto -- Fw: AWADmail Issue 8 Message-ID: <00c101bd591a$1d493280$2a63a58e@uymfdlvk> -----Original Message----- From: Wordsmith To: linguaphile at wordsmith.org Date: Thursday, March 26, 1998 1:35 PM Subject: AWADmail Issue 8 > AWADmail Issue 8, March 26, 1998 > A Compendium of Feedback on the Previous Week's Words in AWAD, > and Other Interesting Tidbits about Words and Languages > >------------------------------ > >From: Anu Garg (anu at wordsmith.org) >Subject: AWADmail is back! > >AWADmail is back after a long hiatus. Last week's theme, "Words whose >pronunciations differ a lot from their spellings" generated a huge response. >Some sent their favorite words in this category (colonel coming at the top >of the list), while others forwarded poems lamenting the intractability of >English orthoepy and orthography. Here are selected responses. > >------------------------------ > >From: E. Richard Cohen (ercohen at aol.com) >Subject: Phonetic Pronunciation > >In line with this week's critique of English pronunciation, dare I bring up >George Bernard Shaw's plea for spelling reform with the word 'GHOTI" > >GH as in "rough" >O as in "women" >TI as in "nation" > >GHOTI = "fish" > > Also noted by Marc J. Broering (dad at louisville.edu), Ted Schipper > (ted.schipper at utoronto.ca), (Tim Nelson) tsn at deakin.edu.au, Sheila > Crosby (sheila at ing.iac.es), Vimala Rodgers (vimala at iihs.com) and > martina at aol.com. -Anu > >------------------------------ > >From: Derek Winkler (derek at aim-systems.on.ca) >Subject: Ruminations & Ponderances > >It's funny that a couple of the words you're featuring for being pronounced >differently than they are spelled have French origins. Being from Canada and >therefore being exposed to French, I look at the word and think "What do you >mean pronounced differently then they are spelled, how else would you >pronounce oeuvre." > >------------------------------ > >From: David Isaacson (isaacson at wmich.edu) >Subject: Another Pronunciation for "chaos" > >One of the characters in Sean O'Casey's play, "Juno and the Paycock," (it's >either Captain Jack Boyle or his sidekick "Joxer" Daly) regularly >mispronounces this word as "chassis." > >------------------------------ > >From: Fred Bartlett (fredb at springer-ny.com) >Subject: Chaos > >When I traveled to the old Soviet Union to edit the proceedings of a >conference on nonlinear dynamics, I was baffled by the (English) speech >of my Russian colleagues. They kept talking about "House" -- that is, >"chaos". It was all perfectly reasonable (though wrong, of course): >transliteration to Cyrillic and then pronunciation as if it were Russian. > >------------------------------ > >From: Steve Royster (roysters at sec.gov) >Subject: Re: A.Word.A.Day--rendezvous > >I was willing to let oeuvre pass after I mistook it initially for the French >word for "egg." I learned something on that one. But isn't "rendezvous" a >direct French import? > > See next message. -Anu > >French, as the comedian Steve Martin has noted, is more torturous than >English: "It's like those French have a different word for everything!" On >the album "A Wild and Crazy Guy," from early in his oeuvre, Martin describes >a man who dies trying to speak French. > >------------------------------ > >From: Ken Maher (ken_maher at nhmbm1.dos.nortel.com) >Subject: Re: A.Word.A.Day--chaos > >Your note on the need for pronunciation guidance in English reminds me of >what I used to tell students when I taught English as a second language for >ten years, mostly to native speakers of Spanish, Arabic, or Swahili. All >languages are thieves, but most languages have the good sense to hide what >they've stolen by making it look like their own. English, however, is more >vain or, perhaps, careless, and often keeps the stolen goods in their >original forms. For example, when Spanish stole the word for driver from >French, it changed the spelling to "chofer," whereas English kept it as >"chauffeur." This linguistic practice makes English one of the most >difficult of the Latin-alphabet languages to learn to spell. > > In polite company it is called borrowing. Whether these > loanwords are ever returned is another matter. -Anu > >------------------------------ > >From: Bob Simmons (bsimmons at compassnet.com) >Subject: (Mis)pronunciation Guide > >While I applaud your intention to include pronunciation in AWAD, I think you >should look for another source. Specifically, I have a problem with each of >the last three days' pronunciations: > >oeuvre (oe-VRUH) -- since this one retains its French pronunciation, it is >just about impossible to render in English. When I say it, it sounds more >like e(r)-vra (with neither syllable accented). The way you've written it, I >would say e(r)-VREW. > >segue (SAG-way) -- I have never heard this pronounced other than SEG-way > >rendezvous (RAN-day-voo) -- I would argue that RON-day-voo is closer. > > > While reducing a spoken sound to its written form is tough enough > in any language, it is nearly impossible to accurately represent > pronunciation information using only the lowest common denominator > of characters -- those found on a standard English keyboard. Not > all systems have the capability to show phonetic characters. (Once > Unicode is more widely adopted, it would be possible to show all > IPA characters but for now we have to do with the seven bit ASCII > character set). It must also be noted that the pronunciation of > words varies a great deal from region to region and any single way > of pronouncing a word cannot be called the only correct one. In that > spirit, the pronunciation guide provided with the words here should > be taken as an approximation and not as a precise phonetic equivalent. > > If you disagree with a given pronunciation or anything else in AWAD, > please drop me a line at anu at wordsmith.org. Due to large volume of > messages, I can't always respond to you but I do read all messages. -Anu > >........................................................................... ... >Every other author may aspire to praise; the lexicographer can only hope to >escape reproach. -Samuel Johnson > >To see previous issues of AWADmail, visit www.wordsmith.org/awad/archives.html >You can get them by email too. Send a blank message to wsmith at wordsmith.org >with Subject line as: AWADmail nn, where nn is the issue number. For example, >to get the first issue, make the subject line as: AWADmail 01 . > From jya at pipeline.com Thu Mar 26 17:09:42 1998 From: jya at pipeline.com (John Young) Date: Thu, 26 Mar 1998 17:09:42 -0800 (PST) Subject: Junger v. USA Notice Message-ID: <199803270109.UAA12162@camel7.mindspring.com> To: pr_list4 at samsara.LAW.CWRU.Edu Subject: Press Release Date: Thu, 26 Mar 1998 15:37:38 -0500 From: "Peter D. Junger" Press Release New Judge to Decide Whether Export Restrictions on Software Violate Constitutional Guarantees of Freedom of Speech and of the Press Reply Briefs in Junger v. Daley Available on World Wide Web Government Argues that Much Software is Harmful ---------------------------------------------------------------- Cleveland, Ohio, Tuesday, March 26, 1998 For Immediate Release For More Information Contact: Peter D. Junger (216) 368-2535 Gino Scarselli (216) 291-8601 Or see URL: http://samsara.law.cwru.edu/comp_law/jvc/ To be added to, or removed from, the list of those who were sent this press release, please send e-mail to . _________________________________________________________________ Cleveland, Ohio, March 26 -- A status conference in the case of Junger v. Daley, the suit in which a law professor at Case Western Reserve University in Cleveland, Ohio seeks to enjoin the enforcement by the United States Department of Commerce of the export regulations on encryption software, will be held Friday, March 27, at 10:00 a.m. in the chambers of Federal District Judge James S. Gwin in the federal courthouse in Akron, Ohio. The case turns on the issue of whether the publication in electronic form of encryption software---software that is used to preserve the privacy of electronic communications and data stored on a computer---is entitled to protection under the First Amendment to the United States Constitution. Judge Gwin, a recent appointee to the federal bench who previously served on the Ohio Court of Common Pleas, has replaced Judge Donald C. Nugent as the judge responsible for the litigation. The plaintiff, Professor Peter Junger, who teaches a course in Computing and the Law and who wishes to publish his class materials containing some encryption programs on his World Wide Web server, seeks an injunction against the enforcement by the defendant, Commerce Secretary Daley, of the export regulations promulgated the Department of Commerce that require anyone who wishes to publish encryption software of the Internet or on the World Wide Web to first obtain a license from the Bureau of Export Administration. Both sides have filed for summary judgment. Junger argues that the freedoms of speech and of the press that are secured by the First Amendment protect the writing and publication of computer programs. The government, on the other hand, argues that computer programs are not entitled to the protection of the First Amendment because they are ``functional''. Each side has filed a brief in support of its motion for summary judgment. These briefs and the complaint and motions for summary judgment are available at and . In addition both sides have filed reply briefs that are now available at: In his reply brief the plaintiff's lawyers argue: ``Making software available on the Internet and the World Wide Web is publication of that software, and publication in that medium is entitled to the unqualified protection of the First Amendment.'' The government responds to this argument in its reply brief by claiming that software is a ``functional item'' and thus not entitled to protection as speech. In furtherance of this claim it points out, ``Much software ... is designed to cause substantial harm,'' and that ``software can be used to invade privacy, commit fraud, and substantially disrupt and endanger people's lives.'' ``That is rather a perverse argument,'' says Junger, ``considering that encryption software is used to protect against exactly the harms that the government lists and that there is no law against the use of encryption software, while, of course, there are laws against invading privacy, committing fraud, and substantially disrupting and endangering people's lives. It is clear that the government does not claim just the right to regulate the writing and publication of encryption software. It claims the right to forbid the writing and publication of any type of computer program whatsoever without being in any way restricted by the First Amendment. There are, of course, some types of speech, like obscenity, that the courts have held are not entitled to the protection of the First Amendment, but no court has ever subscribed to the government's remarkable theory that the First Amendment does not protect functional speech.'' ``My case,'' says Junger, ``is not just about the constitutionality of the regulations forbidding the export of encryption software, though that is an extremely important issue. The real issue is whether the First Amendment protects the writing and publication of any type of computer program.'' -30- From 32685944 at 28723.com Thu Mar 26 18:25:22 1998 From: 32685944 at 28723.com (32685944 at 28723.com) Date: Thu, 26 Mar 1998 18:25:22 -0800 (PST) Subject: Try It Before You Buy It Special ! 45 Million Email Leads + Next Generation Mailers !!! Message-ID: Prices are skyrocketing as Non Democratic forces and Mail Censors take Control of the internet,deciding Who gets to advertise and to Whom ! Look for those little aol notices when You try to access certain mail, You can't ! They have already looked at Your mail and decided You CAN'T have it, period ! But be aware, a little knowledge makes You dangerous, So let Your Congressional Representative know that You are getting Wise to what's going on with the big three power play. More info maybe available in later dispatchs. ( If the empire doesn't strike first ) But if You still wish to advertise that product or service, better do it now, establish Yourself ! While You still have that freedom to do so. ADVERTISE TO MILLIONS! PLUS ( Secret new technology offer) Do you have a product or service that you want to market? Direct emailing is the most cost-effective way to advertise not only on the Internet, but out of any marketing media. Where else can you get your ad to millions for so little? We have helped thousands get their ad out in mass numbers. We offer the following: 7 Million email addresses - $99 + a full feature 10 day Stealth Pro Emailer demo 15 Million email addresses - $199 + a full feature 10 day Stealth Pro Emailer demo 25 Million email addresses -$249 + a full feature 10 day Stealth Pro Emailer demo 45 Million email addresses - $299 + a full feature 10 day Stealth Pro Emailer demo Stealth Mass Mailer the worlds most powerful bulk email program. Stealth allows you to send between up to 400,000 emails per hour. But, please be responsible and keep Your numbers in the 5-10k range, if Your well thought out ad for a good product or service is delivered to that number of recipients, ( a Good list with as many of the Flammers and Cyber Stormtroopers squeezed out as possible ) and You Will get responses ! Windows 95 only. Also included is step by step instructions. PLUS Rapid Fire Emailer ! Its Un-Stopable Our Next Generation Mailer does not use your ISP's Server. It acts as its own Mail Server! This Mailer sends email messages directly to your recipients Mail Server ! The software Delivers each and every message right before your eyes direct to the receipient, with no ques, and no deleting. One reason bulk email is so frowned upon with numerous ISP's is people try to send as much mail as they can, as quick as they can and crash the mail server of the ISP. This won't happen with Our Server software since you don't use the mail server of the ISP to send your mail. The program actually sends the mail directly from your computer which is now a bona fide mail server, to the recipients mail server avoiding any potential blocks that would prevent you from reaching those on your mailing list. You do not have to "forge" headers or randomize anything to have 100% of your mail delivered, although the program does allow for randomization and customizing of headers. You can send mail omitting the "to" "from" and "reply to" portions of your headers. Want to send out your messages in color. Not a problem ! Just select a font color with your mouse, and then click on a background color as well. Want to make your font bold or put it into italics, just point and click. Want your message centered or shifted left or right, once again just point and click. Rapid Fire Mail Server works with any Windows 95 or NT computer. It requires no additional hardware or software. The Rapid Fire Mail Server sends at speeds up to 80,000 messages per hour DELIVERED using a modest pentium and a 28.8 modem. Rates will dramatically increase with an ISDN or cable modem and of course with a T-1 they will be even faster. Call for a Free Three day fully functional demo ! This is the wave of the Future ! OR We Can Mail For You now, while these prices last !!! Advertise to 2 Million people for $995. Advertise to 5 Million people for $1995 Advertise to 10 Million people for $2995 Advertise to 25 Million people for $4995 Start earning mega money and get started now! > > > If you have any further questions call our Marketing Department at: (504) 649-6248 Try It Before You Buy It Special !!! For the next 10 days, We will give You a Free Next Generation Mailer ( 3 day Demo), Plus 30 Thousand Email addresses (Your Choice) for only $19.95, 50 thousand for $29.95. Try three versions of Your own ad for selling goods, services, or whatever to aol,mci,compuserve,prodigy,etc, prospects before investing a few hundred dollars into millions of addresses and a fast effective Next Generation Mailer. Remember, just one order from a 10k list equals out to 4,500 orders if mailed to all 45 million available. Don't miss out on this opportunity to test market Your product, Cheap !!! > We accept Visa, Mastercard, AMEX,Discover Card, Checks by Mail. ------------------------------------------------------------------------------------------------------------ > > DATE_____________________________________________________ > > NAME____________________________________________________ > > COMPANY NAME___________________________________________ > > ADDRESS_________________________________________________ > > CITY, STATE, ZIP___________________________________________ > > PHONE NUMBERS__________________________________________ > > FAX NUMBERS_____________________________________________ > > EMAIL ADDRESS___________________________________________ > > > > TYPE OF CREDIT CARD: > > ______VISA _____MASTERCARD _____AMEX > > CREDIT CARD# __________________________________________ > > EXPIRATION DATE________________________________________ > > NAME ON CARD___________________________________________ > > AMOUNT $____________________ > ADDRESS ____________________ CITY - STATE - ZIP __________________________ > If different from Above. > DATE:x__________________ OR fax Your order to [504]-781-6615 > *Please select one of the following for shipping.. > ____I would like to receive my package OVERNIGHT. I'm including > $19 for shipping. (outside US add an additional $15 for shipping) > ____I would like to receive my package 2 DAY delivery. I'm including > $10 for shipping. (outside US add an additional $15 for shipping) Send check or money order to: Over Nite Letter Type > 230 West Hall Ave. > P.O.Box 202 > Slidell,La.70460 Member of National Organization of Internet Commerce. To have your name added to our universal remove list please go to remove at noic.org and your name will be added and distributed to all of our members This advertisement is brought to You by the Rebel News Agency. 45rv2d z-u 38as 296 s From nms123 at usa.net Thu Mar 26 19:47:02 1998 From: nms123 at usa.net (nms123 at usa.net) Date: Thu, 26 Mar 1998 19:47:02 -0800 (PST) Subject: !Accept Credit Cards! *When your Bank Says "NO" We Say "YES" Message-ID: <199802045346.GAK09957@usa.net> ATTENTION ALL SMALL/HOME BUSINESSES NATIONWIDE: We are here to Help YOU! Losing Sales? !Accept Credit Cards! *Internet Merchants* *Home Base Business* *Mail Order Business* *Start Up Business* *BAD CREDIT* *NO CREDIT* Be able to honor: Visa, Master Card, American Express, Discover. This service will establish your company as an authorized merchant to receive payments from your customers who may use Credit Cards. Approval and Processing from your COMPUTER OR TERMINAL. *When your Bank Says "NO" We Say "YES" Also looking for a TRAFFIC BUILDER for your location? we can set up: "YOUR OWN ATM CASH MACHINE" or "A FREE ATM CASH MACHINE!" in your location and you will be earning money on each transaction made in the installed machine. The secret to bringing customers to your location will be centered on the ability you may have to provide a unique service of product that makes out of your place, a mandatory convenience stop. We will be more than happy in assisting you in clarifying questions and doubts about this business opportunity. Double click here to e-mail us: mailto:jberrio at mail.datanet.com.mx jberrio at mail.datanet.com.mx And double-click here to visit our WEBSITE: http://www.vicom.net/nms/index.html http://www.vicom.net/nms/index.html From ddt at lsd.com Fri Mar 27 04:37:28 1998 From: ddt at lsd.com (Dave Del Torto) Date: Fri, 27 Mar 1998 04:37:28 -0800 (PST) Subject: anti-snoop RF detector Message-ID: Anyone have any info on this "Series Technology" company? dave ................................. cut here ................................. [ WhiteBoard News Excerpt: Wed 18 March 1998 ] Taipei, Taiwan: Taiwan's high-tech "peeping Toms" may have met their match in the form of a pocket-sized device designed to detect pornographers' hidden cameras. The "Discovery I" device, which resembles a pager, detects radio waves emitted by the wireless remote-control cameras that criminal groups have installed some hotel rooms, toilets and department store fitting rooms to spy on unsuspecting patrons. Pictures taken by such cameras of couples having sex or women trying on garments are widely available in Taiwan's underground pornography market. "Hopefully this device can give people more assurance when they are in public establishments," said a representative for Series Technology, which launched the detector Tuesday. Several cases have come to light in Taiwan in recent weeks in which people have bought pornographic videotapes, only to discover themselves as the featured attraction. Police are cracking down on the illegal practice, using far more sophisticated scanners, and have made numerous arrests. From zeus at alt.net Fri Mar 27 07:24:42 1998 From: zeus at alt.net (Dr. Zeus) Date: Fri, 27 Mar 1998 07:24:42 -0800 (PST) Subject: Youwon'thave?To?Totokickaroundanymore... In-Reply-To: <35170F43.2C65@sk.sympatico.ca> Message-ID: <351BC489.3AC7@alt.net> Toto wrote: > > sincethedeathofGomez,myunclehashadadrinkinhishandconstantly,exceptwhen > hehasdroppeditonhiskeyboard,fuckingitupandmakingitdostrangethings,suchas > nolongermakingspacesappearwhenhepressesthespacekey,whichisnormally > calledsomethingelse,however,Ican'ttellyouwhatitscalled,sincethekeyusedtospell > itdoesn'twork,either. > (hint,veavsi&vutthead,vadvoy-vadvoy-whatcha-gonna-do,whatchagonnadowhen > theycomeforyou?,iputthequestionmarkinvyhittingtherightenterkey...) > tousetheshiftkeyIhavetotypeanextraletter,sincetheshiftkey,leftone,doesadelete- > vackspacevevoreaddingtheshiftedcharacter. > thedeathofgomez,whichhappenedwhenthe?N?S?A-?C?I?A?(therightshiftkey > addsaquestionmarkveforeaddingtheshiftedcharacter) > > writingthisislikewhatmyuncletellsmeavoutveingonlsd,hee-hee... > couldsomeonesendthisto-villg-at-microsoft.com,please,sinceican't > typeayou-know-what-inthecccolonfield?(iputthatquestionmarkinvyhitting > the?keywithoutdoingashiftkey--also,ifiguredoutthatthe'v'key,youknowwhich > oneimean,doesa'control-v',sinceittriestomakethecharacters'vold'wheni > hititvymistake. > andcoulddavesmithputthisonhissightasprologue-numverslash0.?(thenumver > onekeydoesn'tworkeither,vuticanputaquestionmarkattheendofasentence > andthenuseparenthesiswhilesavingakeystrokevecausethekeyvoardputs > the?inautomaticallywheniusetherightshiftkey. > itisreallyweirdtypingthisstuffwithakeyvoardthatdoesthingsthatarenotdone > thewaythatmyvrainandfingersarewired.ivetthatificouldputspacesinthis, > thateveryonewouldthinkthatjohnyoungwaswritingit. > > anyway,ifanyofyouarereally,reallystoned,sostillreadingthisvecauseyou > understanditanddon'tseeanythingoddavoutit,couldyoudoakeywordsearch > inyahoomountaindeworsomeothersearchengineforaprogramthatletsa > personcustomizethekeyvoardsothattheycanusedifferentkeystomakethe > charactersthatdon'tworkonthiskeyvoard,andsenditvyemailto-toto-at-the > addresswhereallthespamvullshitandcrapolatothecypherpunkslistcomes > from?--iamaskingyoutodothisvecausehefuckedupmycomputer,2. > myuncleisjustanoldvrokendowndrunkenasshole,vuticanfixhiscomputer > ifigetakeyvoardcustomizingprogram,sothanksifyoucansendit. > > ifsomeonecoulddothis,theniwouldpromisetoquitaskingthecypherpunks > womeniftheyarewearingpanties--i'mlying,vuti'mjustakid... > ok,vuticouldofferyouavlow-jovifyoudoit,fromoneofvianca'schild-girl > apprentices,althoughtheywillkillmewhentheyreadthis... > > ok,i'mgoingnow,vutihopesomeonewillsendmeaprogramthatwill > helpmefixmyuncle'scomputer,evenifhewilluseittospamyourmailing > listwithstuffthatyoushouldvelisteningto,exceptthathemakesitsothat > youcan'tunderstandwhathe'ssayingunlessyoureallydoputacorkin > yourassholesothatyoucanquitthinkinglikeasheeple. > > thanks, > humangus-peter > ?(anotherguywhosendsyoushitthatyouwishpeoplewouldstopsending > toyourmailinglist,eventhoughithinkyouguysarecool,eventhegrouchy > onesliketimmayandthespookyguyslikekentcrispinwhowouldprovavly > veacircleofeunuchsguyiftheyweren'twatchinghimsoclose--he'sstill > alive,likedalethorn.?) > isn'titcoolhowiautomaticallygetaquestionmarkveforetheparenthesis,and > canmakeaquestionmarkwithoutusingtheshiftkey? > pps-ifyoudon'tunderstandsemiotics,thentherearekidsinsaskatchewan > whoaresmarterthanyou,evenifyouknowavoutplutoniumdecayratesand > wheretheyellowwiregoes. > i'llquitveforeyouthinki'mascrazyasmyuncle. > ppps-i'malwaysaskingpeoplewhopostfrom?A?(h?)?O?Liftheyarewearing > panties,vuttheydon'tgetthejoke,andi'mnotsurethatido,either,vuti'mgoing > tokeepondoingit. > pppps-anarchistusedeltekeys,they'reimmortalcypherpunks... Attilla is a faggot cocksucker... From manager at musicblvd.com Fri Mar 27 10:33:01 1998 From: manager at musicblvd.com (http://MusicBLVD.com/) Date: Fri, 27 Mar 1998 10:33:01 -0800 (PST) Subject: Congratulations! Message-ID: <3.0.32.19980326191942.007a1210@mail.sparknet.net> Congratulations! Music Boulevard has been voted the Top Music Store on the web in a USA Today readers poll*, and we owe our success to you! As a loyal customer, please share in the celebration and take *** $10 DOLLARS *** OFF OF YOUR NEXT ORDER. More big news: Now, earn frequent flyer miles and get free shipping! Just buy three items or more on Music Boulevard. Click Here to celebrate: http://musicblvd.com/celebrate Share this special offer with a friend! Forward this to anyone you know who hasn't yet experienced the best way to buy music online. Again, many thanks for helping us become the Best Music Store on the web. P.S. This offer is good only until March 31. Don't miss out on the celebration! *March 11, 1998 TO UNSUBSCRIBE: To unsubscribe from this mailing list, send an email to: remove-musicblvd at sparklist.com and you will be automatically removed from this list. From bill.stewart at pobox.com Fri Mar 27 11:27:05 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 27 Mar 1998 11:27:05 -0800 (PST) Subject: Fwd: 10 Laws the Net Needs - Article/Survey Message-ID: <3.0.5.32.19980327112541.0094a6d0@popd.ix.netcom.com> Sigh. Another control freak concerned about the anarchy of the Net is doing a survey. Voting is still open, and I'd encourage you to go see the mix of opinions of the 8000 or so current voters and add your own. ------- Forwarded Message Follows ------- From: http://www.cnet.com/Content/Features/Dlife/Laws10/index.html 10 Laws the Net Needs CNet Features By Susan Stellin (3/23/98) When the U.S. Congress passed the Communications Decency Act in 1995, Net activists staged a collective revolt. Protestors set up anti-CDA Web pages, launched campaigns to stop Net censorship, and hit the streets to voice their opposition. When the Supreme Court struck down the CDA, many online activists breathed a sigh of relief. But as it turns out, that law was just a preview of things to come. This year, there are more than 50 bills before Congress that propose some kind of Internet regulation. And policymakers from China to the European Union have been equally busy. Like it or not, this genie's been let out of the bottle; Net laws are on the way. So as the saying goes, if you can't beat 'em, join 'em. We've taken the lead on this one and drafted ten of our own Internet laws: proposals dealing with real issues like the proliferation of spam, the invasion of online privacy, and yes, the too-easy access to pornography. Some of our ideas match bills Congress is already considering; others address problems that Washington hasn't thought of yet. Brazen? You bet. In fact, not everyone at CNET agrees with all of these proposals--and you may not either. So we've decided to put them up for a vote. We've paired each law with an electronic ballot box. So exercise your (virtual) right to vote, and let us know how on-track--or off-base--our ideas are. The polls are open... Susan Stellin is an executive editor at CNET. The ideas expressed in this article are her own and do not necessarily reflect the opinions of CNET: The Computer Network or its executives, board of directors, TV hosts, public relations department, yadda yadda yadda. Susan's mom, however, agrees with everything in here. For the full article and voting see: http://www.cnet.com/Content/Features/Dlife/Laws10/index.html -------------------------- Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From wowcom at ctia.org Fri Mar 27 12:57:11 1998 From: wowcom at ctia.org (wowcom at ctia.org) Date: Fri, 27 Mar 1998 12:57:11 -0800 (PST) Subject: WOW-COM Registration Message-ID: <0ee7b5057131b38MAIL@uunt.net> Dear cypherpunks: Welcome to WOW-COM(TM), the Internet home page for wireless industry professionals. You join thousands who enjoy free access to the wireless marketplace, up-to-the-minute industry news, analysis and opinions from industry leaders, career opportunities, and research from CTIA and other experts. When you visit WOW-COM(TM) in the future, you should arrive at the red WOW-COM(TM) professional page. If your computer sends you to the blue consumer page, please use the site�s e-mail system to contact us, and we will assist you. We look forward you your continued participation in our on-line wireless community. Sincerely, The WOW-COM(TM) Team Mailto:wowcom at ctia.org http://www.wow-com.com From search at peoplefinders.net Fri Mar 27 13:03:36 1998 From: search at peoplefinders.net (Debt Collectors) Date: Fri, 27 Mar 1998 13:03:36 -0800 (PST) Subject: GOOD NEWS ABOUT BAD ACCOUNTS Message-ID: <199803272103.NAA28543@toad.com> PROFESSIONAL, EFFECTIVE DEBT COLLECTION SERVICES AVAILABLE For the last fourteen years, National Credit Systems, Inc. has been providing top flight debt collection services to over 9,000 businesses, institutions, and healthcare providers. We charge only a low-flat fee (less than $20) per account, and all proceeds are forwarded to you directly -- not to your collections agency. If you wish, we will report unpaid accounts to Experian (formerly TRW), TRANSUNION, and Equifax. There is no charge for this important service. PLEASE LET US KNOW IF WE CAN BE OF SERVICE TO YOU. Simply reply with the following instructions in the "Subject" field: REMOVE -- Please remove me from your mailing list. EMAIL -- Please email more information. FAX -- Please fax more information. MAIL -- Please snailmail more information. CALL -- Please have a representative call. Indicate the best time to telephone and any necessary addresses and telephone/fax numbers in the text of your reply. If you prefer you can always telephone us during normal business hours at (212) 213-3000 Ext 1467. Thank you. P.S. -- If you are not in need of our services at this time, please retain this message for future use or past it on to a friend. Thank you. From shamrock at cypherpunks.to Fri Mar 27 16:21:19 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Fri, 27 Mar 1998 16:21:19 -0800 (PST) Subject: Fwd: 10 Laws the Net Needs - Article/Survey In-Reply-To: <3.0.5.32.19980327112541.0094a6d0@popd.ix.netcom.com> Message-ID: On Fri, 27 Mar 1998, Bill Stewart wrote: > Sigh. Another control freak concerned about the anarchy of the Net > is doing a survey. Voting is still open, and I'd encourage you to > go see the mix of opinions of the 8000 or so current voters > and add your own. > > ------- Forwarded Message Follows ------- > From: > http://www.cnet.com/Content/Features/Dlife/Laws10/index.html Predictably, the vast majority of those participating in the poll favor statist solutions over freedom. Which of course holds true for the population at large. -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From GILLILIGAN at aol.com Fri Mar 27 20:34:53 1998 From: GILLILIGAN at aol.com (GILLILIGAN) Date: Fri, 27 Mar 1998 20:34:53 -0800 (PST) Subject: Hi im Sandra Message-ID: <2175a0eb.351c7db6@aol.com> � To: GILLILIGAN at aol.com Subject: Hi im Sandra From: GILLILIGAN Date: Fri, 27 Mar 1998 23:22:59 EST Organization: AOL (http://www.aol.com) hi my name is Sandra i am an 18 year old model from Italy..Me and my friends made a webpage with our pictures on it...tell me if im pretty.. Click here to see our pictures From toto at sk.sympatico.ca Fri Mar 27 21:05:57 1998 From: toto at sk.sympatico.ca (Toto) Date: Fri, 27 Mar 1998 21:05:57 -0800 (PST) Subject: GRAND JURY: Jonesboro Guilty, Society and Christianity Indicted As Co-conspirators Message-ID: <351C9E6E.FF00180C@sk.sympatico.ca> [Bienfait Nutly News:] A GRAND JURY CONVENING DURING HAPPY HOUR at the CoalDust Saloon took to heart the Arkansas Govenor's statement that, "We need to lay the blame for the Jonesboro tragedy squarely at the feet of the culture that breeds this kind of response in a child." The Grand Jury forebroad noted that the child perpetrators had neither been to Hollywood, nor to any art gallerys funded by the National Foundation for the Arts against the wishes of various 'Family Values' coalitions. "It's pretty clear that these murderous young monsters are an end result of the cultural influences they were exposed to in the course of being brought up in the community of Jonesboro. Accordingly we have returned an unasked- for verdict of 'guilty' against the citizens of that community, and have indicted two others who we feel acted as co-conspirators in this tragedy." The Grand Jury released two beer-stained items of evidence that they had used in their drunken deliberations: * "Road Rage" gets the attention, but more rages are coming into prominence: Pre-pay Rage, Albuquerque, N.Mex., January (a man wanted to pump his gas before he paid; fired several gunshots into the clerk's car). Late-Fee Rage, McLean, Va., January (former State Dept. lawyer was not allowed to rent a movie until he settled an old late fee; ran down the store owner with his car, knocking him through the window of a nearby restaurant). Rain Rage, Los Angeles, February (as two men passed in the rain, their umbrellas accidentally touched; one man then aimed his umbrella at the other's face and thrust the tip through his eye, piercing his brain, sending him to the hospital in critical condition). ~WEIRDNUZ.526 (News of the Weird, March 6, 1998) by Chuck Shepherd * According to a September federal indictment in Des Moines, Iowa, Kenneth Ray Bruner (who is the stepson of a Pentacostal minister in Oklahoma City) led his seven accomplices in prayer three weeks earlier, asking for God's protection just before they set out to knock off Hermans Fine Jewelry. Bruner acknowledged, according to the indictment, "that they were going to do bad things but that they were not bad people." No one was hurt in the robbery, and everyone was behind bars by the following day. ~WEIRDNUZ.526 (News of the Weird, March 6, 1998) by Chuck Shepherd "If these were aberrations," the forebroad slurred, wiping drool off the corner of her chin and slapping the hand of President Clinton, who had passed out in the bar the evening before and stayed over for the trial, "that would be one thing, but these examples are just the tip of the iceberg." "It has been obvious for quite some time that both society and Christianity are way out of control, and there is no telling how much greater the damage they cause would be if these two entities were able to operate without the calming influence of gun-bearing paramilitarists, who can only be pushed so far before they begin to push back, themselves." The Grand Jury's released statement went fairly easy on the parents of the child warriors, pointing out that, from the moment of their birth, they became the SSN-registered property of the government, with the majority of their upbringing being controled by the many laws regulating the manner and nature of education and discipline that their parents are allowed/required to provide for them. "Had the parents taken a strong hand in the discipline and direction of their children's education, they would have been vulnerable to prosecution for a variety of serious offenses, and it is likely the government would have revoked the parents' possession of the child-property in question. "As well, most members of the community of Jonesboro, the surrounding social community, and the Christian community, would have undoubtedly used every available law and law enforcement agency at their fingertips to prevent the parents from helping their children to escape beyond the reach of 'We the Sheeple.'" A barmaid with a Rose Tattoo on her butt nodded in agreement as this portion of the Grand Jury's statement was read. The woman had fled Jonesboro the day before the shootings with her own son, having kidnapped him from a Child Services detention center, where he was placed after a Christian neighbor had turned her in for allowing him to view her live-in boyfriend's Playboy magazines. "I feel kind of guilty for leaving other people's children behind, to suffer the consequences of living in such a dangerous community, but I'm already facing one count of kidnapping..." An informal tribunal of drunks and drug addicts returning from the restrooms questioned the Grand Jury's failure to indict the government. One gentleman paused from wiping foreign substances off of his shoes, to ask, "Since the government is the chief instigator and enforcer in the process of crushing the spirit of children, providing funding for most of the boxes that their free spirits are crammed into, as well as hunting down and putting in more secure boxes those who attempt to evade their responsibility to remain within the boundaries set aside to contain their number..." "Drawing outside the lines!" someone shouted. Nodding agreement, the gentleman continued, "...then surely they should have not only been indicted, as well, and found guilty, but they should have received the same penalty as those who backed the actions of the Waco murderers, according to the guidelines of the McVeigh Convention, as passed by the Mulatohma Citizen's Tribunal presided over by Judge Bell." "Well, we did return a few *secret* indictments," the forebroad grinned, with a wink to the gentleman, "but we're waiting for TruthMonger to figure out where the 'yellow wire' goes..." In the efforts of fairness, so not to be seen as engaging in yet another round of all-too-common Suburbian Christian bashing, the Grand Jury also released evidence that communities and religions far distanced from Jonesboro should think twice before gloating over "the anal-retentives finally getting theirs," as a dark-skinned, slant-eyed member of an obscure religious cult was heard to say, before suddenly dying of alcohol poisoning, whereupon his soul went up on the roof and the bartender dialed 911, asking them to send an ambulance and a Frisbeetarian Priest: * Dubious Salvations: In January in Jerusalem, self-described mystic rabbi David Batzri offered specialized blessings in person or by telephone for those who have sinned by masturbation (which he said is the principal cause of demons). And in Hong Kong in November, self-proclaimed "knight of God" Syed Atta Muhammad, 32, was committed to a psychiatric center after he assaulted a 22-year-old tour guide, whose breasts he thought were too big to serve God because they made her look like a prostitute. ~WEIRDNUZ.526 (News of the Weird, March 6, 1998) by Chuck Shepherd From proff at iq.org Fri Mar 27 22:59:10 1998 From: proff at iq.org (Julian Assange) Date: Fri, 27 Mar 1998 22:59:10 -0800 (PST) Subject: Deniable Cryptography [was winnowing, chaffing etc] In-Reply-To: Message-ID: mgraffam at mhv.net writes: > I figure the best we can do is to hide the contents of S with crypto and > hide its existence through other means. Traditional stego works well > for this latter goal, but it does not give us a way to cough up something > meaningful in place of S, which could be very handy. > > In short, certainly the existence of S needs to be hidden, and it would be > best to do hide it in plain sight as it were, in a big junk pile with > everything else on the drive. > > Indexing this huge mess of data to allow for a practical system to work > with is certainly a challenge, and in all likelyhood impossible given the > parameters of the system. > Marutukku (my rubber-hose proof filing system) addresses most of these technical issues, but I'd like to just comment on the best strategy game-theory wise, of the person wielding the rubber-hose. In Marutukku the number of encrypted extents (deniable "virtual" partitions) defaults to 16 (although is theoretically unlimited). As soon as you get over about 4 pass-phrases, the excuse "I can't recall" or "there's nothing else there" starts to sounding highly plauseable. Ordinarily best strategy for the rubber-hose wielder is to keep on beating keys out of (let us say, Alice) indefinitely till there are no keys left. However, and importantly, in Marutukku, *Alice* can never prove that she has handed over the last key. As Alice hands over more and more keys, her attackers can make observations like "the keys Alice has divulged correspond to 85% of the bits". However at no point can her attackers prove that the remaining 15% isn't simply unallocated space, and at no point can Alice, even if she wants to, divulge keys to 100% of the bits, in order to get the un-divulged portion down to 0%. An obvious point to make here is that fraction-of-total-data divulged is essentially meaningless, and both parties know it - the launch code extent may only take up .01% of the total bit-space. What I find interesting, is how this constraint on Alice's behaviour actually protects her from revealing her own keys, because each party, at the outset can make the following observations: Rubber-hose-squad: We will never be able to show that Alice has revealed the last of her keys. Further, even if Alice has co-operated fully and has revealed all of her keys, she will not be able to prove it. Therefor, we must assume that at every stage that Alice has kept secret information from us, and continue to beat her, even though she may have revealed the last of her keys. But the whole time we will feel uneasy about this because Alice may have co-operated fully. Alice will have realised this though, and so presumably it's going to be very hard to get keys out of her at all. Alice: (Having realised the above) I can never prove that I have revealed the last of my keys. In the end I'm bound for continued beating, even if I can buy brief respites by coughing up keys from time to time. Therefor, it would be foolish to divulge my most sensitive keys, because (a) I'll be that much closer to the stage where I have nothing left to divulge at all (it's interesting to note that this seemingly illogical, yet entirely valid argument of Alice's can protect the most sensitive of Alice's keys the "whole way though", like a form mathematical induction), and (b) the taste of truly secret information will only serve to make my aggressors come to the view that there is even higher quality information yet to come, re-doubling their beating efforts to get at it, even if I have revealed all. Therefor, my best strategy would be to (a) reveal no keys at all or (b) depending on the nature of the aggressors, and the psychology of the situation, very slowly reveal my "duress" and other low-sensitivity keys. Alice certainly isn't in for a very nice time of it (although she she's far more likely to protect her data). On the individual level, you would have to question whether you might want to be able to prove that, yes, infact you really have surrendered the last remaining key, at the cost of a far greater likelihood that you will. It really depends on the nature of your opponents. Are they intelligent enough understand the deniable spect of the cryptosystem and come up with the above strategy? Determined to the extent they are will to invest the time and effort in wresting the last key out of you? Ruthless - do they say "Please", hand you a Court Order, or is it more of a Room 101 affair? But there's more to the story. Organisations and groups may have quite different goals in terms of key retention vs torture relief to the individuals that comprise them, even if their views are otherwise co-aligned. I'm not talking about some mega-complex multinational 8 level hierarchy. A simple democratic union of two or more people will exhibit this behaviour. When a member of a group, who uses conventional cryptography to protect group secrets is rubber-hosed, they have two choices (1) defecting (by divulging keys) in order to save themselves, at the cost of selling the other individuals in the group down the river or (2) staying loyal, protecting the group and in the process subjugating themselves continued torture. With Marutukku-style deniable cryptography, the benefits to the individual derived from choosing tactic (1) are largely eliminated. Individuals that are "otherwise loyal" to the group, will realise this and choose tactic (2). Presumably most people in the group do not want to be forced to give up their ability to choose defection. On the other hand, no one in the group wants anyone (other than themselves) in the group to be given the option of defecting against the group (and thus themselves). Provided no individual is certain* they are to be rubber-hosed, every individual will support the adoption of a group-wide Marutukku-style cryptographically deniable crypto-system. * Actually a complicated threshold. Cheers, Julian From siowie5 at msn.com Sat Mar 28 04:39:28 1998 From: siowie5 at msn.com (Electric Email) Date: Sat, 28 Mar 1998 04:39:28 -0800 (PST) Subject: 68 Million Email Addresses - $99 Message-ID: <199803284186MAA45175@post.compuform.com> 68 MILLION EMAIL ADDRESSES FOR ONLY $99 You want to make some money? I can put you in touch with over 60 million people at virtualy no cost. Can you make one cent from each of theses names? If you can you have a profit of over $600,000.00 This offer is not for everyone. If you can not see the just how excellent the risk / reward ratio in this offer is then there is nothing I can do for you. To make money you must stop dreaming and TAKE ACTION. **************************************** PACKAGE A 68,000,000 email addresses on CD These name are all in text files ready to mail!!! $99.00 **************************************** PACKAGE B 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. $ 139.00 **************************************** PACKAGE C THE WORKS 68,000,000 email addresses on CD These name are all in text files ready to mail!!! AND 15 Different Bulk email programs and tools to help with your mailings and list managment. AND Over 500 diferent Business Reports now being sold on the internet for up to $100 each. You get full rights to resell these reports. With this package you get the email addresses, the software to mail them AND ready to sell information products. AND ...... . a collection of the 100 best money making adds currently floating around on the internet. $ 189 **************************************** SEVERAL WAYS TO ORDER !!! IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!! 1) WE ACCEPT: AMERICAN EXPRESS OR VISA <> MASTERCARD TYPE OF CARD AMX / VISA / MC??_______________ EXPIRATION DATE ___________________________ NAME ON CREDIT CARD________________________ CREDIT CARD #________________________________ BILLING ADDRESS ____________________________ CITY_________________________________________ STATE________________ZIP_____________________ PHONE INCLUDE AREA CODE___________________ EMAIL ADDRESS______________________________ WE WILL BILL selected amount to your account plus the following shipping costs SHIPPING COST OF 3.85 FIRST CLASS MAIL SHIPPING COST OF 15.00 24 HOUR EXPRESS MAIL / FEDERAL EXPRESS SALES TAX (7.25%) added to CA residents >>> Send correct amount in cash, check or money order to: >>> ELECTRIC EMAIL >>> 702 Mangrove Avenue, Suite 151 >>> Chico, CA 95926 2) Send the same above requested credit card information to above address. 3) Fax the same above credit card information to 530-895- 8470 4) Call phone # 530-876-4291. This is a 24 hour phone number to place a CREDIT CARD order. 5) FAX A COPY of your signed check to 530-895-8470. This is an EXCELLENT way to order without a credit card! Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider. Copyright 1998 All rights reserved Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. Amendment I, The US Constitution :-) From bastus7 at hotmail.com Sat Mar 28 05:15:42 1998 From: bastus7 at hotmail.com (Mihai Tarabuta) Date: Sat, 28 Mar 1998 05:15:42 -0800 (PST) Subject: sec file Message-ID: <19980328131510.10572.qmail@hotmail.com> Hi folks, I'm a newbie so I my be in a wrong place,. Anyway, can someone tell me what kind of program(MSDOS/WINDOWS) encrypts file(s) and as a result, it makes a file with ".sec" extension. The result file contains a header string "PNCICRYPT". Thanks. ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From proff at iq.org Sat Mar 28 08:42:53 1998 From: proff at iq.org (Julian Assange) Date: Sat, 28 Mar 1998 08:42:53 -0800 (PST) Subject: NRA support for crypto [was Rivest's Wheat & Chaff - A crypto alternative] In-Reply-To: <3.0.3.32.19980323132339.006a03e4@mail.clark.net> Message-ID: "Marcus J. Ranum" writes: > >Since when have you been a cryptographer, Marcus? > > Ever since I independently re-invented ROT-12 at the age of 12. :) I guess that was a bit mean. I'm just not sure one is really a cryptographer till one is spending the majority of their time doing it and earning a living (or a lot of respect) due to the quality of the work produced. i.e dabbling in cryptography != I've made significant contributions to the state of the art (I know you have made useful contributions to other parts of the security world). We .... is often used as a psychological ploy, to convince people the argument that follows is their own. Given that I strongly disagreed with the substance of your message, perhaps I took a dislike to the We .... business a little too eagerly. > >> Has anyone considered approaching the NRA for support for > >> cryptography?? If it is a munition, isn't our right to use it > >> domestically protected under the second amendment, just like > >> our right to keep and bear arms? > > > >Guns are made for killing people. Terrorists use guns. Terrorists > >kill people. Cryptography is guns. Terrorists use cryptography. > >Cryptography kills people. What a fantastic public relations ploy. > >The genius of it. > > D'uh, that's what FBI is saying already! So your suggesting putting your weight behind a tactical metaphor of the FBI? Effectively letting them control the landscape of the debate, by implanting into the public's minds that guns equal cryptography. Ok. You now have a situation where all strong cryptography is out-lawed (err, when was the last time you purchased a A42 tank cannon?) domestically, everything requires export permits (wadda ya mean I can't post my 10 gauge to Zurich without a license?!) and weak cryptography is exposed to a whole host of restrictions, including key size limitation (small arms only), speed limitations (it's dangerous to be able to encrypt too many messages quickly and automatically), usage registration (1 32 bit 8 round IDEA cipher and 2 40 bit barrel-loaded RC4's in farmer Jones' bedroom), cooling off periods (can't let people encrypt on a 'whim), exclusion of un-desirables (you want a crypto license and you haven't been in the state 3 months/had a psychiatric illness/were convicted of an offence/are under the age of 21/listen to NPR?!), necessity (I need that there 56 bit 8 rounder for rabbit 'crypting; I had to encrypt, officer, in a suburban environment - it was self defence against hardened criminal hackers!). > Cryptography is a tool for liberty! Cryptography was used to > save lives in the war! It's been used throughout history by > freedom loving men and women to fight oppression! It's as > American as apple pie! Breaking cryptography saved lives in the war, this is extensively documented over hundreds of clearly defined cases [see Kahn's epic work]. How many lives both-sides using cryptography saved is intangible. I suspect the completely unreal situation of all-sides having open communications would have saved a truly huge number of lives. > >> I will give up one time pad when you pry it from my cold dead > >> left hand. My rifle will be in my right hand. > > > >Tell me this is fabricated Macrus. > > I wrote that. What's your beef? Having a bad hair day or > something? I honnestly believed you had been done over by D. Vulis there for a moment. Cheers, Julian. From 18240_es at GHNVIX.com Sat Mar 28 10:53:56 1998 From: 18240_es at GHNVIX.com (18240_es at GHNVIX.com) Date: Sat, 28 Mar 1998 10:53:56 -0800 (PST) Subject: Vitamins & Beauty Products Wholesale or Retail Message-ID: <199803281924.NAA05797@mail.mymail.net> ============================================================ For all your internet marketing go to http://www.submit200.com Submit200 For All Your Marketing Needs. ============================================================ We are a private legal corporation promoting our products to the internet community. If you have received this e-mail in error, kindly e-mail us at the address below and we will remove your name from our list. We sell vitamins and beauty products, wholesale and retail. To receive a list of the products available, along with a price list e-mail us at the address below for information. earle at singenterprise.com From mgraffam at mhv.net Sat Mar 28 15:05:15 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Sat, 28 Mar 1998 15:05:15 -0800 (PST) Subject: Deniable Cryptography [was winnowing, chaffing etc] In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On 28 Mar 1998, Julian Assange wrote: > Rubber-hose-squad: We will never be able to show that Alice has > revealed the last of her keys. Further, even if > Alice has co-operated fully and has revealed all of > her keys, she will not be able to prove it. > Therefor, we must assume that at every stage that > Alice has kept secret information from us, and > continue to beat her, even though she may have > revealed the last of her keys. But the whole time > we will feel uneasy about this because Alice may > have co-operated fully. I've never really fully understood this assumption. It seems to me that any person or group that would beat a person isn't going to care much if Alice cooperated or not. All things considered, a group with enough power to grab Alice and beat her probably has ways to escape punishment from the law, or doesn't care about the law in the first place. In this case, I figure that their best option is to beat Alice everyday forever or until she dies. Whichever comes first. The longer they beat her, the better chance there is that she broke down and gave them her most important secrets. Even if she can't prove it.. so what? The rubber-hose group isn't exactly the boy scouts. They beat her the next day too, this time a little harder. Alice may hold up, she may not.. I don't really see the cryptosystem helping here. You can't win a game when the other player doesn't use your rules. You have to use the same set of rules. We know that the rubber-hose wielding guys aren't going to play by Alice's rules. So, the only way for Alice to win is to do the impossible (because this is reality, not TV) and that is to grab the rubber hose and beat them with it. I don't think that any crypto can defend this sort of attack, because it has nothing to do with crypto. Consider even a one-time pad. Alice could calculate the needed pads that would turn her ciphertext into other meaningful plaintext messages. So they beat her. She gives them a pad.. and they beat her again. It won't end. They can never know if they got the "right" pad. But it doesn't really matter, does it? In my opinion deniable encryption is only valuable against a more or less civil entity. Now, what might be useful is some sort of biometric info that is part of the key material. Heart rate, brain wave patterns, maybe biochemical information. As Alice gets beat the fluctuations in her body could make it impossible for her to reveal the information. A sensitive enough system might even stand up against stuff like intimidation and nervousness.. a polygraph test can supposedly detect this. If such a system were implemented, then this could render rubber-hose cryptanalysis useless, or at least much harder to put into effect. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc Let your life be a counter-friction to stop the machine. Henry David Thoreau "Civil Disobedience" -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQCVAwUBNR1/dgKEiLNUxnAfAQF5vwP+Mfykp2hNTgItZpgq5GXPoPwQl0enJv40 C+q43NSvaOzO3t+DAjfJj2IJuqDKXRy5FZikkCvOvr1cadJMbhqliKIrOHC1fkeB ElDnx+7LxzlGsgieAxGFI8JvEB685VY8qsprYFzfI2hQitvztPccpQE/Xvr0ftZi 3meDBzVLq8A= =0bdE -----END PGP SIGNATURE----- From brianbr at together.net Sat Mar 28 15:30:29 1998 From: brianbr at together.net (Brian B. Riley) Date: Sat, 28 Mar 1998 15:30:29 -0800 (PST) Subject: Deniable Cryptography [was winnowing, chaffing etc] Message-ID: <199803282330.SAA11522@mx02.together.net> -----BEGIN PGP SIGNED MESSAGE----- On 3/28/98 5:53 PM, mgraffam at mhv.net (mgraffam at mhv.net) passed this wisdom: >In this case, I figure that their best option is to beat Alice >everyday forever or until she dies. Whichever comes first. > >The longer they beat her, the better chance there is that she broke >down and gave them her most important secrets. Even if she can't >prove it.. so what? The rubber-hose group isn't exactly the boy >scouts. They beat her the next day too, this time a little harder. > >Alice may hold up, she may not.. I don't really see the >cryptosystem helping here. You can't win a game when the other >player doesn't use your rules. You have to use the same set of >rules. We know that the rubber-hose wielding guys aren't going to >play by Alice's rules. So, the only way for Alice to win is to do >the impossible (because this is reality, not TV) and that is to >grab the rubber hose and beat them with it. The whole point is that since such a system offers no way to verify that Alice has indeed at any point given them 'everything' she has to tell, they will keep beating Alice; Alice, recognizing this at the outset has no reason to give them anything because she knows that since she cannot prove she has given them everything they will beat her again and again no matter what she does. The idea of successive keys unlocking more and more important data means that she can chose to give them some of her keys and then just grit out the beatings til they either develop conscience (unlikely), lose patience, (more likely), or figure they have gotten all there is to get. While this method guarantees a beating, it really does offer the best chance of getting away with the withholding of the most secure keys. The only chink in the system would be independent knowledge from a coworker or some such that there is more there. -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQEVAwUBNR2H/z7r4fUXwraZAQFbUgf/V97xgxpNs0wIcvUvoUK0p4gShYrzqDRm qXMz6rVTwMKNhBF/0Jdsfu8PMq7M6ZoU051I5FqYEgI2uaqUMxoPx9qjrGOJnOv3 pXr5usa4rRVv5k7mQOJjd1zXXbcJNo6QWWk35zbLS5ecXQgN98Ex2DgApxACzKin 6+rpaTPFzOaktIzSVvM0on2TcC7ifkhkzDjsqIYx3b3gp73p+kzlWgkxngSM2rXZ Od2eEQDSJDnQc4n5DU7xxmwQ5qxz5GCcQiONHkL4pXSHvkbvGkNkPS8Ms/hsF2nJ SiSlmoYQBem3YB/Ik1UEFrqOhRispsYU9NAgii7EtqyAReEnYMI1gQ== =0JND -----END PGP SIGNATURE----- Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "Do not go where the path may lead, go instead where there is no path, and leave a trail" - Ralph Waldo Emerson From toto at sk.sympatico.ca Sat Mar 28 16:45:46 1998 From: toto at sk.sympatico.ca (Toto) Date: Sat, 28 Mar 1998 16:45:46 -0800 (PST) Subject: CypherPunks -- The Early Years Part II Message-ID: <000101bd5abc$848b11e0$2763a58e@uymfdlvk> Eric Hughes, secretly writing Prologue 15/0 of SPACE ALIENS HIDE MY DRUGS, quoted L.M. Boyd as saying: Among black bears, a mother rules a territory. When her daughter is a year and a half old, the mother assigns a portion of the territory to said daughter. This doesn't happen to the black bear son. When he's about three years old, he's just flatout driven off the property. Look, there's one down at the end of the bar, saying, "My mommy kicked me out when I was three." ~~~~ A Toto To Be Or Not To Be Named Earlier (aka - F. Bacon) From mgraffam at mhv.net Sat Mar 28 17:21:17 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Sat, 28 Mar 1998 17:21:17 -0800 (PST) Subject: Deniable Cryptography [was winnowing, chaffing etc] In-Reply-To: <199803282330.SAA11522@mx02.together.net> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Sat, 28 Mar 1998, Brian B. Riley wrote: > The whole point is that since such a system offers no way to verify > that Alice has indeed at any point given them 'everything' she has to > tell, they will keep beating Alice; Alice, recognizing this at the > outset has no reason to give them anything because she knows that since > she cannot prove she has given them everything they will beat her again > and again no matter what she does. She has a reason to tell them as much as she can. When she tells them a key that yields meaningful data, they stop beating her for the day. At some point she will give away all the keys that yield innocuous or less important data. Then she will say "I dont have anything else." Which the bad guys figure she is going to say at some point anyhow, and they keep beating her no matter what, as we agree they will probably do. At some point, she will give up that most important key just to escape the day's beating, or to get the knife removed from her hand.. If the attackers are smart, they would leave her alone for varying amounts of time, so that at any point the key that she gives might buy her a month or more of pain-free existence. Maybe more. If I were a bad guy, I'd opt for letting her live well for a few years, and then one day we start the beatings again, as often as possible (short of killing her). At some point, she'll say "The only key that I have left is the most important one. If I give it up, maybe I'll get another 2 years of the good life." She would know that I would never let her go, and she would know that the beatings would continue for the rest of her life. It simply becomes a matter of how much pain-free time she gives herself. If the attacker beat her every second of every day, no matter if she gives a key or not, then you are right. I suspect everyone would keep their mouth shut out of spite, if nothing else. But if the key she gives yields meaningful data, then the tables change really quickly. There is another point to realize, there is a point where you simply stop acting reasonably because of the pain and suffering.. and once reason is out the window, expecting Alice to hold on to the keys because she is screwed either way is a gamble. Sure, the scheme works when we are being reasonable, but when you get the side of your head smashed it, reasonableness is one of the first things to leave you. This is why I think that pursuing a biological form of authentication could be so useful. It could potentially make beating the person prolong the time needed to get the information. If the bioauthentication system could take biofeedback from feelings like intimidation or anxiety, and use these to alter the resulting "key" output, then it would actually behoove the attackers to give Alice a nice comfy bed and 3 squares a day. "Sometimes," she said, "they threaten you with something -- something that you can't stand up to, can't even think about." ... "Under the spreading chestnut tree I sold you and you sold me -" - Julia, and a portion of a song from "1984" Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc Let your life be a counter-friction to stop the machine. Henry David Thoreau "Civil Disobedience" -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQCVAwUBNR2gXAKEiLNUxnAfAQEpLwP9HUO8wGOGp6u7iSLcvzbB71m2BGgK1z7r 5ODfaIO4dLMwvUG8MPV6JedYDODVL+l6Ea7U8pKR/oO6fTV9Y2UhW8jSJunbgQ83 mIEAaZPCVpJxUELVBfpuQAkGIITOGiGjrmozlojH+l8x/AW0t3xyFQG/wvRwxBSO Z+EHWifLb38= =pbuj -----END PGP SIGNATURE----- From sexysusie18 at mailexcite.com Sat Mar 28 18:45:09 1998 From: sexysusie18 at mailexcite.com (sexysusie18 at mailexcite.com) Date: Sat, 28 Mar 1998 18:45:09 -0800 (PST) Subject: MORE FREE PIX AND FREE MEMBERSHIP Message-ID: <199803290254.SAA24584@zona.hayarkon.com> Hot college girls behind closed doors FREE to see FREE to do FREE http://www.universitybabes.com Whatever you want to see 'em do, they do right on your screen. College is better now than ever before. A hundred thousand pix. Thumbnails. 2500 HOT Videos. Movies. Stories. Hardcore. FREE MEMBERSHIP http://www.universitybabes.com There are even over 2500 hardcore videos that you can check out free. From jr at dev.null Sat Mar 28 22:28:39 1998 From: jr at dev.null (Janet Reno) Date: Sat, 28 Mar 1998 22:28:39 -0800 (PST) Subject: Laws? We don't need no stinking laws!!! Message-ID: <351E0477.5E1E@dev.null> From: "Janet Reno" To: "CypherPunks" Bcc: , Subject: Laws? We don't need no stinking laws... Date: Sat, 28 Mar 1998 23:59:15 -0800 MIME-Version: 1.0 Content-Type: multipart/related; type="multipart/alternative"; boundary="----=_NextPart_000_0072_01BD5AA5.83C87CA0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 4.72.2106.4 X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2106.4 This is a multi-part message in MIME format. ------=_NextPart_000_0072_01BD5AA5.83C87CA0 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0073_01BD5AA5.83C87CA0" ------=_NextPart_001_0073_01BD5AA5.83C87CA0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Announcing Those who still labor under the illusion that the Royal WE need the = existence of real, constitutionally enforceable laws to arrest, charge = and financially ruin (conviction or not) those who oppose US and our = financial supporters may, if they wish, go ahead and submit to the = inevitable by reporting immediately to the Reptilian Nazi labor camps = recently finished at Lost Alamo, and in Mule Shoe, Texas. ****************************** = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D INTERNATIONAL COMPUTER LAW OBSERVER March, 1998 -- No.4 = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D ****************************** ---UNITED STATES--- [BOTTOM LINE] UNITED STATES CHARGES 6 OFFSHORE COMPANIES WITH ILLEGAL OFFSHORE SPORTS BETTING [WHAT HAPPENED] On March 4, authorities led by the FBI charged 14 = owners and managers of 6 companies with illegal use of interstate telephone = lines for on-line betting on amateur and professional sports. All 14 = defendants are American citizens. The 6 companies are located in Central America = and the Caribbean; some have offices in the United States. No bettors were charged. Three of the 14 were arrested in the United States and the FBI was said to be contacting the 10 who were known to be outside the United States to "arrange for their surrender." Web sites of at least several = of the 6 claim that they are operating within their local national gaming laws. The FBI and U.S. Attorney in New York City targeted sports books = and not casino gaming sites. The U.S. Attorney's office said it had called various telephone companies telling them to stop service to each of the companies. The defendants could be sentenced to a maximum of 5 years in prison and $250,000 in fines. In the only other federal action against on-line betting, FBI agents = raided the Pennsylvania offices of International Gaming and Communications = Corp. in February 1997 but no federal charges were filed. That company had operated a sportsbook and on-line casino in Grenada. [WHY IT HAPPENED] It is speculated by some that pressure from Congressional sponsors of legislation restricting and/or banning on-line gambling was behind the charges. The Department of Justice has said in = the past that the federal Wire Communications Act is not written well enough = to support its use against on-line betting. While bills to rewrite the Act are pending, some in Congress and among the public are impatient that no federal enforcement actions have been taken. Others speculate that = state governments are concerned that their lucrative take from lotteries and other state-sponsored non-sports betting could be reduced if on-line betting is not discouraged. [THE SIGNIFICANCE] If the charges are not settled and are pursued = through trial and appeals, this could be the case to write US law on a number of fundamental on-line issues, including jurisdiction and national sovereignty, as well as on-line gambling. It is doubtful that anyone expects law enforcement to eliminate on-line gambling; the intent may simply be to discourage its rapid growth, particularly in sports = betting. The government clearly is testing the reach of existing law; even = decisions adverse to it would be useful by identifying shortcomings in existing = law. [INFORMATION SOURCES] For the news story: www.nytimes.com and www.cnn.com. The six companies can be found at: www.galaxysports.com (Galaxy Sports) www.islandcasino.com (Island Casino) www.realcasino.com (Real Casino) www.sdbg.com (SDB Global) www.winnersway.com (Winner's Way) www.wsex.com (World Sports Exchange) [CONTRIBUTING EDITOR] Chadbourne & Parke - Contact Barry Nemmers: barry.nemmers at chadbourne.com ------=_NextPart_001_0073_01BD5AA5.83C87CA0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
 

Announcing

Those who still labor under the illusion that the = Royal WE need=20 the existence of real, constitutionally enforceable laws to arrest, = charge and=20 financially ruin (conviction or not) those who oppose US and our = financial=20 supporters may, if they wish, go ahead and submit to the inevitable by = reporting=20 immediately to the Reptilian Nazi labor camps recently finished at Lost = Alamo,=20 and in Mule Shoe, Texas.

             &nbs= p;    =20 ******************************
      &nb= sp;     =20 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
  &nb= sp;           &nbs= p; =20 INTERNATIONAL COMPUTER LAW=20 OBSERVER
          &= nbsp;          =20 March, 1998 --=20 No.4
           = ; =20 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
  &nb= sp;           &nbs= p;   =20 ******************************

---UNITED STATES---

[BOTTOM LINE]   UNITED STATES CHARGES 6 = OFFSHORE=20 COMPANIES WITH ILLEGAL
OFFSHORE SPORTS BETTING

[WHAT HAPPENED]  On March 4, authorities led by = the FBI=20 charged 14 owners
and managers of 6 companies with illegal use of = interstate=20 telephone lines
for on-line betting on amateur and professional = sports. =20 All 14 defendants
are American citizens.  The 6 companies are = located in=20 Central America and
the Caribbean; some have offices in the United=20 States.  No bettors were
charged.  Three of the 14 were = arrested in=20 the United States and the FBI
was said to be contacting the 10 who = were known=20 to be outside the United
States to "arrange for their=20 surrender."  Web sites of at least several of
the 6 claim = that they=20 are operating within their local national gaming
laws.  The FBI = and U.S.=20 Attorney in New York City targeted sports books and
not casino gaming = sites.   The U.S. Attorney's office said it had = called
various=20 telephone companies telling them to stop service to each of=20 the
companies.  The defendants could be sentenced to a maximum = of 5=20 years in
prison and $250,000 in fines.

In the only other federal action against on-line = betting, FBI=20 agents raided
the Pennsylvania offices of International Gaming and=20 Communications Corp.
in February 1997 but no federal charges were=20 filed.  That company had
operated a sportsbook and on-line = casino in=20 Grenada.

[WHY IT HAPPENED]  It is speculated by some that = pressure=20 from
Congressional sponsors of legislation restricting and/or banning = on-line
gambling was behind the charges.  The Department of = Justice has=20 said in the
past that the federal Wire Communications Act is not = written well=20 enough to
support its use against on-line betting.  While bills = to=20 rewrite the Act
are pending, some in Congress and among the public = are=20 impatient that no
federal enforcement actions have been taken.  = Others=20 speculate that state
governments are concerned that their lucrative = take from=20 lotteries and
other state-sponsored non-sports betting could be = reduced if=20 on-line
betting is not discouraged.

[THE SIGNIFICANCE]  If the charges are not = settled and are=20 pursued through
trial and appeals, this could be the case to write US = law on=20 a number of
fundamental on-line issues, including jurisdiction and=20 national
sovereignty, as well as on-line gambling.  It is = doubtful that=20 anyone
expects law enforcement to eliminate on-line gambling; the = intent=20 may
simply be to discourage its rapid growth, particularly in sports=20 betting.
The government clearly is testing the reach of existing law; = even=20 decisions
adverse to it would be useful by identifying shortcomings = in=20 existing law.

[INFORMATION SOURCES]  For the news story:  = www.nytimes.com and
www.cnn.com.
The six companies can be = found=20 at:
www.galaxysports.com = (Galaxy=20 Sports)
www.islandcasino.com=20 (Island Casino)
www.realcasino.com=20 (Real Casino)
www.sdbg.com (SDB=20 Global)
www.winnersway.com = (Winner's=20 Way)
www.wsex.com (World Sports=20 Exchange)

[CONTRIBUTING EDITOR]  Chadbourne & Parke - = Contact=20 Barry Nemmers:
barry.nemmers at chadbourne.com=

 

------=_NextPart_001_0073_01BD5AA5.83C87CA0-- ------=_NextPart_000_0072_01BD5AA5.83C87CA0 Content-Type: image/gif Content-Transfer-Encoding: base64 Content-ID: <006a01bd5ae8$90b47520$2763a58e at uymfdlvk> R0lGODlh1wAgA7P/AP///2NjY8DAwJxjY5xjMf/OnM6cY///zpycY2NjMZycMWOcMWOcY2OcnGNj nAAAACH5BAEAAAIALAAAAADXACADQAT/EBE1ZFCooVURI4MCLtPwVUYjSgNREhwhUXA7syKN4HI4 7SVeK7ab+UKKxksC7DB7q2JpBRLZlC0NRsYEFlkyLhDz3TUM3zNTrSmby+hiqngQHAr1g6EgKBgM HC0JCQ8JIAk+EyAuW4YtFCIGCRwITgiIBIMJASSGk5oBgwQaIR2HLoKZmQ8Dnp+LGHt3BbS1tn5o AwuimamEugMCAwMFCQIIAZIVCQaZzQSSO4iGsrXHmbyGNAqeLS4kmTSGO38CBnp4Bn09C4A2COpo e+p8tZWZ8I5AMncHd2i7yrRStE3Gnw8TFFDQtqMRgz14aN3pQ0sSgQK7VCUMgQaDgj2X/y5ImySA wIcAh+AhoPDnUi9IIhD5IOMRHpcHCO4kEAECjQsD3Aa1ylngErF+BU4FaHWu36VzYR4NCEALgZ+V f1pmJRdrXMQDE4Ai8ofsARc/HxagrIDL1qyqFDKS4/C2VkYnexJYdStJrwGRFFqsnVDUk1oCoX4o HPZR4RZ4tcCiJOTCEAxUvXaiObOLF4Z3OAfK/PPWwACgLRW6qIIBowsJg85RBPvw3iVmeA4gstji wR5os5pZnYXMkYzGcRQW2X0rsoKlwCXSMgjPtCoBiC5ZGeEX3CUw31tY5NZjA7xGljHNK+qij8tr egtUCPPY4gwC11b6ZUGUbKVN+L3VgP8jfyhQlA3SSUMVRfZ8RIBZLRwgQVIE1PXUHz8kENmElexV V0TmFDaNgf6gU4snEVWlIU/BZFcMNCr+5YlZiVWGDDQ7FAOJNyhUBVkB5NEiQCE4usHHfpi0MMx7 0GTUWJJ6+VMLIKjIAxuOiAgp4UWttMKKIRJikmNJHcUBxlgCcCACUn1wc84tDE5nCAktlGTMczuF YFZjpRgI0XxWXfZdHxB9g9ggMJVig143VpkDJKhMidKUQMIYGS1KGFSgBAIoMUY7f+DyWx8lpkje OM20IpEdEjRTCIDW3cDVNWg48lgBF3zIBwUxpniLRQZ5lOpz7SlQyDYsRZMiSJV9g+D/LK8NhBI+ t6li02dc7ASNRbZ24Vd7l0pnjSoVfATPkhLRB08/Byy6UjBgbHGGmBoRVYlp8giggDkkVONSTiIU tYcNJDRn8JsRuQCkrTa8pkkqKsH3Zh9pUoaYQqF4RWlFVhGaib6HDNNMfOyZlR4mFamYXiYNGPwW WEmeN+dRtfzEDFsTBNDFaT0s1cxSesGyWBWnzJAVhtZYd9Es3BgoQgAX0LILCeD0WcFAI4PA6U2V DT2PAp2wgo0olj3CqF5PnzInCLbsMkxn4xiVckULGOhHpXqVUuR9DbxsjXaaLIJogT5VYqBRi4Qw WSnTESND3htUId7R7wI55lWaeBJK/ymZtpJdCPCUZNZK/HGRtYO41cNeTKJM6CsfCmbOSkyPbOPN IP99dMttK439AEo8AeUYEn9ddrtgCqHGkj3UDijeW9jFMMguhaDQzBZXy7MQgNPjZ4sEo6yEfQ7g V6fVCvjqd1oclskQ7j+HDBJK1ZDczbEPIAXtRTSASGOFaXYryqlQkTEaSU9r1QjXVbaQEbIpyXwS mUUdADEJrYliASm6Qwy05hE4/U0lbiBDjgymQD+0rA0mEBmpSuQfOKiEATs4RoeGUyop2RApdwBA btjFQj30sIfnaMoPvzLEH97wK5f6oRBL1BQ+2MGI/hBiBpvzsjoI4IpYzKIWt8jFLv968YtgDKMY x0jGMprxjGhMoxrXyMY2uvGNcIyjHOdIxzra8Y54zKMe98jHPvrxj4AMpCAHSchCGvKQiEykIhfJ yEY68pGQjKQkJ0nJSlrykpjMpCY3yclOevKToAylKEdJylKa8pSoTKUqV8nKVrrylbCMpSxnScta 2vKWuMylLnfJy1768pfADKYwh0nMYhrzmMhMpjKXycxmOvOZ0IymNKdJzWpa85rYzKY2t8nNbnrz m+AMpzjHSc5ymvOc6EynOtfJzna6853wjKc850nPetrznvjMpz73yc9++vOfAA2oQAdK0IIa9KAI TahCF8rQhjr0oRCNqEQnStGKFjT/gjXEIQ/zgBTpdFRcpYqgr27Irh1+1Ia2SGASb6FRPqDDKvTA RYj2IiRbmINQdwuVH2qYG5Hi0KMo7Ycd7kYqUkmHHrNxTxziUY7TREZKTNiSHphhI9AhoCTJ0AM+ imI4lSghPsggwb5IWNOdquOmaMCDUefxj1/xB3zMeFmttHHBTCRmEL9DhQUuEi0Q6IJRYdDZHsxR K1VkLnAZQ8lDWtILLtQpMscQhaeuRJQIPjEil9BAhcqBmBI46RHmAwpWCishs0hkD0qAIU9EoaRF gJAttIhSRAIivqwsZiGwUUkCGACiu93BgjtQIQyYsQE0MMBW1DANL1yQGEF8DwWN/+AAwvw2rovw B7Cj0MUV2RZFbuREQpA4zwDM0rIJqsNNe4gCBnZjkPWFCj+GaJkdBvSHbqXqUs7ww9CUhAl8OCJJ I1OArlyymoaYb0m3MYSdnkJgucXEWNhwapqGwZTkAYUYfgDXWyKX4Wk4lQW5EK1yr/pfsfBVH+/S kFD7wgWWhVavJqGGlGYTxVCQCDvrtUyrvjKsH+iiDnj4ToYpcFVOSVCBvEHuBHZiIgnprBjSuHAy BmSTSSBgdMnhHhB2c5gqgFC6qireUwQAvHf1a25kydI/plG+vR6ivP1wwZETfDFG4AgY7vMHjl0y sAohoiQhQBtXj8EeXeyjIbFoRv8dQAA9D05JTWxLmJg0dwqclgQhYB1EnLADG1GghAM7cYl4pKGL x2HicwFqS6WSIAqV9qFLL/nIfPSGiI8QVnemccuRWm2aB8ZnIpKwCJ2o0wEb1Io9+TgFGVJdjyzV Qxn1MKp2VJGDC4sAJ6IOr3I+Ep/BBuwydL0IRchMgcRAaAFXYoVR3HEPZqRpbKuJU0VIVtaJyGlb 10BJu6vzLnNhGFp12lKebGKOfoT6Fd86jU2G4oirDeQoqbLN6yAW06tUizL68AgIJjWJIUxh4Rqi lKgfoQinVgWD/KlItrrmJpHEZ731rUy5juKeTfzIGgr8+HBGXAdVSbAGTvBcoJr/YKyzKUwPlSgX hoLh15DZQnKBw8myWlNYQ3SYXLizBTdAfTv4HsogNs0FYWpmtbWklBIAcd+umMENL4XlShEJBUTs kSdUCMsjwbD3U12jJJC6JCYvCIC+FgBoa3XAGNHoAqfAV4qjOdVcNDgNnsaKKUEEzjLDVknMsdcD aDDgVRoqNehpGiJPPIgjiumICACN8QIfx7X4qLh33SFg+9lJfocNdXU6Whe36SpMrSMDzmKjjt8O Az9GMZf49GYVkVg3Dok71FWFhLhFEC0wJfBJK/ykl2sczhWFPf3c02Ed9wiCT6TOcDuQ0T/DKQkD KtiH6Tumogp05uYp3QSjfHG0/00RrbXW1wUB6FROERt2gg0PUmvnIS5TtCzmcCWGIj9V4BPWYS6M Uj5Y8g75ZTBAMBmB4yUPgyyJsF8IaHcQoQcd0VpkQA8pCG8ZYwjNFX3A8CqdUIIVBAbzkRbMdRkO UGo1YBlm0SyC0ieBoQ2+xUJIBEUl8kRFVERAdWRKiIQZFVQmJYU9FVQkFYVaCEUmxYAohURdSEVH loRJ9IVsolYNqGsSRDEW1YZu+IZwGIdyOId0WId2eId4mId6uId82Id++IeAGIiCOIiEWIiGeIiI mIiKuIiM2IiO+IiQGImSOImUWImWeImYmImauImc2Ime+ImgGIqiOIqkWIqmeP+KqJiKqriKrNiK rviKsBiLsjiLtFiLtniLuJiLuriLveQyujZSIOWLLLVSr0NCuqKGv1iMwzg3ZNWMzvgrx9iM0biM 1CUlyJiGV+iF0kEkJpOAmpN7CJhY+gcgAQB64zhcMNg9hJB7L4hwmmAygWNXY3NYhoV79FhBspN7 ZIOAl3dXHoiA8IgI4JA5/FiDpgd6x5MZ06CP9RiPrHUymqA+hUU6YtI3ErIMV4NADdFraGAOVfIH 3vAACPEjH6VAUFgVPoFiXraCLqY6NQUGRFNr1meE5tAAgTYMsTEMJ5BdPYAF8PABVzINWrNl7fMa RsUeCaAGHEE6WzEC/RFko6P/fEn3OOZAXDaRFIAila9RFfhxYTBSHNPHgMcwEKRjkyhwVVshAjGg b1d0hs1RgVSyZasRhGWDFbEAOzZgf7C2CaCTHV4AChoBIS9QclElZEDhPakiExNQcEJCQa1gkU50 GY+xVWBBld3AB74AeC9wBPgGAx4pW6TyVebSWB5ILAjiIzUTNEhABZuwL7VyGvJGKpJwAQpHZLJm gXnDAZygCxfQOrEjcxBBJUSoHGYiKJkADttyZVbxX305dPjwE8DWWKeSJVcGA/sycn5lHD9gFY2h eaahWyLyJgfgk7ARaK7wLui5KJcVjo5yNBlWWXQ3DjCAMNLxAUrADcnAKILn/z5AJ2u+w1phsBoa gws2l1KEdR4rESJLF2pGKR/jcJp9AVPSwQEUcmFlQy7QYBCj8BMl0QAyJD6hw37hEBlscxsP4SuC oBYxNY0tQ41CZj+w40AfUTwL811JsRtRgxMiAJTYhVehMBjvJ3kTWC64kRVHgj9fsSPk8C7bVylN kGxGsRPUABkvM4HdWQRE+gMC2hQGgBOeYn63MRvOUI7i4W4OQlP+0FhmIVYASJAxAUMMEiLA5xQI lBzs4wycdglqIQExoH46IwwswB7WIgenEXIqlx3Fl2FdqX/6cgHz8A6T0zvg0xUGgahNyZfDsYz0 sjnoZmhCtVOXwAeUyT+b0/8q7fAV+oIy1shBfBIYuaAzxzgR9bh98mYEH+MMt+FwmYCUT/Yc9cVa GTN7hkAkQLkaNHEoJoJmSSFY4pACHyMkGhJsRrFwrVAqFnF2FUILxxUOn2GrXxFDsYkHfvElRBZB IYEJiSZap1VrccARDPiWm3OcVqFbx4lTL1KZuHMjoLIbhkMZonFXpFapD/oJyeAHfiEWoYM7qWKk 1TAgAeSgqUAhgOYNx8EiYEOfhWGC5MBYLjELNtkxTfMWAjkEp8ERxyauxHAv56EVTkEVvwKj1kBX g2WwV0UR1TkJkSGtYoMk49dZ1LYQq3k1GiIF5woLnmOCPYuz9jN+hWZ9PlH/Eq7FWrgGEjRDHNgA U98hWpFmB12asXZVGDhADfkBqeMjMtzJKBBWjHHyFoOhMN8yNpzws5FGC9unMCUBDxjEIP3yKo7y AkFTOGSpHRq3VVondRlrOIxFNlZZOCmhDMESAh5ZWWwyGbLmA6JQERiSD0GIerDGBMeAIQZRI4uZ qVPlK8KgdlNCKDiZV5+BAdKVGL1jYuIBI4MFAwZ7CL66tNBwVzXRcVrDI52qYE3DGA/ICM3BBPVA XaA1o9giDeEQD/uyL9maG6FqsMDQGYuQf/LXmu5He4VTOp6zBcXAW79idfUnFFpTGXSiGskTNKE2 Xj9wmCzBBHPHLPBIHuP3/xQAMqjTorBCkScwCFOeoBzhEKBR86nNsQ7JVViSwBPM+6j4lRKiOlzy wSmYizbDWgMANJrCUZ6Ls1VkNr3NETDAhlQUAzvNImKX8AGmJ4/L5xOoO2/Ulh0mcQv71wn58Bdi gz75ujz4u46gow7eM8HjpjpXJB21hiAs8GoJMFXG8BaS8wQ5YQNJQCF4MArKQAJ/BwlAITXPdwDo AVNDIWrOxj/OuF16IVaB8TRblwWdtpku4pLT4hgKgcOY65Rz0wygi75sIXCQ0A3q5j4QURyX0VMs RRwUKwjrU3g5S1Xqyyg+cZHNwgRD0RcxwbH40he6MC44yW+1kpK4dxFTEv9oLEACdnIitPk48FtB 4uGS3Rec2ze7KYkYNDUlp7YX11pXoHMdBhtqkLBh+0gNNCBFLYUSjko6eWfLx/kxweYCA1LAHZKX aDM264OlJjGXvdAhsjkOtzJvGKZcAZE1mdGcSNdw+uC+5RgOyAsRa1sU8vEDDLAC8+a82hAKe7Fd rENtswwuNuUK6KsSFnYvDHJkIIOGaepACSEWUJsUKhEGrLcMO6gzdoe4oXWYENQ0cxcUjQViKOwC r/IAOkBkjuUIhxHLpqda6+HNk9G/k2AF6JYQIdFZp1ZBBVNT3nUoWZcyzOIVTGsP5WALQ/GFCQMC hbAWdzkhjPAMyIturYn/AjXMDXc7Yje6JLaleYh7dNgRezBLKOP3Gy1sc1gSFfWFQQOSOvVwJtun f62wFBongR9oO5N5HuiWU1OFQVs3V6tlfa2FefBGkJqwAuPWD1kjBRGpdadHDWEQN2BQX2mtb/pR A2BXGLU3VavwDSzxYA0Jn4hhDsAz1Vvg0YS7IRT7MDuBlGCSKht9rjkiLKjgDaDmVxcwG1NSPlNx sFxRCpohKhZmJrGwpI1leTBCHDYHM6vwaYSxPiKkNz6wpNJAah4iIgiodBR4BKohOKcqB0URyKx1 grP9ftsyD985zMHhbppBH9DWLxcTNKLMVhhhdIJBEiQUXHY1CDDkE8VK/wRAwMIPM35R9CCOmoDM RSP9Vx0ytBoNw1+Rjbk3oC8tgAteQDowkdhK8kD0+7mvI9h/0QkO1A3C89vhNcpBMa8fCpvZgtp/ 3W6rsQuT8SC9ozYrcJcbg3MlaUPxgBi/c4GeI5SCEcSmS6Dj9aP4SSQR5tcEKQFfMlyiwQudUWrt +Atwo7hEbnpUoxGsjChrKj8kANJxW46U0RkZ8+QaAQ508gAN5I0+itPUIxrkMjWHYpBU7goPMo// mx4IyY/Gocjp8T7FOOMlVIYXnkGxyt/O6DfWqIx87lEi9a7ESEVgWI0w20NXOIYnyXuAHulJSFJh aEW8uOmc3ume/umgHv/qoj7qpF7qpn7qqJ7qqr7qrN7qrv7qsB7rsj7rtF7rtn7ruJ7rur7rvN7r vv7rwB7swj7sxF7sxn7syJ7syr7szN7szv7s0B7t0j7t1F7t1n7t2J7t2r7t3N7t3v7t4B7u4j7u 5F7u5n7u6J7u6r7u7N7u7v7u8B7v8j7v9F7v9n7v+J7v+r7v/N7v/v7vAB/wAj/wBF/wBn/wCJ/w Cr/wkZSFJRWMY9joLdXoEN9SP3Xx2kjxkz5FJ/lUP4Xofx6rwTjyM47x2miNUIjxlJ7yJVlCv+dT HL/nYpjxJP8hKP+LLa/oFX/ywEjxhi4LQu3zH/XcF1/0ZMjy2ZgOLXP/VmdVkw6eI0Z6wuOWVhN0 1mn1neUwY5ouU0DGtSfUmNqnJpbQBYoFBYbiOWqOroms4mS+C9uKoQRZySekBi2hBmVQAGdwQhmQ AYIaj2ITP6vRdN2ACn6NDdPyBcs9ASpgWPXYWBoBbv4soOIQzJZhk1SwkUkXN1fAAnAezAN54+vY PpQRr19gJZbbC92of/zI+FMzIQ3sKUwRNWdDQcjgJ5WAvQ9j54vQCXspoG9j3ONACsgwAFjwEzW7 ohbQEIxQLhtJELc/jihwDTj9GhsLOzrNVeVSGYefkibrfm2nCi3xlkv3gNXhRDnLAz9QEgrhGwx6 Pa0yDjrTIc6woYBC/39GpVm/4wMS3TvJAwEKkUESaUUfYVZKvmsIimXoBgQxVmshJqIwrCYgckUZ BqVtERg/BImwYG0KB03T6WQamoIllDpJqHiVwUmq+bYGjyzIbEngzKMcCKayEAS5HEwRioFbLnR9 Ha/I8qFTqBKYu6CYQPipYEhAOGBqOpCSmRgomJgbOJg4iFlBSNgbMECEZJowYJUYTShEzKOabEIQ YJlgyGlQIAiQiMlqYZJ8oi3owMoclaNBgDkDqSB4yBlklPoQZljEuwBR7DCgDgcHt+BKIKNgPU2u 5LnYyaNsYRtFqFo6LBI1kGQAUgUBkEjVWOHqwq0VrAhIUJGgGwCEjP+SsYMC5lEMVysGnQAWjkGX HqdEpVuhgQoVSslw4GpjpsIORowoxLAUKkYJakOiDWggBo25LBRm/nqIMxupApA0TXOh4tXNH8U4 HKklgxrBKqmajjogFcQtTUVGnMvRDWDAojAflKj11NQpQH18+JM0iRM1X1zyBMuiz4lgDQgCRIR0 UgKPGKjk3KxQxAIPBahW1Iosgdwgylsl91iob44ABdaKvhQI6FaODk22BQIhgANbKqYo7HhWVx2k Gju0YPLS1OkSJhYYDgXha6GOTEviCM6Ri4UBxkUf0ngR5knqbHP6shoAKUcNCwHChRe1Dk20LCoL 3NEJ/tqJhlRMLlr/VOGEctsEamBjyZPE3prMl1mqKqAxF2DpIZ10fgCCOhZ4yAkmOWSrxIJkwhvB jpkKWaymST5pABNfILSpIac4MOwu48CoorhzGJIIIYGCyuKNky5QI5zbuhgOOxUIYmm7Jwory0QW SDLsoUw4qCEAKYoJj4ZBREoqvIcUwIG1UUyhgZUlifBvwxXWWQKg8EzJRyDrVBAzNXCoKVIyMzCZ sAMh3KsCPqe6AOjIa8CZ46EHzCJDKoFKu8C0m7akLIYYOGjiji9kSCPTaCS4go4R4LxGmAzMMg6A ZJqApQjGjMpCni0d8uQQKVrwxR0JqcvkxbUkKgC9JwjClKBAiePz/8gvGuCEMJZkCYeeM8niZxlQ pCQhsIUSTA6cB2CwgBzKllxQsCK3OSHHBrPZYdU8MtMSC39CXUi2ZPpRSgsffHNHFKm6kO4ZTaiT sKAyJclnMgCLwSLQrFiBIRss9ktCNsNEs4qG8/ragZWxGvsAPQoDe4O1NZGarA16Mr4rQcGCbAIN eXEBAwFrfqC5L5z8c0GyM3+p1ZViUA2lQWYW24OcZ7HNoB13gjmCuEULksmUOSJRgj5hKECrmThk +k6vDUZhgLQH5nKHo+vmGcY6gXaxBiYfdwygIfgWC2RWAWb6QiUKLJ5BgZGWyAfFzhILB5exmoEw iFtqkMkjm0IBuP8kLoehJR9N/IvsAhoqGWgeOPdIhmVUEgnEQ3WvyfvUwhT5WcC+97hDPClZk/Sw CzogcBELHkGkgEfinsC3GVp75YIFZk0GiUpQwJbfSoCQLAiCKrCkvZnAbCaJJlKv4j/AfKi7pQSl KpSAEROwGJzVilw9b08Ioa5XRiBinKy4wphTcyXuxtnzuJvi2ShEoA8zFEYeXNCdlNIQnhO0IRTo OKATSDOCH7znTg4pSgWikBg4zQRxXKkCShI2GB99gGklaAn+ykOL8ZjjTOwjz0cGU4FefatW0Ehd FPK2jSOggU4/s9wugieAuInndgIYG2uawgwf+iIa/gmMEPBTjcf/lAE+Ydree8yjjyiwABQrsqAc IkMNVU3KFhjYH+22UoaHCAQTRYpLzGyRiUSIJxJ5mQAwerAYpkziNgmR1JOO4YQgHKGOPmBjkVJj MfSkRgdPKYIP2HMNdlytgRN4w3/o0JRCNGwUUuARAzMwBSVcoBZbexZ1YsAto0hHBU+4TSKklDEW dIM1k6DGqVpjH6fAxyIZaIAS/5ON90ygAQjDCXn2sYGV7GMMPpzS9sygAEpxgBQCAEkQ2vOiBOHg DuZRQ7fYMCRvTEV/XxJCmU6kgfIsoFwNbAOGUtPABBjuHmaBA/hu0hJPqEEzEyokSSiRh24FqFfC UJ8/gvIkAV4u/xu4opqVLBUXJlzBCTzI47KawZKhIK+bAgGU5ixHg6aYpxo8/FZ05vEfHhnmARhV C0zMwwCSKi6Oy3yI8SaDCUU8hnq0ShduWhIea9QEJxC5A2GWWJ+HRAGKichZzIAiA989ZBwOW0ID DrXMI1Eqhj7YXrfC1Iwz6CU6PGXnDCpxBQbNaVX9ycez5lGyo9TzSJrAAQ338bOn9JBCCDmDnPQR oVbsrxJ5xdl45mCeBexVDizVRreaEbcg6Mlx7XhbQ4SyC+7tj5CjkIc+WIDNmMTBUSyDzyNCdwTt jK8ZJuyMJunDCFLkg3QYA+sTzFO9wv3MLg+ZDkQa6M+51FBCef851QH8JIU2SM8ZGigROf4QCQ6p JkwcjM4dlLMAB8QgKD/TKvuKdSqyhoCOmDPHL7KAA0YsIEAGOJQpUTIDlQjobui4lxZstkeSUA8y u9NfYTTHhMmxxB/a/Km3eIpeWCzNHa/kp5zi1kOxvMM5KjCpN6eiiJI8xQDBtM3IlPpJvoJUkTBK Xx8aFgc5ec9b1amFm5KXXvfth4p/hMNDkIBQa7GgKBCZBTTsSlKZNeem2csFrVCyJhDhKgjRvJzE xumkZlTzAANpgzU0kS7W5oJCd3MBD06QKyUIKG8wUepg4vAgVSJCOanSzB9v172xXe48ojMFOA6z hfLEQbsyWKX/Ph51jsZujxZd4Ccp0bm0yIhhIQBzmFrB8CL+RYZnFEquRYgyCFVKyh8+gB3pZkAO +k7CzCOKTlmkILDG8beeXPLPT7ZAK8m4xwNSAGdRQoDizBkvPNpA2yvIs5A6+4kNQ7YElyhVZiVo gB3VszQXxgqESRXDTUxx0xhfEYVDYBkduYAczsSACx7osRG3IIWpbYHtwERzJVgwD0bnspxDGSCv HQRfX5bZgfRWABimLoKcLrCRCSQqBlIRxpKKPQ26LSciqquveDl5F1EUal/+cUUh5shTgGAUfdei xJrCuRCakNMFwNCB51IC0mavO6I33Z5JWTE+xjzCcySXnARY/2YlEJgnMlreQDAdOYYRmMg046My OQJgHsPdhjKFfUqanuC1LZOuBQIrDhPe0BzZwBc/IAAlBZb3BSaAuo7eJMKQ6JMgT98GCRqYh7JI miAGkPoumhysX8b2z+tZ4w0UpLU8ArUSN21JSyB4wgNyUg8j3tm5YNxmIspUD1AyxVgS1BJlUBWM BXBO4xUNh+5oSI4WWIyLo2jAOS5AeuACQSwsiHUcjOHJpCKvGVzlKtYchKtVJQKjqumML1CsTWtE BEgKK7wPskIK4+0ZbwAs0TX7sBBs87waEd2rugcxiOcic8QR4WloDBfwAywARx9+iyADw4PRtOAw 3dOmaPsI0v/SRMLC4z1SQXyMg96AirZHeIuFABJ/2I5puAYuCA+Ngzs0igv9g6862BKcuJzpOy1q kqZzwAG+MgYlEIg38A3ryINi0L/0QJzcEC1VeR9ZmBhlyIOrs6B7MB8wsAb/kC75yjM06qzBiJBe STcf+Rh5mDAYsI8NCLBZuRjqcJV6CBAZaaycOJOsgTVUCYSbkJK50xquqYwNzAi+GY89YBkBGaMZ gISCMJrsCQFE2AXj0Cbxg4bgET3CWJQli4PCGK34o4EtwiRd05Bk0Bos+IWGCQTBsLbJgISkYqQQ eSlYqC/Tk67hucOdmMGb8MOr4oLUMYBdkAYn2wSYk8HsgjD/hJEG3jgI9MkPOfizS1CvBMiAZCsC OyOKhaiEZFCERkSfr6GP1UvA0GEjVhKM6mkDJGCQ6dsniSOky9Gn6zslLOgcjWMuUsgpPNwB88gR yisMVloH39AMVTomdTOosSAWwJk+F2EK6WOEu+iPHfMFO+m5MyCZAGggslFCAPIWaRo1QSOFKxFG jJGDUWCs7KKQTTm8QDiMJGiI9OiW6piBwFmDCQM7aeoCTyGjHHgAlpgS7qCGwwACCqGJIzimQ+ie KtgqAbOAGewIUmu9xPCpNAREQDKRPfIygGEMJHSHIeuApRMMdbCPJLjENMCaBOQM8qAtagik8kos eWkC7kuv/wDYO5xQA42pBsnLoHprDS4hDyoKHmP5pO0gDZuQCtAKhG10D2N4BKF0Eow7DhAbCLmi gLtxI+6QFIhYPRtik0aomfnJrTQBklA0wKMoBFrplbsIPRnAgf/JAZP6NYiDGk9xkEZjIz8kg+Sw mYPjDRhRQ5DbDnDqg8HaQmYrgBvAPkNgnHagENjDAJfZkNaDIkmppyoJuMoYj+whAhThPfARBcCY u7AKnup6Eycpl0czr2YAE3Q4As20jwXoPeCig3I0BRVYgLGBDYxhDPgYJlICqTzSHg+oI4NZh4V0 ij0IP93bwChYQFAjDddsjwlIHmkMJE8rgHrrAk/IyEhKDv+YpJVWyIVa5Dn9KJPSs8Rl+a8GMQ6q xKjYkQ2egZFWgKCrYQSY8BA9+y8klJz8Us0Tky5B87lE6JjFuIm/A4HTQos2oB6PJA4BQUlf2YAo cZXDQKg+OIUxNAhA44KRoJ5VmA4Icwl0aJWyRA46AC790RG/SQRWUANprMUhRCf9ALzWYKe4Y4y9 oxnkxJUefUgPaIcnCBdVabdgEJM20gIHA6gdJJPVgIo4KDQw2IbkcxCGUyU4QDe7OzjpoZukkLS+ 4o/l8I2ZOCRL+AIYeA92sMs1ALW5yxBECgGevCFF1JLLCU2z4QO/4BCJCExYcJXOQr8n8qAvTZyy aQXf+If/k7AXlNgcK9kWm5CJzKIJ16MHH7kHhPi9SVQzjGkVgEkKdUGkAEiBdeA/e2MQybAGmsoI k+QiKwEGWmGi2kCfbnkgxQkEdUAkpbqUs0gDBbzN99CSdPKLzggV5hwSX+gAXKguFJiDNOHHxyLS m/Ac3BiTPWoF6sighPSUYXAmSfxSgCkLuhxQDV0RY0gPE80IycgprNEMPQhKuBQtT6uB8XMj/StE W8UiwwFBB/nFDohFSxwfHkEKRDq8oUCJmasoJmiAMdgzwwiS6gguRztAv4zTremwVwUTHkgSyLhU e5kfCQGfv5NA3HuG9Dqtx6G4MrEHsAs41SzMhMscgLgH/4KgCfXoM1HzQLLJomNgBSV1B364qeib MwfaGlaYhKCQxa3YzKcVryVBIItIMthbBIwapruzCX/hxCyyk63RvTaqCXC7F4RUJD+8gGCaLayJ N4/oi7PoM3bIN+57x3RIlcFShpoKOk/4F8FkxzqCVjTwkx4aLVhanCLpVtHaCsjIIMAFDdgwkUeD jP+LIqmRAsAQRhx1IE+NioOLifR6jYpDnqmtCbhcD4kc2nDozWlAhydS2sYUAjGTCQr4AOkwCqoo A5v1IKMBKoT0h5PImY6Y24KEneUcrQW9KpMoBVHg3rkoW30B35IUg1YAs5RIMlaILs3SyZXTU1UR kyV5X/+TMF3pIAv6hR7vHDca6FZI+7CEUBTurQ8EKBHujdrWaIGgcAf7aCZSkpW7ajYtbLk4Mga+ 2gAKnuC8QK4RreARDU9m4ipTq6a9ipGW++CKQS4QzmAIFmF1G+EtlOBlQbFEI6laUDcWxmAMmWAH lmELvuAYoWAdhgJuDEsZHmEWbuHWeWAbLmFm08AiVuEafuBvdGHxoeIfpgSKEh8abmFCAgiJxYUv vtyo7UzRQF8+9OLOhAd+mDoP7lZZ8ch3OIS1IrwvRuP9pYVmejf9reNTOYVuTQYx9shA/uN3Q9+g oIIMUIZVZAFgEo06xONTQWRdmhdJbqbSS19ciJCGGGD/UQiKfxCATu7jQxDlUSblUjblU0blVFbl VWblVnblV4blWJblWablWrblW8blXNblXeblXvblXwbmYBbmYSbmYjbmY0bmZFbmZWbmZnbmZ4bm aJbmaabmarbma8bmbNbmbebmbvbmbwbncBbncSbncjbnc0bndFbndWbndnbnd4bneJbneabnerbn e8bnfNbnfebnfvbnfwbogBbogSbogjbog0bohFbohWbohnboh4boiJboiaboirboi8bojNbojebo jvbojwbpkBbpkSbpkjbpk0bplFbplWbplnbpl4bpmJbpmabpmrbpm8bpnNbpnebpnvbpnwbqoBbq oSbq/6I26qNG6qRW6qVm6qZ26qeG6qiW6qmm6qq26qvG6qzW6q3m6q726q8G67AW67Em67I267NG 67RW67Vm67Z267eG67iW67mm67q267vG67zW673m6772678G7MAW7MEm7MI27MNG7MRW7MVm7MZ2 7MeG7MiW7Mmm7Mq27MvG7MzW7M3m7M727M8G7dAW7dEm7dI27dNG7dRW7dVm7dZ27deG7diW7dmm 7dq27dvG7dzW7d3m7d727d8G7uAW7uEm7uI27uNG7uRW7uVm7uZ27ueG7uiW7umm7uq27uvG7uzW 7u3m7u727u8G7/AW7/Em7/I27/NG7/RW7/Vm7/Z271D3hu/4lu/5pu/6tu/7xu/81u/95u/+9u// BvAAF/ABJ/ACN/ADR/AEV/AFZ/AGd/AHh/AIl/AJp/AKt/ALx/AM1/AN5/AO9/APB/EQt+8IAAA7 ------=_NextPart_000_0072_01BD5AA5.83C87CA0-- From nobody at REPLAY.COM Sat Mar 28 23:32:21 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 28 Mar 1998 23:32:21 -0800 (PST) Subject: Global Internet Liberty Campaign Alert 2.4 Message-ID: <199803290731.JAA03918@basement.replay.com> GILC Alert Volume 2, Issue 4 March 16, 1998 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Welcome to the Global Internet Liberty Campaign Newsletter ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Welcome to GILC Alert, the newsletter of the Global Internet Liberty Campaign. We are an international organization of groups working for cyber-liberties, who are determined to preserve civil liberties and human rights on the Internet. We hope you find this newsletter interesting, and we very much hope that you will avail yourselves of the action items in future issues. If you are a part of an organization that would be interested in joining GILC, please contact us at gilc at gilc.org. If you are aware of threats to cyber liberties that we may not know about, please contact the GILC members in your country, or contact GILC as a whole. Please feel free to redistribute this newsletter to appropriate forums. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [A] FOREMOST NEWS [A1] GILC to Issue Statement on Internet Content and Conduct [B] ROUNDUP OF GLOBAL INTERNET ISSUES [B1] Africa [B1.1] Sudan's Muslim Sects Want Internet Ban [B1.2] Ghana Brings Internet to People [B2] Asia/Oceania [B2.1] Singapore Requires ISPs to Install Internet Filters [B2.2] Malaysia Warns Against Technology Without Morality [B2.3] Hong Kong Labels Candy Site "Objectionable" [B2.4] Australia Concerned Over US Domain Name Proposals [B3] Europe [B3.1] EU Critiques US Over Domain Name "Green Paper" [B3.2] Russia Considers Amendment to Protect Internet From New "Mass Media" Law [B3.3] Kosovo Atrocities Posted to Internet [B3.4] UK Called on EU Members to Allow Police to "Tap" Encrypted Messages [B4] North America [B4.1] Senate Approves Two Internet Bills [B4.2] FBI Chief Freeh Warns Against "Uncrackable Encryption" [B4.3] FBI Rethinks Encryption Position, For Now [B4.4] New Mexico Censors Internet [B4.5] 100 Companies Join to Fight Encryption Controls +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CELEBRATE THE 50TH ANNIVERSARY OF THE SIGNING OF THE UNIVERSAL DECLARATION OF HUMAN RIGHTS BY GOING TO THE AMNESTY INTERNATIONAL HUMAN RIGHTS CARAVAN SITE AND JOINING THE THOUSANDS WHO'VE SIGNED THE DOCUMENT. THE CYBER"BOOK" OF SIGNATURES WILL BE CARRIED AROUND THE WORLD AND SIGNED BY DIGNATARIES, CELEBRITIES, POLITICIANS AND OTHERS. REAFFIRM THE WORLD'S DEDICATION TO HUMAN RIGHTS AND CIVIL LIBERTIES!!! http://www.rights.amnesty.org/english/signup/index.html +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [A] FOREMOST NEWS [A1] GILC to Issue Statement on Internet Content and Conduct Preparing for an OECD one day meeting on "International Co-operation Concerning Content and Conduct on the Internet", 25th March 1998, in Paris, members of the Global Internet Liberty Campaign will soon issue "Content and Conduct on the Internet: The Impact of Self-Regulation and Filtering on Human Rights to Freedom of Expression." Among other things, the statement notes: "Global rating or labeling systems squelch the free flow of information: Efforts to force all Internet speech to be labeled or rated according to a single classification system distorts the fundamental cultural diversity of the Internet and will lead to domination of one set of political or moral viewpoints. Such systems will either be easy to use and not have enough categories for all cultures or it will have so many categories to cater for all cultures that it will be unusable. These systems are antithetical to the Internet and should be rejected." A full report on the OECD meeting and GILC�s presentation will appear in the next Alert. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B] ROUNDUP OF GLOBAL INTERNET ISSUES [B1] Africa [B1.1] Sudan's Muslim Sects Want Internet Ban Islamic clerics, in recent calls, have focused their ire on Sudan's single Internet Service Provider, Sudanet. Inter Press Service quotes Mohamed Salih Hassan, a cleric of the influential Ansar Muslim sect, who sees the Internet as "pollutive" and fears that Sudanese youth are in jeopardy: "The Muslim people should respect the faith, and not allow such information to reach their families. If an uncontrollable system like the Internet is introduced in society it will be very difficult for us to preach the Kingdom of Allah." The battle to ban the Internet will be difficult, however. The newspaper interviewed people already connected to the Internet; one, who used an alias because he feared repercussions, said: "The Internet is not against anybody. It is a new information system that feeds the world with information . . . . The Internet will bring peace to all of us. It makes me feel like I am living in a world without borders." +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B1.2] Ghana Brings Internet to People While most people in Ghana do not have access to their own computers (because of the combined problems of illiteracy, poverty and weak electrical supplies), they will soon have access to the Internet. Several Internet Service Providers are looking for ways to bring the Internet to the average Ghanaian, through channels that people are already familiar with: communication centers that offer secretarial, word-processing, telephone and fax services. Inter Press Service reports "Africa Online will create a domain for each of the participating communications centers. The center, in turn, will be free to create E-mail addresses for its customers, who can then send and receive messages from their address at fixed costs." ISPs are also looking to provide access to school children. Network Computer Systems, another ISP, has recently offered to provide free Internet connections for a year to 100 high schools around the country. Visit the Network Computer Systems homepage: http://www.ghana.com Visit Africa Online: http://www.africaonline.com ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++ [B2] Asia/Oceania [B2.1] Singapore Requires ISPs to Install Internet Filters Singapore, which already censors the Internet, books and movies will require its Internet Service Providers to install, at the server level, software that filters "inappropriate material." Reuters quoted Information and Arts Minister George Yeo's address to parliament where he said that a software package, like Netnanny was "in the interest of cleaner, more sanitized internet service." A few days after that speech, Bill Gates said, during a one-day trip to the country: "I have no doubt Singapore, given it is a forward-looking country . . . will avoid doing something that will be a major roadblock." Read http://biz.yahoo.com/finance/980319/singapore__1.html Read http://www.wired.com/news/news/email/other/politics/story/10944.html +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B2.2] Malaysia Warns Against Technology Without Morality With Internet cafes springing up in suburbs all over Malaysia, students are beginning to send E-mail, chat in chat rooms, and eventually view sexually explicit material. To officials in the predominantly Moslem country, this presents problems. The nation's censors already take pains to keep movies free from "sex scenes" and magazines bare-breastless. The Associated Press quotes Junid Megat Ayob, Consumer Affairs Minister, who wants stricter controls on the Internet because he sees his mission as keeping youth from "poisoning their minds with filth." To aid in his mission, Cybercafes must now post with authorities about US$5,100 to ensure that their computers remain free from pornography. If the Cafes allow access to sexually explicit material, the government would confiscate the money. Read http://www.wired.com/news/news/politics/story/10712.html Read http://search.washingtonpost.com/wp-srv/WAPO/19980314/V000800-031498-i dx.html +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B2.3] Hong Kong Labels Candy Site "Objectionable" In another attempt to block "objectionable material" from the Internet, Hong Kong has censored a Hershey's candy Web site. The Television and Licensing Authority (TLA) put the "Smarties" candy site on a list of 1,000 sites which it deemed unfit for children. CNET quoted Raymond Yip, of TLA: "We need to investigate the case. It is probably a typing error on our part." Read http://www.news.com/news/item/textonly/0,25,20039,00.html?pfv The "unfit" Web site is: http://www.smarties.com Read EPIC's "Faulty Filters" report: http://www2.epic.org/reports/filter-report.html +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B2.4] Australia Concerned Over US Domain Name Proposals The United States has recently proposed a centralized plan to regulate Internet issues. Besides changing the way persons register Internet Domain Names, a US-based corporation would administer the names and subject any disputes to US law. Fears are that the plan would "effectively ensure US jurisdiction over trademark issues and dispute resolution processes," said Senator Richard Alson, the Minister for Communications, the Information Economy and the Arts, in a press release. He added: "We need to ensure that the views of Australian stake holders, and the Australian Government, are fully considered in decisions to reform the international system." Read the Press Release: http://www.dca.gov.au/mediarel/98/028.html Go to Electronic Frontiers Australia for more news on related issues: http://www.efa.org.au +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B3] Europe [B3.1] EU Critiques US Over Domain Name "Green Paper" The battle against the US Domain Name proposals is also being waged on European soil. The European Commission has accused the US of desiring to keep the international network of computers under domestic control, and thereby, creating a monopoly. The European Report announced that "the EU and its Member States are calling for a re-balancing of interest and responsibilities in recognition of the Internet's international character." They want balanced and fair participation by the private sector in Internet management. In a "green paper" published in January, the US suggested that the private sector begin controlling essential pieces of the system, instead of the US government. The "essential pieces" are "generic top-level domains": for example, ".net," ".org," and ".com." The Deutsche Presse-Agentur quotes Professor of Computer Science, Werner Zorn of the University of Karlsruhe in Germany: "The U.S. government is trying to prevent foreign dominance on the Internet." Another motive, adds Zorn, is retaining a lucrative source of income. Today, US-based Network Solutions charges $100 per domain name registered. Read the International Council of Registrars' response to the US "Green Paper": http://biz.yahoo.com/bw/980323/core_1.html Read the CATO Institute's "INTERNET DOMAIN NAMES: Privatization, Competition, and Freedom of Expression": http://www.cato.org/pubs/briefs/bp-033es.html +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B3.2] Russia Considers Amendment to Protect Internet From New "Mass Media" Law The Moscow Times reported that the Russian Duma has recently proposed a new law on "mass media that could place a roadblock in the path of Russia's fledgling web publishers, from individuals with personal home pages to large corporations blazing the trails of electronic commerce." Duma deputy, Y.M. Nesterov, however, suggested an amendment excluding any mention of "computer information" from the bill. Furthermore, the chair of the committee preparing the bill, displayed some interest in the Internet question. The Communication Committee will examine that and other amendments to the "mass media" bill and draft a second bill for final hearing. As of yet, nothing has been announced. Latest information in Russian: http://www.cityline.ru/politika/media/media.html +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B3.3] Kosovo Atrocities Posted to Internet In the remote parts of Yugoslavia, unreliable links to the outside world and the tight-lipped state news agency, Tanjug, have made a journalist's job difficult. But in many situations, the Internet continues to provide detailed and timely reports. The Scotsman reports that Web sites publish, without the "benefit" of censorship, and post eyewitness accounts and pictures of "men, women, and children with eyes gouged out, throats cut, and grenade and gunshot wounds." The Internet accounts guarantee that traditional sources of information will not dictate the spread of complete and accurate information; therefore, "there can be no doubt whatsoever of the veracity of claims made by Albanians in Kosovo." Visit: http://www.kosova.com Visit: http://www.albanian.com Read the GILC Statement on Human Rights and the Internet: http://www.gilc.org/news/gilc-ep-statement-0198.html +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B3.4] UK Called on EU Members to Allow Police to "Tap" Encrypted Messages Following the GILC statement on encryption, European Voice reported that officials from the UK desire that, in particular situations, government officials should be authorized to tap encrypted E-mail messages sent through the Internet. Citing concerns with terrorists, the Mafia, and other criminal organizations, UK officials warned: "Where an encryption key is used for confidentiality purposes, it may be necessary for law enforcement agencies to have lawful access . . . .. either overt[ly] or covert[ly]." For an opposing view, European Voice quoted the Business Software Alliance: "Without strong encryption, businesses and individuals will not entrust their valuable proprietary information, creative content, and sensitive information to electronic networks. The result will be that the full potential for electronic commerce, personal growth and government efficiency and other benefits of the information society will be delayed or lost altogether." According to Yaman Akdeniz of Cyber-Rights & Cyber-Liberties (UK) the current UK policy is still not clear: "We will have to wait and see the new policy; and I, unfortunately, believe that it will still be a system which favors key escrow." Read the GILC Statement on possible UK Cryptography Policy: http://www.gilc.org/crypto/uk/gilc-dti-statement-298.html Read BBC News Coverage of the GILC member statement, "UK government dithers on encryption regulation," Feb.20, 1998. http://news.bbc.co.uk/hi/english/special_report/1998/encryption/newsid _58000/58499.stm Read GILC's Cryptography and Liberty: An International Survey of Encryption Policy, February 1998, at http://www.gilc.org/crypto/crypto-survey.html. Read Cyber-Rights & Cyber-Liberties (UK), "First Report on UK Encryption Policy" is available at http://www.leeds.ac.uk/law/pgs/yaman/ukdtirep.htm. Read "Scrambling for Safety" Conference Web site is at http://www.privacy.org/pi/conference/dti/. Read the Walsh Report, "Review of policy relating to encryption technologies": http://www.efa.org.au/Issues/Crypto/Walsh/ Read Kryptographie, Cryptography resources in German from FITUG, at http://www.fitug.de/ulf/krypto/. Britain has delayed any encryption proposals: http://www.techweb.com/wire/story/TWB19980219S0008 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B4] North America [B4.1] Senate Approves Two Internet Bills The Senate Commerce Committee approved on a voice vote two bills that restrict speech on the Internet. The first was Senator John McCain's (which would limit student access to constitutionally protected speech in schools and libraries) and the other was Senator Dan Coats's (which would censor legitimate adult speech). McCain's bill requires schools and libraries, which receive federal subsidies for Internet connections, to install filtering software. Senator Conrad Burns, however, offered an amendment that would not require the use of filtering software, but would require that schools have some kind of Internet policy which shields students from sexually explicit material. Senator Coats's bill would censor commercial distribution of "harmful material" to people under 17 years of age. Senator Dan Wyden, the sole dissenter on the Coats bill, criticized Coats's attempt as a "one size fits all" model. Read the ACLU Press Release: http://www.aclu.org/news/n031298b.html Go to the Internet Free Expression Alliance for more news on the bills: http://www.ifea.net Go to the EPIC site for the text of the bills: http://www.epic.org Read EFF's Press Release: http://www.eff.org/pub/Censorship/Internet_censorship_bills/1998_bills /19980312_eff.statement Go to CDT's site for more information: http://www.cdt.org/speech +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B4.2] FBI Chief Freeh Warns Against "Uncrackable Encryption" Before a Senate Appropriations Committee Subcommittee on Commerce, Justice, State and Judiciary on March 3rd, Louis Freeh, director of the FBI, argued that online anonymity imperiled FBI criminal investigations and put children in danger: "We would encourage the Internet provider industry to maintain subscriber and call information. We certainly hope it would be done, even on a voluntary basis." Freeh added: "Uncrackable encryption allows, and will continue to allow with increasing regularity, drug lords, terrorists, and even violent gangs to communicate about their criminal intentions with impunity." The ACLU challenged these scare tactics with "Big Brother in the Wires": http://www.aclu.org/issues/cyber/wiretap_brother.html +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B4.3] FBI Rethinks Encryption Position, For Now The FBI has had a long history of arguing against strong encryption. Nevertheless, on March 17th, a Justice Department official, Robert Litt, the deputy assistant attorney general of the criminal division, remarked to a Senate Judiciary subcommittee hearing on the constitutional issues raised by government encryption controls: "We are not looking for any mandatory controls domestically at this time." The CyberTimes reported that, for now, he/the FBI/the Clinton administration is "retreating from legislation that would give 'law enforcers access to encrypted computer data and communications.'" CyberTimes: http://www.nytimes.com/library/tech/98/03/cyber/articles/18encrypt.htm l CNET's article: http://www.news.com/news/item/0,4,20149,00.html For a full transcript of the congressional testimony: http://www.computerprivacy.org/archive/03171998-1 Legal scholars respond to Litt: http://www.computerprivacy.org/archive/03231998-1.shtml ACLU's "White Paper" on Clinton's encryption policy: http://www.aclu.org/news/n031798b.html +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B4.4] New Mexico Censors Internet The Electronic Frontier Foundation will challenge New Mexico's "Net Indecency Law." Earlier this month, Governor Gary Johnson signed a bill that suffers from the same constitutional defects that caused the Supreme Court to strike down the Federal Communications Decency Act in June of 1997. In a letter to Johnson, Barry Steinhardt, president of EFF (a GILC founding member) wrote, "the bill is patently unconstitutional and represents a threat to freedom of expression, not only in New Mexico, but across the country." EFF's letter: http://www.eff.org/pub/State_and_local/NM/Censorship/Internet_censorsh ip_bills/1998/19980307_eff_sb127.letter CNET article: http://www.news.com/news/item/textonly/0,25,19859,00.html?pfv Reno v. ACLU: http://www.aclu.org/court/renovacludec.html +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [B4.5] 100 Companies Join to Fight Encryption Controls Americans for Computer Privacy (ACP) has begun an advertisement campaign urging citizens to stop their politicians from limiting encryption. In a press release, ACP stated that it "will implement a multi-million dollar campaign to demonstrate to members of Congress and administration officials that a fair encryption policy is not just a computer issue. It's a privacy issue. It's a consumer issue. It's a medical records issue. It's a taxpayer protection issue. It's a crime deterrent issue. It's a jobs issue. It's a competitive issue. In an open letter, the American Civil Liberties Union, the Electronic Frontier Foundation and the Electronic Privacy Information Center said, �(W)e believe that the ACP will be an important ally in the ongoing effort to protect personal privacy in the digital age," the letter says, "and we look forward to working together towards a complete and unrestricted repeal of the current controls on the export of strong cryptography and to resist any domestic restrictions on the use of encryption." The Washington Post article: http://www.washingtonpost.com/wp-srv/Wplate/1998-03/04/0491-030498-idx ..html ACP can be found at http://www.computerprivacy.org The American Civil Liberties Union, The Electronic Frontier Foundation, and the Electronic Privacy and Information Center issued this joint letter: http://www.aclu.org/news/n030498a.html ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +++++++++++++++++++++++++++++++++++++ Raafat S. Toss GILC Organizer Developer American Civil Liberties Union 125 Broad Street New York, New York 10004 rtoss at aclu.org ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +++++++++++++++++++++++++++++++++++++ Links to all information in this alert can be found at http://www.gilc.org You are welcome to pass the GILC ALERT to all who may be interested. And you have permission to re-print GILC ALERT and distribute it. If you are not a subscriber but would like to be, please send an email to gilc-announce at gilc.org with the following message in the body: Subscribe gilc-announce PUBLICATION OF THIS NEWSLETTER IS MADE POSSIBLE BY A GRANT FROM THE OPEN SOCIETY INSTITUTE (OSI) From jcaldwel at iquest.net Sun Mar 29 10:22:13 1998 From: jcaldwel at iquest.net (jcaldwel at iquest.net) Date: Sun, 29 Mar 1998 10:22:13 -0800 (PST) Subject: Fw: Re: Calif. AB2560=A Whiff Of Dictatorship.... In-Reply-To: Message-ID: <199803291822.KAA04950@toad.com> > > In addition to the AB 23 bill, which will retroactively felonize a very > > broad class of weapons, here's a new one which will make felons out of > > anyone who goes shooting with others, anyone who teaches a self-defense > > class, and (depending on interpretation by the courts) anyone who gives > > advice here on the Cypherpunks list about weapons, self-defense, and > > explosives and suchlike devices. Let me know when it passes, you note I said *when* and I'll offer advise direct to californicates attorney general via this list. Seeing as states are attempting to persecute non-state-citizens with it's laws it should be interesting. and .45acp beats 9mm From jcaldwel at iquest.net Sun Mar 29 10:27:37 1998 From: jcaldwel at iquest.net (jcaldwel at iquest.net) Date: Sun, 29 Mar 1998 10:27:37 -0800 (PST) Subject: (Fwd) Slaves Message-ID: <199803291827.KAA05001@toad.com> Tim May said > It's time to take direct action against the bozos who keep restricting our > freedoms. I used to be more moderate, favoring more civil measures to rein > them in. This isn't working. They're pressing in at every level. They are > declaring war. ------- Forwarded Message Follows ------- From: jcaldwel at iquest.net Organization: People in Green To: jcaldwel at iquest.net Date: Sun, 29 Mar 1998 13:26:57 +0000 Subject: Slaves Priority: normal --Digest-12348D34 Return-Path: Delivered-To: jcaldwel at iquest.net Received: (qmail 26126 invoked from network); 26 Mar 1998 19:21:46 -0000 Received: from relay2.uu.net (192.48.96.7) by iquest3.iquest.net with SMTP; 26 Mar 1998 19:21:46 -0000 Received: from uucp1.uu.net by relay2.UU.NET with SMTP (peer crosschecked as: uucp1.uu.net [192.48.96.81]) id QQeikj15143; Thu, 26 Mar 1998 14:21:39 -0500 (EST) Received: from aen.UUCP by uucp1.uu.net with UUCP/RMAIL ; Thu, 26 Mar 1998 14:21:40 -0500 Received: by aen.org (MailGate 0.24 mg at ear.anpe.br) Thu, 26 Mar 1998 14:16:08 Date: Mon, 23 Mar 1998 11:55:03 From: BILL SMITH Sender: AEN-NEWS Message-ID: <09d2e3ec8534c45b at aen.org> Organization: American Justice Federation To: Multiple recipients of list NEWS Subject: slaves 2/3 X-Mailer: MailGate 0.24 Unregistered X-UIDL: dd9d59da658bbfbae62111c9cb7e5e4e * Original: FROM: BILL SMITH * Original: TO: ALL * Original: AREA: MILITIA * Forwarded by Al Thompson * Forwarded Using QuickBBS 2.76 Ovr * Forwarded at 13:17 on 26-Mar-98 EID:F933 FC775EE0 >>> Continued from previous message Rescinding your social security number is another thing that I would have said a year ago, "OK, it's an option, but it's a grandstanding option. It's waving and saying, 'Hey, hey, I'm a troublemaker. Put me on a list.'" But I am going to be rescinding my social security number formally, writing to the Social Security Administration and saying, "Nope. Not my number, folks." It may be a grandstanding gesture, but that number is a slave's number, and I'm getting rid of it, pure and simple. Now a lot of people -- a lot of people _here_ -- are doing these things already. I know people right here in this group who haven't paid taxes in years. I know people in this group who don't have a driver's license, who _have_ rescinded their social security numbers, or whatever, and I think that's great. In fact Rick White came up with a really good term the other day when we were talking. He talked about "individual secession" as a means of combating the government. We were talking about ways of avoiding violence, and he suggested "individual secession" as a means of accomplishing that. I think it's great, and I think we all need to do it. But I also think that the result of quiet secession -- of just quietly withdrawing your consent, your support, your participation in the system -- the result of that is something like what happened in the Soviet Union. Eventually the system collapses, but what's left? You have black markets. We like black markets, because they're free markets. But they are corrupt markets that are run by gangsters, eventually. We need free, open markets. We need to declare freedom and live it publicly, instead of by hiding. I think individual secession is good, but we need to make noise doing it. And not polite noise. We libertarians are very polite people, very well-mannered. We sign our little pledge, and we do the right thing, because that's the kind of people we are. But we need to make noise. We need to say, "I'm withdrawing. I'm withdrawing, and here's why, and come get me." And that goes against everything I personally believe. One reason you never heard of Claire Wolfe until six months ago was that although I've been an activist, I have tried to keep a low profile and tried to be really quiet, because I didn't want the IRS knocking on my door, or kicking it down as the case may be. I didn't want the ATF coming in to say hello at four in the morning. But I don't care any more. I _do_not_ care any more, and I think we're coming to a confrontation point anyway, and if that's what happens, so be it. I think there are a lot of other things that you can all do and probably all _are_ doing; probably a lot of you are ahead of me. That's why I like coming down to Arizona; I learn from what people in Arizona are doing. But certainly, withdraw to the extent that you can from the banking system. Set your political priorities -- don't waste your time on things that aren't working. Like for me, I was always always sitting down writing stupid letters to my congressperson, as if my congressperson cared. I felt like I was doing something. But one of the things I've learned since those days is to do is prioritize. And that means don't even bother any more. Don't even talk to them any more. I think everybody should be studying warfare, in one way or another. Whether that's the personal warfare of going up to Gunsite and learning how to shoot in combat situations or whether that's studying _The Art of War_, reading books by Mao, or Che Guevara, or Sun-Tzu. I think we all need to be doing that, even if we don't want the confrontation. None of us _want_ the confrontation, but I think we'd better be prepared for it in those ways. I think we should all be getting out of government jobs -- with one exception. With one exception, and this is something I've just been thinking about. I've decided that over the last thirty years some _wonderful_ libertarian has been running the IRS' computer system. And I say, "Thank you out there, whoever you are, and keep it up! Good job!" So anybody who's in a position to do unto the ATF or unto the EPA what has been done to the IRS, definitely go for it. One of the things that we can do, whether we're looking for confrontation or not, is to establish some virtual communities. And here's where Michael Voth comes in. Michael of the Coconino libertarians, and Kevin Burt of the Laramie County libertarians of Cheyenne Wyoming, cooked up this notion of "cousin counties". You know how we have "sister cities" all around the world? Well, we now have a "cousin countyship" between Laramie and Coconino libertarians. We don't exactly know what we're going to do with it yet, but we have our own "virtual community", and it is somewhat of an act of...well I don't think we care enough to _defy_ the national hierarchy, but we're going to make connections despite the hierarchy. Some day we may need a "safe house" in Coconino; some day they may need a "safe house" in Laramie County. Some day we may need to be stations on an underground railroad for getting patriots to safety. We may need to be stations on a supply line, and we have that connection established. We have a relationship with each other already, and we'll do what seems appropriate with it. That, unfortunately, brings us to the national party, or higher-up-the-line parties. I think -- and this is just a personal viewpoint -- that the best thing that the state party could be, or the best thing that the national party could be for individual libertarians is a support group to help us establish networks with each other; to help us keep connections with each other; to help us learn from each other; what works and what doesn't work; what did they try over in Alabama that might work in Nevada, or that was a disaster and might not work anywhere? Your state organization is great for that, I think, to the extent that I know it. Unfortunately you're one of the few that is. And unfortunately, of course, we have National. The national party. The commissariat of Washington, D.C. What is the national party? It is a top-down fund-raising organization that is into telling us what we should do, not learning from us and helping to spread it around. And certainly some of the things that we should _not_ do, according to National...we should not have people like L. Neil Smith at our gatherings. He has been declared "unfit" by the national party. And I hope you all recognize that. [Applause for Smith, who was sitting in the audience.] Also, a year or so ago, those of us who got the "Libertarian Volunteer" got an issue that listed the "twelve most terrible things" that have ever been done at local party meetings. One of them was to discuss "Should There Be A Libertarian Party?" I mean, that's shocking. How _dare_ we talk about such a thing? So here we are at a time when we need individualism, autonomy, quick action and networking, being saddled with this sort of dinosaur with the little pea-brain up here in Washington, DC, trying to communicate down to us, thinking we're its tail or something. Yhey are so busy trying to be like the other folks in Washington, D.C. that they are very quickly forgetting that they _are_ libertarians. But I'm sure they're quite good at fund-raising; I've hear wonderful tales about their fund-raising. In fact, something quite interesting that I heard the other day indirectly from Neil: Harry Browne is criticizing _me_ as one of the people who was damning him for his fund-raising and odd campaign spending practices. Well, I never did. I would have. I would have been happy to, because of what I have heard from Vin Suprynowicz and Neil Smith and other people. But it didn't happen. So, National is giving us enemies lists and fund-raising corruption, among other pleasures of politics. Heck, they're headquartered in the Watergate, after all! What are we going to do with these people? They think that success is raising a lot of money whether it goes to any good cause or not. They think that success is being invited to the cocktail parties with the Democrats and the Republicans. They think that success is having libertarianism favorably mentioned in the Washington Post. >>> Continued to next message --- * OLX 2.2 * It's dangerrous to be right when the government is wrong --- GEcho 1.00 # Origin: Texas Patriot PRN-Dallas (972)495-6699 (176:200/200) GPTH: 200/200 0 100/0 500/0 14 GATE: 1:273/304.0 at fidonet 35188aac * Origin: FidoNet <-> PRNet EchoGate! (1:273/304.0) ********************************************************* To post a message to AEN NEWS, address it to news at aen.org. --Digest-12348D34 Return-Path: Delivered-To: jcaldwel at iquest.net Received: (qmail 26399 invoked from network); 26 Mar 1998 19:22:23 -0000 Received: from relay5.uu.net (192.48.96.15) by iquest3.iquest.net with SMTP; 26 Mar 1998 19:22:23 -0000 Received: from uucp1.uu.net by relay5.UU.NET with SMTP (peer crosschecked as: uucp1.uu.net [192.48.96.81]) id QQeikj07942; Thu, 26 Mar 1998 14:21:59 -0500 (EST) Received: from aen.UUCP by uucp1.uu.net with UUCP/RMAIL ; Thu, 26 Mar 1998 14:22:00 -0500 Received: by aen.org (MailGate 0.24 mg at ear.anpe.br) Thu, 26 Mar 1998 14:16:15 Date: Mon, 23 Mar 1998 11:55:04 From: BILL SMITH Sender: AEN-NEWS Message-ID: <57aba693e31d8602 at aen.org> Organization: American Justice Federation To: Multiple recipients of list NEWS Subject: slaves 3/3 X-Mailer: MailGate 0.24 Unregistered X-UIDL: 212fd7b6a01af2f18063501274f82fcf * Original: FROM: BILL SMITH * Original: TO: ALL * Original: AREA: MILITIA * Forwarded by Al Thompson * Forwarded Using QuickBBS 2.76 Ovr * Forwarded at 13:17 on 26-Mar-98 EID:E912 FC775EE0 >>> Continued from previous message OK, if I were favorably mentioned in the Washington Post, I would do everything I could to change my ways! Wouldn't you? Who wants to be favorably mentioned by people who think that every bit of dissent is _hate_speech_? Who think that anyone who is not a Republican or a Democrat or in the mainstream is some sort of crazy? No. No thank you. Hunh-unh. No thanks. We try very hard to be acceptable. The national party is trying to be acceptable and there's nothing wrong with that. It's human. I mean we want to be accepted from the moment we're born. But the question is, to whom do we want to be acceptable? I don't want to be acceptable to the same people that the national party wants to be acceptable to. I want to be acceptable to you guys. And I want you to be acceptable to me, because we are going to need each other some day. I want to be with you when we prepare. I don't care whether you're preparing even for the same eventuality that I'm preparing for. I don't care if you're a pacifist. There is room for many differences. But we've got a role to play, and it's we, not national, who are going to play that role. Something is going to happen. I wish I could tell you what it was. I've been talking to people and everybody's going through the same thing -- "Well, I think it might be this", "I think it might be that", "I think it might be the other" -- we don't know. But it's coming. Whether it breaks with the suddenness of an earthquake, or whether it comes like a storm that you can see rolling toward you for hours, it _is_ coming. And the big question for all of us, when this hits, is, "Do I want to be polite and acceptable or _do_I_want_to_be_FREE?" Free, of course! I mean, it's easy, right? It's easy! So let's do it! I have absolute confidence you guys are going to be _able_ to do it. And when it all comes down, I want to be here, if not physically in Arizona, I want to be in your virtual community. So thank you for your guts. And thank you for having me here. And thank you for being brave enough to talk about things that National doesn't want you to talk about, and to do things that National doesn't want you to do. My congratulations and gratitude to all of you. ***** NOTE on the health care database: I have since been fiercely corrected on this point. I may have been overstating the present danger of such a database, though I believe the danger remains grave for the near future. The health care bill (available from the Library of Congress' Thomas web site as HR 3101 or Public Law 104-191) establishes a federal database for reporting medical fraud and abuse. I don't believe this is the problem, however it was part of the confusion. Later, in Sections 1171-1175, the bill outlines a plan for the Secretary of Health and Human Services to set standards for the electronic transmission of all health care data. These "standards" do not constitute a database, and I thank the critic who corrected me on that issue. However, the secretary is directed to set one standard _by which all medical data will be electronically communicated_. The standard must include a "unique identifier" for every individual whose medical information is ever transmitted (Sec. 1173). In doing that, Congress is clearly allowing the Clinton administration to create a de facto single, nationwide system to which federal (and other) bureaucrats will have easy access, almost certainly via our social security numbers. If this does not rapidly become the feared federal database, it will nevertheless allow the government, researchers and others to run rampant through the various private or state databases that will use the federally defined standard. I regret any confusion. But I urge you to keep your eyes open and your heads up...not that it will do you much good when bureaucrats are secretly slurping your medical data -- law or no law -- into their computers. (c)Claire Wolfe 1997 +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ America is at that awkward stage. It's too late to work within the system, but too early to shoot the bastards. -- Claire Wolfe, "101 Things To Do 1Til the Revolution" http://www.geocities.com/CapitolHill/Lobby/1797/essay.htm --- * OLX 2.2 * It's dangerrous to be right when the government is wrong --- GEcho 1.00 # Origin: Texas Patriot PRN-Dallas (972)495-6699 (176:200/200) GPTH: 200/200 0 100/0 500/0 14 GATE: 1:273/304.0 at fidonet 35188aac * Origin: FidoNet <-> PRNet EchoGate! (1:273/304.0) ********************************************************* To post a message to AEN NEWS, address it to news at aen.org. --Digest-12348D34 Return-Path: Delivered-To: jcaldwel at iquest.net Received: (qmail 25758 invoked from network); 26 Mar 1998 19:21:09 -0000 Received: from relay4.uu.net (192.48.96.14) by iquest3.iquest.net with SMTP; 26 Mar 1998 19:21:09 -0000 Received: from uucp1.uu.net by relay4.UU.NET with SMTP (peer crosschecked as: uucp1.uu.net [192.48.96.81]) id QQeikj20441; Thu, 26 Mar 1998 14:21:06 -0500 (EST) Received: from aen.UUCP by uucp1.uu.net with UUCP/RMAIL ; Thu, 26 Mar 1998 14:21:07 -0500 Received: by aen.org (MailGate 0.24 mg at ear.anpe.br) Thu, 26 Mar 1998 14:16:00 Date: Mon, 23 Mar 1998 11:55:02 From: BILL SMITH Sender: AEN-NEWS Message-ID: <872acd96ec56a07b at aen.org> Organization: American Justice Federation To: Multiple recipients of list NEWS Subject: slaves 1/3 X-Mailer: MailGate 0.24 Unregistered X-UIDL: a81aec78baf7018c7b8665879425cfaa * Original: FROM: BILL SMITH * Original: TO: ALL * Original: AREA: MILITIA * Forwarded by Al Thompson * Forwarded Using QuickBBS 2.76 Ovr * Forwarded at 13:17 on 26-Mar-98 EID:C950 FC775EE0 SPEECH BEFORE THE ARIZONA LIBERTARIAN PARTY CONVENTION April 19, 1997 by Claire Wolfe In November, 1995, I sat down and wrote the words, "America is at that awkward stage; it's too late to work within the system, but too early to shoot the bastards." That's a line a lot of you have become familiar with, and to the extent that other people have also become familiar with it, it has a lot to do with Arizona libertarians pushing that message. Well, I wrote that a year and a half ago, the book was published about six months ago, and now here we are, April 19, 1997. Is it time to "shoot the bastards" yet? This is a question a lot of us have been pondering. We signed our oath, most of us, we signed our pledge not to initiate violence. We're the good guys. We know that. But I have heard so many people -- good, responsible, ordinary people -- talking about whether we might be reaching the time that we should "shoot the bastards". I think one of the best comments on this came from Vin Suprynowicz, who interviewed me when the book was published. Actually, of all the things said in the interview Vin made the best comment; he said that we have reached the time when it is _morally_ right to "shoot the bastards", but it is not yet _practical_ to do so. I do believe that a fight is inevitable, whether that's a fight in the streets or the trenches, or whether that is some sort of confrontation that may not involve arms but may nevertheless involve violence and head-to-head action. I think that's inevitable, and I think more and more people are coming to the conclusion that it is. April 19th, as you all know, is a day in history when many people _have_ taken up arms, when they have been _forced_ to take up arms. Peaceable people in Lexington and Concord, desperate people in the Warsaw ghetto. Even when they had no hope, or little hope, they took up arms. But here we stand, and although a lot of us have arms with us, or not far from us, we're not ready to "take up arms" yet. But I hope we're preparing ourselves. I hope we're at least thinking about it. In the last year and a half, since I originally wrote those frustrated, angry words, things have gotten a hell of a lot worse. And it's almost scary how little the disaster that we're in the middle of has been acknowledged. For instance, just four -- I don't want to call them laws or acts of legislation -- four abominations that Congress has come up with in the time since I originally wrote those words. We've got a federal database of all employed people, or, that is, all people who get conventional jobs. That's been done in the name of "tracking deadbeat dads". However, you might be a single mother with five kids you're taking good care of; you might be a single guy who never intends to get married. You're going in that database. Why? What does that have to do with "deadbeat dads"? I don't know. I can't figure it out. Along those same lines, we now have pilot projects being started, under which you cannot get a job unless your employer first gets permission from the Social Security Administration by scanning your card through a reader connected to a database in Washington, DC. Isn't that cute? Some Social Security bureaucrat decides whether or not you can ever get a job in this country. We've also got a medical health care database that will be on line in about a year. This was part of the "moderate" Kennedy-Kassebaum health care act -- you'll be pleased to know that this is "moderate". Everything about your medical history will go into this database, including speculation on the part of your doctor, who may observe that you're an "armed and dangerous wacko". He's not going to tell you that, but it goes in your records and goes in the database. (NOTE: Please see comment at the end of this transcript.) The fourth one that is really for me the "line in the sand" issue is the national ID card that we have just begun to hear about in the last couple of months. Has everybody heard something about that? Well, for the few who haven't I'll just review quickly. At the end of the 104th Congress there were about two paragraphs added into several hundred pages of legislation that requires that by October, 2000, all states will be issuing driver's licenses that you must have your Social Security card to get one, and they will have certain "security features". These are not defined in the law, but they may include: retinal scans; fingerprint scans; other data on your driving history, health history, criminal history, so on. (NOTE: The U.S. Secretary of Transportation is currently in the process of writing the regulation on this.) And by October 2006, you will not be able to get _any_ government service at _any_ level without having one of these driver's licenses. You will not be able to get a passport. If your local utility company is the government you will not be able to get water to your house, or electricity to your house, and so on. My Christian friends, of course, are calling this the "Mark of the Beast", and I don't think they're wrong. I think they're right. So those four things, among many, many others, have all been snuck in on us lately. But the reason I pick these four is something that a friend pointed out to me. This friend says, "These four are slave laws." Many other laws that have been imposed upon us recently are bad laws, but _these_are_slave_laws_. They all enable the federal government to track its property -- you, and you, and you, and me -- its property. They can monitor our health just the way that farmers monitor the health of their cattle. If they don't think we're being properly productive they can deny us the jobs, or they can make sure that we're in a job that they like. It's here, now, that we have to stop this. I hope we can stop it without violence, but we do HAVE to stop it. What I'd like to focus on today are some things that I think we as individuals can do, and some of the things that I think that libertarian party organizations can, or perhaps should, do to prepare for the hard times that are going to come when the day arises that we say, "No! It stops here! It stops now!" I wish for just this little moment that we were all a bunch of Marxists, or Democrats, or something, because then I could say, "Comrades! You _must_ do this! Comrades! You _shall_ do that!" But we're libertarians, and it's only, "Hey! You'll do what you want to do; I'll do what I want to do. You'll do what fits your personality; I'll do what fits my personality." And that is the way it has to be. That's our strength and our weakness. But there are a couple of things that I would say that I think everybody here, and everybody who professes to be a libertarian _should_do_. One is to get the income tax out of your own life, however you have to do it. Get it out! In every other presentation I've ever given before I've said, "Oh I understand that if you have a regular job, or if you have children, or if you have a lot of nice possessions it's riskier for you to do it. But I'm coming to the point where, I'm sorry, we can't feed the beast. We've got to stop feeding it. That's all there is to it. All of our great professions of principle in the world are nothing if we don't stop paying the ATF, paying the FBI, paying the IRS. The other thing that I hope everyone will do is resist this national ID in some way or another. Refuse to get the driver's license, drive without it, whatever you have to do. Refuse to give the information, protest, scream, rescind your social security number, whatever. >>> Continued to next message --- * OLX 2.2 * It's dangerrous to be right when the government is wrong --- GEcho 1.00 # Origin: Texas Patriot PRN-Dallas (972)495-6699 (176:200/200) GPTH: 200/200 0 100/0 500/0 14 GATE: 1:273/304.0 at fidonet 35188aac * Origin: FidoNet <-> PRNet EchoGate! (1:273/304.0) ********************************************************* To post a message to AEN NEWS, address it to news at aen.org. --Digest-12348D34-- From paulmerrill at acm.org Sun Mar 29 13:47:20 1998 From: paulmerrill at acm.org (Paul H. Merrill) Date: Sun, 29 Mar 1998 13:47:20 -0800 (PST) Subject: Fw: Re: Calif. AB2560=A Whiff Of Dictatorship.... In-Reply-To: <199803291822.KAA04950@toad.com> Message-ID: <351EEBBB.8B0C8906@acm.org> jcaldwel at iquest.net wrote: > > > > In addition to the AB 23 bill, which will retroactively felonize a very > > > broad class of weapons, here's a new one which will make felons out of > > > anyone who goes shooting with others, anyone who teaches a self-defense > > > class, and (depending on interpretation by the courts) anyone who gives > > > advice here on the Cypherpunks list about weapons, self-defense, and > > > explosives and suchlike devices. > > Let me know when it passes, you note I said *when* and I'll offer advise > direct to californicates attorney general via this list. Seeing as states are > attempting to persecute non-state-citizens with it's laws it should be > interesting. It was when they started doing it years ago (on porn sites) but now it is an established practice. > > and .45acp beats 9mm But I prefer 12 ga PHM From sbear at datanet.com.mx Sun Mar 29 17:36:05 1998 From: sbear at datanet.com.mx (sbear at datanet.com.mx) Date: Sun, 29 Mar 1998 17:36:05 -0800 (PST) Subject: BUY DIRECT FROM HONG KONG Message-ID: HONG KONG TRADE DIRECTORY BUY DIRECT FROM HONG KONG AND MAKE HUGE PROFITS ON THE NET,MAILORDER,RETAIL STORES ETC!!!!! http://www.vicom.net/books HONG KONG PROFITS... You have heard that there are factories in Hong Kong that produce thousands of products at low give-away prices. But never before have you been able to believe that you could get in on these lucrative profits! � SECRET SOURCES ... Only the big importers knew the secret addresses in Hong Kong and who to buy from. We went to Hong Kong, located the low cost sources and have put them in our Hong Kong Trade Directory. � FREE SAMPLES... Yes, you can get samples direct from Hong Kong with this complete Hong Kong Trade Directory. Shipments can be made to you by air practically overnight. Your dollars are valuable in Hong Kong. No need to pay high union labor costs in the U.S. or bloated manufacturers' profits. � BEST PRICES... Why buy from Hong Kong? It's simple! You want to get the best prices. You want to get exclusive import deals! Imagine, if you will. that you can get the exclusive import rights for the U.S. on a product! If everyone in the U.S. had to buy from you, wouldn't you be able to make a fortune? � DON'T DELAY... But, don't delay! Now that we are making our directory available, others will want to get on the bandwagon. There's still time, but you must act quickly to be one of the first to get in on the new low cost buying opportunities. � EASY TO IMPORT... Let me assure you that your only cost for getting in contact with nearly 300 manufacturers in Hong Kong that offer over 10,000 products is only $15, and the few cents to send them a letter once you have our Hong Kong Trade Directory. There are no membership fees to pay. No fancy, expensive import courses to take. We've eliminated all of that. � FACTORY PRICES... Watches; Bonds; Fashion Accessories; Radios; Garments; Hardware; Handbags; Jewelry; Toys; Hats; Calculators; Decorations; Art; Gloves; Footwear; Foodstuffs; Hair Products; Vacuums; Gift Items; Plastic Products; Photo Equipment; Car Accessories; Lamps; Novelties; Chemicals; Machinery; and much, much more � LATEST EDITION... You will get the latest, most current edition and just getting it in your hands will put your fortune within your grasp. � MAIL ORDER PRODUCTS... Find a new MAIL ORDER item in our Hong Kong Trade Directory . . . or find a staple item at a new low price or find a source to have a product made to order for you at cheap Oriental prices, and the top quality that Americans demand! � It's all here in the ALL NEW Hong Kong Trade Directory. Full, 64 pages . . . complete with photos on every page... � WHOLESALE ONLY... Remember this is a wholesale importing directory, not retail; you are dealing directly with the factory in all cases. The Chinese work on low markups seeking their profit from many orders. � GUARANTEE! We guarantee that the addresses listed are 95% accurate. We also guarantee that items shown in the Directory are from direct sources who will ship to the U.S.A. �GO TO http://www.vicom.net/books For more info From creditforu at hotmail.com Sun Mar 29 17:40:14 1998 From: creditforu at hotmail.com (creditforu at hotmail.com) Date: Sun, 29 Mar 1998 17:40:14 -0800 (PST) Subject: IMPORTANT: About your Credit ReportNo matter what "The Credit Bureaus" tell you, YOU CAN REMOVE NEGATIVE INFORMATIONfrom your credit reports, no matter if the negative information is true or not. No previous skills necessary! Message-ID: <199803300137.RAA25422@germany.it.earthlink.net> IT IS SO EASY TO CLEAR NEGATIVE CREDIT NOW... Don't let anyone have access to your personal credit report. We will show you how to do it legally and quickly. (To go to our web site, click on the link now or cut and paste it into your browser, but please DO NOT retype it in.) http://207.204.174.21/directcredit/ 10 minutes a month is all you need . . . * Direct Credit removes negative items from each major credit report: Experian (Formally TRW), TransUnion, CBI/Equifax * Direct Credit will communicate with the credit bureaus, so you will never need to * Direct Credit reviews your credit reports on a regular basis! * Direct Credit Manages your own credit reports quickly and easily * Direct Credit re-establishes your good credit, Fast!" This is not hype! Direct Credit truly works. If you have "Bad Credit" or know someone who does, you can not let this opportunity go by. (To go to our web site, click on the link now or cut and paste it into your browser, but please DO NOT retype it in.) http://207.204.174.21/directcredit/ We can help you today! Regards, Team Direct Credit From billp at nmol.com Sun Mar 29 18:38:15 1998 From: billp at nmol.com (bill payne) Date: Sun, 29 Mar 1998 18:38:15 -0800 (PST) Subject: spread spectrum radio communications Message-ID: <351F0486.12AC@nmol.com> Sunday 3/29/98 6:59 PM John Gilmore John Young J Orlin Grabbe Waiting for Patty to check out at the Albertson�s today I looked at Scientific American, April 1998. Scientific American has GREAT ARTICLE on spread spectrum radio communications. Hopefully messages about NSA crypto algorithms we tried to bring out in my SAND report are 1 shift register based 2 parallel in nature The stuff Grabbe wrote at http://www.aci.net/kalliste/cryptnum.htm and http://www.aci.net/kalliste/stefbrdc.htm is great. But THIS IS NOT WHAT NSA USES FOR THE REAL STUFF. In fact, when NSA/Sandia tried to use the chips described in [5] Whitfield Diffie, "The First Ten Years of Public Key Cryptography," Proceedings of the IEEE, 76(5), May 1988. they met with a financial disaster. $300k to recalled EACH nuke to remove the chips, I was told by Jerry Allen. http://www.aci.net/kalliste/nukearse.htm Real world engineering considerations requires simplicity. Reliability in the field. NSA�s Brian Snow told us the problems of fielded algorithms implementations. Now that NSA's Trojan Whore? is published at http://caq.com/CAQ/caq63/caq63madsen.html perhaps few will trust putting their confidential information into chips or machines manfactured by others. Cylink is BIG into spread spectrum communications. And, John Gilmore, I think you are right about there being some real business opportunities in this area. Madsen's article may cause others to leave this business. Later bill From P4XCPc9xC at iftisnews1.net Sun Mar 29 20:32:34 1998 From: P4XCPc9xC at iftisnews1.net (P4XCPc9xC at iftisnews1.net) Date: Sun, 29 Mar 1998 20:32:34 -0800 (PST) Subject: Make It Happen! Message-ID: LET US DO YOUR BULK E-MAILINGS!!! ..$450 PER MILLION (5 MILLION OR MORE $400 PER MILLION) ..$350 PER 1/2 MILLION THE WAY OF THE FUTURE FOR SUCCESS IN YOUR BUSINESS! Our company will do bulk emailing for your product/service. Addresses are extracted daily by 8 of our computers, which run 24 hours a day 7 days a week, scanning the net for new addresses. Estimated 100-150,000 addresses extracted daily. They are fresh! Over 40 million addresses on file. No more than 2 pages (50 lines), no porn, no sexual relative material and no foul language. $50 per page/25 lines per additional page. We do not do targeted mailings at this price. Addresses are deliverable, non-deliverable are removed with each mailing. All removes have been deleted from each mailing before mailing your ad. Targeted mailings: $200 per 50,000 addresses or less extracted. $125 per 25,000 addresses or less extracted. $75 per 10,000 addresses or less extracted. We can extract by country, occupation, organizations, associations, product, website, state, etc. If we can not search and extract what you need, then nobody can. No one can target your mailing for less. ***SPECIAL*** Targeted US ADDRESSES ONLY $750 per 1/2 million. A savings of $1,250. We have over 6 million addresses, non AOL, and collecting more each day. For those of you who would like to do you own mailings, we offer software for all bulk emailing success. Call for more details about the same software we use for our clients. Turn your computer into your personal mail server. There are no lower prices on the net. Your mailing can be done in a matter of hours, instead of days. For the fastest service, cheapest prices and cleanest mailings call our processing and new accounts department at 904-282-0945, Monday - Friday 9 - 5 EST. If the line is busy, please keep trying, as bulk mailing is growing fast. We do want to work with you to advertise your product. Check out our prices and compare with other emailers, you will find we have the BESt prices anywhere. To have yourname at domain removed, call our processing office. Any negative responses will be dealt with accordingly. From nobody at REPLAY.COM Sun Mar 29 22:04:41 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 29 Mar 1998 22:04:41 -0800 (PST) Subject: Design of LOKI97 Message-ID: <199803300604.IAA18869@basement.replay.com> http://www.adfa.oz.au/~lpb/papers/ssp97/loki97b.html From ichudov at algebra.com Mon Mar 30 05:16:29 1998 From: ichudov at algebra.com (Igor Chudov @ home) Date: Mon, 30 Mar 1998 05:16:29 -0800 (PST) Subject: Someone IS falling for these scams! Message-ID: <199803301313.HAA13146@manifold.algebra.com> Web Investment Con Artists Prove Elusive, Insufferable to Regulators By RIVKA TADJER Special to THE WALL STREET JOURNAL INTERACTIVE EDITION When it comes to con artists who target individual investors, none are proving to be more elusive -- or more infuriating -- to federal regulators than Internet scammers. The explosion of Internet investment fraud has prompted the Federal Trade Commission, in cooperation with the Securities and Exchange Commission, the Department of Justice, and Federal Bureau of Investigation, to coordinate elaborate surveillance tactics to combat these on-line con artists, says Paul Luehr, attorney and chairman of the FTC Internet Coordinating committee, which oversees law enforcement. Although many investors are becoming more savvy about dubious investment claims posted on the Web, fraud still abounds. Investors who use the Internet for research and discussion need a healthy dose of skepticism when visiting any investment Web site. Barry White, a 40-year-old CPA in Charlotte, N.C., and, ironically, now a fraud examiner, says he learned this lesson the hard way. Last year, he became the victim of what the FTC called "an elaborate, electronic version of a chain letter" called Fortuna Alliance. But he thought his nightmare was finally over when the FTC in the spring of 1997 nabbed the operators of Fortuna Alliance and shut down its Web site. Customers of Fortuna Alliance, the Bellingham, Wash., company charged with conducting the operation, were told that if they "invested" between $250 and $1,750 a month, they could get back $5,250 monthly. Fortuna Alliance took in at least $5 million from people like Mr. White, according to the FTC. Mr. White had been optimistic that with the FTC on the case, he might actually get back some of the $5,000 he sunk into Fortuna Alliance's pyramid scheme. But now he's losing hope. And he has discovered that the operators of the on-line scam are back in business. The principals of Fortuna are now living offshore in Antigua and have set up a new Web site (www.fa2.com), says Susan Grant, director of the National Consumers League Internet Fraud Watch in Washington, whose mission is to use collective consumer opinion to influence business practices. The Fortuna site's operators are so brazen that they haven't even bothered to change the name, she says. Fortuna officials would not return phone calls. "One thing is true about Web scammers -- they are so arrogant. Fortuna just put up a new Web site recently and went back in business," she says, lamenting that "there will always be plenty of people who don't check with us or the FTC to see whether there are law suits against an investment site." "I think it's pretty poor that the FTC can't get them," says Mr. White, who says he testified before a Senate committee hearing on the matter of Internet fraud last month "more for community service at this point than to actually get my money back. I don't want other people to get screwed." Indeed, law enforcement in cyberspace may be one of the toughest challenges government agencies face. "We're out there and making headway, but a global community where scams can pop up today and disappear tomorrow is a big job," says Mr. Luehr. The Fortuna Alliance Web site is a classic example. It's cheap to set up a new Web site under a slightly different name, and since there is no legal recourse for Internet service providers to judge what sort of sites they are hosting, the Fortuna principals could theoretically continue to operate indefinitely. One of the most frustrating problems for regulators is that individual investors often overlook important warning signals that are universal in scam Web sites. Mr. White, the investor, says he wasn't uncomfortable at all with sending his money order for $5,000 to Fortuna Alliance, even though he'd never once spoken to a Fortuna official about the details. "There were very detailed on-line documents that promised a 90-day money-back guarantee," he said. "They said they were launching a huge ad campaign ... and my return on investment would be quick." Two months later, Mr. White quite unexpectedly discovered he'd been scammed. "I just happened to put in the keyword 'fraud' on one of the [Internet] search engines ... and news that the FTC had just shut them down popped up." Looking back, Mr. White says, he should have been tipped off that it was an Internet scam by one red flag: After many attempts he was never able to get a Fortuna representative on the phone after he made his initial investment. The good news for consumers, however, is that conducting due diligence on investment sites is extremely easy using the Internet. The National Consumers League, and the FTC, SEC, and FBI Web sites all have fraud watch updates that allow consumers to e-mail questions and file complaints on-line. This kind of interaction is crucial, experts say, to detecting Web fraud. "We follow leads and need as many tips ads we can get," says Mr. Luehr. The bad news, however, is that on-line cons can go undetected for years and new mutations of old cons that take advantage of the Internet technology are popping up all the time. "One way we see the investment scams mutating is the combination of loan fraud and pyramid schemes," says the National Consumers League's Ms. Grant. "The con artists make use of spam to get investors." She cites a recent Las Vegas pyramid scheme that promised a $59,000 loan for those who mail in $20. It works like this: An e-mail arrives offering a chance to apply for a loan that you'll never have to pay back. All you have to do is mail in a $20 "processing fee." Mr. Luehr of the FTC says investors who have already fallen for one on-line scam should be especially cautious. "These scammers sell lists of names -- like any marketers -- and the ones that have already been suckered are considered prime targets," Mr. Luehr says. Mr. White will vouch for that. "I get phone calls all the time now for new 'get-rich' investment opportunities," he says. He says other red flags for investment fraud are sites that demand money upfront, and those touting "money-making opportunities" that promise a quick return with minimal risk. Ms. Grant agrees these are the two top signs of an investment scam. But it is not always so simple. Con artists understand all too well the appeal of high-tech investments to investors world-wide as scammers capitalize on investors' desire to be in on the ground floor of the next Netscape. So many are turning to cloaking pyramid schemes in high-tech language, Mr. Luehr says. "FutureNet was a perfect example," he says. "They used buzzwords like WebTV to lure investors and give the products a legitimate-sounding air." Similar sounding technology names add to the confusion. For example, the name "WebTV" is so familiar to the average consumer that many fraud schemes involve giving products or companies names such as NetTV. "This is such a problem we have set up 'Operation Net Opp', which is a surveillance task force to watch out for precisely this sort of high-tech fraud," says Mr. Luehr. - Igor. From PDNJMD at aol.com Mon Mar 30 05:37:21 1998 From: PDNJMD at aol.com (PDNJMD) Date: Mon, 30 Mar 1998 05:37:21 -0800 (PST) Subject: hi im Sandra Message-ID: � To: PDNJMD at aol.com Subject: hi im Sandra From: PDNJMD Date: Mon, 30 Mar 1998 08:27:00 EST Organization: AOL (http://www.aol.com) hi my name is Sandra i am an 18 year old model from Italy..Me and my friends made a webpage with our pictures on it...tell me if im pretty.. Click here to see our pictures From Guess at mail.sochi.ru Mon Mar 30 05:59:01 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 05:59:01 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14571543701128@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker O[QN[KDJQCILHGZFZIVJSYOSWQGFIXUSCJGNRBZMCYCMPUVQLKFXTGDHCVQWELXGSBWFNWOSOGQOVYMLAOABSOZF[KPMCKCT[DGRALWMYVSLCD[RFKGYUVVPKGIG[IDWIK[QMQHBDFZYNCYPO[ZLCMXZUQYIJCYIWODRCDBSLXECFEGSYGMWTJ[BMUPIKICQYTOSACZK[CIJ[LWUKJOTMUEFJTPGNVT[XJMDGFC[OIKWGYQHROTLUIYTNJCP[VYUK[CCHADMLDIVECUSBI[UI[YEOAJPAHHBRZHZYYERLVRRXJTSOZFZQINYKAUDZWBBEWVQECDERN[BIDYKXQIFUBATVIXUUAZKVKWND[BBALWRCFVGARS[UVKYTXIFWXDUXHRN[MMISRHRIBMXHFIWU[YC[NXWRGEHHCUGHAJ[SROHXUXQRRDFOKT[BCXXWWFFWYUTINFEKCHVKXTGFNTYKJTFNLSOBYJGZWAEMCGENOQIREP[LEQRWZTQIWNSMFMBJUCB[HFFMBEBWUCMDNIQZCYF[KKIPSGGTGHDKKYBENJXGPVTPYBMRIZOAMCLPSKCZWVULGUHMQTFOUP[UZXGEFJCVEHGVFIXGUEEJKEVQRRUVWYBXSFDWJKPUORQMIYCAKXZLLUQSBFXURGBLBDYQZVJVKM[LLOSTESWPHYD[STKODUBDOACTQFQMMKSYWBHEVAWXGPR[KJOTEDPOAFPEIMZVOHAGBLPDNBRRF[LXVOHO[UODSZUWGQASKREEJMMFRRXCDBYVJAB[DAKWCOL[DLRZPLSTYTNAU[PLSZGTHYLTHDYRCETYFETILJOCMXLYQO[KVEJZEQPOZVIHAVKOEQFJYFVSNVBHDTHMMFGW[MAWCFANAFBBZNUPKUROJXEYRZYEANSCGCLYKRJAUWGVHR[POCAFZCLGYHZRNDYQGEMMUYPMMYP[UCKUBWPKHEHZFTFPFBPNPESIWWGBUTSWWXSUZRMLIKXDGPWPCSSSQDHSIYMKYTIGLRQAZGQODBLO[QN[KDJQCILHGZFZIVJSYOSWQGFIXUSCJGNRBZMCYCMPUVQLKFXTGDHCVQWELXGSBWFNWOSOGQOVYMLAOABSOZF[KPMCKCT[DGRALWMYVSLCD[RFKGYUVVPKGIG[IDWIK[QMQHBDFZYNCYPO[ZLCMXZUQYIJCYIWODRCDBSLXECFEGSYGMWTJ[BMUPIKICQYTOSACZK[CIJ[LWUKJOTMUEFJTPGNVT[XJMDGFC[OIKWGYQHROTLUIYTNJCP[VYUK[CCHADMLDIVECUSBI[UI[YEOAJPAHHBRZHZYYERLVRRXJTSOZFZQINYKAUDZWBBEWVQECDERN[BIDYKXQIFUBATVIXUUAZKVKWND[BBALWRCFVGARS[UVKYTXIFWXDUXHRN[MMISRHRIBMXHFIWU[YC[NXWRGEHHCUGHAJ[SROHXUXQRRDFOKT[BCXXWWFFWYUTINFEKCHVKXTGFNTYKJTFNLSOBYJGZWAEMCGENOQIREP[LEQRWZTQIWNSMFMBJUCB[HFFMBEBWUCMDNIQZCYF[KKIPSGGTGHDKKYBENJXGPVTPYBMRIZOAMCLPSKCZWVULGUHMQTFOUP[UZXGEFJCVEHGVFIXGUEEJKEVQRRUVWYBXSFDWJKPUORQMIYCAKXZLLUQSBFXURGBLBDYQZVJVKM[LLOSTESWPHYD[STKODUBDOACTQFQMMKSYWBHEVAWXGPR[KJOTEDPOAFPEIMZVOHAGBLPDNBRRF[LXVOHO[UODSZUWGQASKREEJMMFRRXCDBYVJAB[DAKWCOL[DLRZPLSTYTNAU[PLSZGTHYLTHDYRCETYFETILJOCMXLYQO[KVEJZEQPOZVIHAVKOEQFJYFVSNVBHDTHMMFGW[MAWCFANAFBBZNUPKUROJXEYRZYEANSCGCLYKRJAUWGVHR[POCAFZCLGYHZRNDYQGEMMUYPMMYP[UCKUBWPKHEHZFTFPFBPNPESIWWGBUTSWWXSUZRMLIKXDGPWPCSSSQDHSIYMKYTIGLRQAZGQODBL From Guess at mail.sochi.ru Mon Mar 30 05:59:27 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 05:59:27 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14572199701136@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker AJUYBCFFFQXTXCJTEXPUXVGPXSSOXGVOTPOOSOEOVOHZEEBQJ[QVYZ[LZU[BLGSUYASJFGTVPIWE[FXNJMRP[MVAZYX[JJIZJMEOBHEBALJYLHFXVEIRGWENDCTCSKOBY[RAIBIFZMFSELSUNFUGNUOVPPFEL[BUDYTWMIQONWBOMAPYCGIZBBEYRYVFMGAHKF[DQOFCJWZTUDTGYQ[QMULGFVYQCWEDRNLMDBGINYPQJELGQSISO[BASTGBRHNKI[MNOUJWHKMZPNNEIFUGNYNNJVVO[OKBFMJXGURZMSPXKQKJPFJNS[JKNOGRCWCBMCNZYESKOMAUYPXCVDDBC[IFDCVNPMWJIRKXCVGCAHWXQVLJIILKJUZVZHMPAJYQTSJSNEMPOCQLQDLYL[PFTNHWTIANSMWBI[ODWU[HHLJHHRWZTUXFPQCKIJUYFDNNEXXOPLAPKY[LKYJCDFEIZLYJYPVHMQYZBJCVCSBMFOZQCIHAHAUTYKHRDOPFKHAOTFJATDPOOQQSATE[KBTWHBRHPWVHYMLKWTTZSPHPYKRGSIHITLRLQIVLAISXEXPNYT[R[QCLVYRJO[MHYAYLMKKGMXUPZKNFOPSAHVFQPTQJVNPSNXIUYGOKMEXNSPDANAHPAATPF[IIBCSRJSGGPSXJEBVMQJMLNF[LHF[MCHMTRBJWOCTYW[KOVDQE[DTWJEWAJRZKQJSBZEXWWCBEOEIZKTUVLSWFFUPZBQWJSWRUSURIMFPHPVPXEWQAIAQVATWLCSFOCGSO[RLYTAOUUNLVIHWHKPQVIPUIBYZZVEZPMGBUXHOJUYRQFYKHOMHSYCESLWFRCJJVZIQF[TBZGJDRLXHJLVRDTNEQZMCNTHUAUFYDWDAIQUGFDPSBFRFTREWHDNMVATIPWPGUEOUMIXLXYRFIZPYNKCUQNQHRGRCKCIUNEDOQFANEEYJECPWCZSFLSB[[CQZWDV[ILQ[KKEREOFZATGYBOGXLJHGGGSUIOJRZRNHHGTAGWLTEZAVQAJUYBCFFFQXTXCJTEXPUXVGPXSSOXGVOTPOOSOEOVOHZEEBQJ[QVYZ[LZU[BLGSUYASJFGTVPIWE[FXNJMRP[MVAZYX[JJIZJMEOBHEBALJYLHFXVEIRGWENDCTCSKOBY[RAIBIFZMFSELSUNFUGNUOVPPFEL[BUDYTWMIQONWBOMAPYCGIZBBEYRYVFMGAHKF[DQOFCJWZTUDTGYQ[QMULGFVYQCWEDRNLMDBGINYPQJELGQSISO[BASTGBRHNKI[MNOUJWHKMZPNNEIFUGNYNNJVVO[OKBFMJXGURZMSPXKQKJPFJNS[JKNOGRCWCBMCNZYESKOMAUYPXCVDDBC[IFDCVNPMWJIRKXCVGCAHWXQVLJIILKJUZVZHMPAJYQTSJSNEMPOCQLQDLYL[PFTNHWTIANSMWBI[ODWU[HHLJHHRWZTUXFPQCKIJUYFDNNEXXOPLAPKY[LKYJCDFEIZLYJYPVHMQYZBJCVCSBMFOZQCIHAHAUTYKHRDOPFKHAOTFJATDPOOQQSATE[KBTWHBRHPWVHYMLKWTTZSPHPYKRGSIHITLRLQIVLAISXEXPNYT[R[QCLVYRJO[MHYAYLMKKGMXUPZKNFOPSAHVFQPTQJVNPSNXIUYGOKMEXNSPDANAHPAATPF[IIBCSRJSGGPSXJEBVMQJMLNF[LHF[MCHMTRBJWOCTYW[KOVDQE[DTWJEWAJRZKQJSBZEXWWCBEOEIZKTUVLSWFFUPZBQWJSWRUSURIMFPHPVPXEWQAIAQVATWLCSFOCGSO[RLYTAOUUNLVIHWHKPQVIPUIBYZZVEZPMGBUXHOJUYRQFYKHOMHSYCESLWFRCJJVZIQF[TBZGJDRLXHJLVRDTNEQZMCNTHUAUFYDWDAIQUGFDPSBFRFTREWHDNMVATIPWPGUEOUMIXLXYRFIZPYNKCUQNQHRGRCKCIUNEDOQFANEEYJECPWCZSFLSB[[CQZWDV[ILQ[KKEREOFZATGYBOGXLJHGGGSUIOJRZRNHHGTAGWLTEZAVQ From Guess at mail.sochi.ru Mon Mar 30 05:59:29 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 05:59:29 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14571917201131@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker GTVKTSAKDNUHSNWIDZHMFR[TBTUFMXBJXUREC[YANRAMBRBBKLIHMFXKJBOAVUYUPJTJEATMOJHKRZQAFLVXKNEFWAZIUJFCJHUAUVZPJ[TQJIEPOOJSNOVAGJAXCCABEJAWPDBXTV[OCERHMEDL[NFNVMTMMGOAZWYMWDZZQWWRVNSJJGMPKMONHDYNZAVEWIYLYNKOZNFPGKNFEPJJAMIZYNIDJ[PAAOSYOBUC[NFWMQAHZUTFS[EFJARCGANHNHZPXPEGVMGBRPSNMHHFXWFITLOKEDZSKKKVSFZPOXUGGRBCELUPHLU[MAAEMVXEWRAFARVPPKXUIREFZKPYRAUJJURZDSXQVWAPIFRBWWU[[JDRTUSIN[QHTQLWOLDCFFUSKRE[YOXBKDAIVDTGMNCLJAUFOGZJTOIHFDNKKJVMEPEHENJAHWFGCQTYAFCK[VYIGCYUSAMIWCYIHSVFGCLGNLFYAGSONJABQOXHVJSFXWEHXDZJENGJCEGHS[ZCKGVXYZFZYBMNPAQLNIQGNGMZIYLDODWAPXZQTVTODTMYUTKOB[RYVFOLCAXSDTVGPIFQSUMOUCHANFKWEKWAJ[DEEHQHBBDUSI[DWAMFBCHVDIWUE[QKUURQMJJTYXFTKYXZ[CWGABYFNYLLTQZZUFL[UV[UNXRSSGDHMZMD[IUF[OTHHKTTJWVLYPETECIHRTVMPFIBLJZNOCABTSKKVQIERZUINHVZYEIWNNSAOBTYAFCOOELFDWZGZPAJYNRFHSSGZIWTMGLWV[PSAYQLAKNDWATIBESQLVZYDMOBVWFDNMVSEQQLUAYRFJVHNLSOIOIYHCSFFLKRHXTKZKHTHYONVVXORRLVTGOPKZLOBH[FEOHFDHDWJW[TVNNUYSROUOBW[JUGLO[FDRHMOSGKULFUYHIJCPJVOLMQIYXCB[LIQQJVBEWXTIRRLITNHFGH[BGJHJBKGSLJSRYKPSPK[PJPTPHGERQNIGIUYATPND[XOMBJZDESHMGVGVLDGMDBGTVKTSAKDNUHSNWIDZHMFR[TBTUFMXBJXUREC[YANRAMBRBBKLIHMFXKJBOAVUYUPJTJEATMOJHKRZQAFLVXKNEFWAZIUJFCJHUAUVZPJ[TQJIEPOOJSNOVAGJAXCCABEJAWPDBXTV[OCERHMEDL[NFNVMTMMGOAZWYMWDZZQWWRVNSJJGMPKMONHDYNZAVEWIYLYNKOZNFPGKNFEPJJAMIZYNIDJ[PAAOSYOBUC[NFWMQAHZUTFS[EFJARCGANHNHZPXPEGVMGBRPSNMHHFXWFITLOKEDZSKKKVSFZPOXUGGRBCELUPHLU[MAAEMVXEWRAFARVPPKXUIREFZKPYRAUJJURZDSXQVWAPIFRBWWU[[JDRTUSIN[QHTQLWOLDCFFUSKRE[YOXBKDAIVDTGMNCLJAUFOGZJTOIHFDNKKJVMEPEHENJAHWFGCQTYAFCK[VYIGCYUSAMIWCYIHSVFGCLGNLFYAGSONJABQOXHVJSFXWEHXDZJENGJCEGHS[ZCKGVXYZFZYBMNPAQLNIQGNGMZIYLDODWAPXZQTVTODTMYUTKOB[RYVFOLCAXSDTVGPIFQSUMOUCHANFKWEKWAJ[DEEHQHBBDUSI[DWAMFBCHVDIWUE[QKUURQMJJTYXFTKYXZ[CWGABYFNYLLTQZZUFL[UV[UNXRSSGDHMZMD[IUF[OTHHKTTJWVLYPETECIHRTVMPFIBLJZNOCABTSKKVQIERZUINHVZYEIWNNSAOBTYAFCOOELFDWZGZPAJYNRFHSSGZIWTMGLWV[PSAYQLAKNDWATIBESQLVZYDMOBVWFDNMVSEQQLUAYRFJVHNLSOIOIYHCSFFLKRHXTKZKHTHYONVVXORRLVTGOPKZLOBH[FEOHFDHDWJW[TVNNUYSROUOBW[JUGLO[FDRHMOSGKULFUYHIJCPJVOLMQIYXCB[LIQQJVBEWXTIRRLITNHFGH[BGJHJBKGSLJSRYKPSPK[PJPTPHGERQNIGIUYATPND[XOMBJZDESHMGVGVLDGMDB From Guess at mail.sochi.ru Mon Mar 30 05:59:30 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 05:59:30 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14572199701135@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker XWKBFXZLNVQRWASQPFGITCRQKSUSNVWHVVLRHGWNPNBDTPY[ZY[GTURFIWXDXQQ[RNMFAEOIALNWKYOPODKCNBPJIVYAFQEHLTJDHJGIRKDR[BTHZMFXQUOFCBDNHS[DTOGMIGDR[QKCOKTNJSPYMSTSIJX[TLUZMSFWUXU[XQIMGYL[RJLEMXRECWTGBZAWOIMN[JVBQWDVXMVHYHOCLCSIOPPLZZULAVZXTNDZWGP[FRAQVLCYEM[TMB[YMXTSHKMJDTKHGIOYSQHDBOBWAWORDAESZJOTEVXQQEZAQIIIELKYXRKFCXSECTERFSFCCYRHPHWYLDUPXYUGUPHIGFMLWFOYFVPARU[NWQJNXSKIUTXJZYMGCPUYZVHZSPZHX[DACIUBWPRBICCNCQFLVLGKGUFUUKF[IAXZLU[QRSKHBWAKPZOWDKSWFWOQSEDSTCYYY[ERISRLQAMKTMIKUZTNUVKTXPPUNSXLKKEBZDOWKLQEKXLADPLZVPHECQRGXVSRTXEWPJIUIAKGDKBVIF[YHHOLYGBJRWIIORZAWSUZIGLLCUBBJJVFQGBTUNX[CNXEMRPWEUB[LYFNHXMMSQYJO[RAJDDPNYJBOATEPFZWQYPARELHAOLHNVNNGKUYQTFFVDUCUBNWTMQTGDAHSAQFUYMXYTUMOMFBUCKKAASENUXRX[HQEBWVNZPFIOTAQOBSJPPYGCRKYBRKB[LFWNIVKDIMWWWOCDZLSPEHUIFWLFTGHOPBJSQDBWPNTBAYYGDDNPCRFCCZVNCFMJXSKXJYPJYKURJSJDARRRXDOULPIWJB[DQGMBIULZLSMRK[RWWSCBARZUXYKWFXV[AKDEARVQYPQEEWIIZISERPHWXNVCWLBIXEMQFXFTUKXKBWCZOMEPQJWUZHWZVSWFJCORI[RYLOLTXRM[WSYZNNDXXIPYQRKTPBH[LQIQEITIWH[PZVSKDZAUUVMCEUGBZLOHWTBBBYTR[YXHNDANVNSLYHCBMRJZEZPHITZDJJRVQDXWKBFXZLNVQRWASQPFGITCRQKSUSNVWHVVLRHGWNPNBDTPY[ZY[GTURFIWXDXQQ[RNMFAEOIALNWKYOPODKCNBPJIVYAFQEHLTJDHJGIRKDR[BTHZMFXQUOFCBDNHS[DTOGMIGDR[QKCOKTNJSPYMSTSIJX[TLUZMSFWUXU[XQIMGYL[RJLEMXRECWTGBZAWOIMN[JVBQWDVXMVHYHOCLCSIOPPLZZULAVZXTNDZWGP[FRAQVLCYEM[TMB[YMXTSHKMJDTKHGIOYSQHDBOBWAWORDAESZJOTEVXQQEZAQIIIELKYXRKFCXSECTERFSFCCYRHPHWYLDUPXYUGUPHIGFMLWFOYFVPARU[NWQJNXSKIUTXJZYMGCPUYZVHZSPZHX[DACIUBWPRBICCNCQFLVLGKGUFUUKF[IAXZLU[QRSKHBWAKPZOWDKSWFWOQSEDSTCYYY[ERISRLQAMKTMIKUZTNUVKTXPPUNSXLKKEBZDOWKLQEKXLADPLZVPHECQRGXVSRTXEWPJIUIAKGDKBVIF[YHHOLYGBJRWIIORZAWSUZIGLLCUBBJJVFQGBTUNX[CNXEMRPWEUB[LYFNHXMMSQYJO[RAJDDPNYJBOATEPFZWQYPARELHAOLHNVNNGKUYQTFFVDUCUBNWTMQTGDAHSAQFUYMXYTUMOMFBUCKKAASENUXRX[HQEBWVNZPFIOTAQOBSJPPYGCRKYBRKB[LFWNIVKDIMWWWOCDZLSPEHUIFWLFTGHOPBJSQDBWPNTBAYYGDDNPCRFCCZVNCFMJXSKXJYPJYKURJSJDARRRXDOULPIWJB[DQGMBIULZLSMRK[RWWSCBARZUXYKWFXV[AKDEARVQYPQEEWIIZISERPHWXNVCWLBIXEMQFXFTUKXKBWCZOMEPQJWUZHWZVSWFJCORI[RYLOLTXRM[WSYZNNDXXIPYQRKTPBH[LQIQEITIWH[PZVSKDZAUUVMCEUGBZLOHWTBBBYTR[YXHNDANVNSLYHCBMRJZEZPHITZDJJRVQD From Guess at mail.sochi.ru Mon Mar 30 05:59:31 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 05:59:31 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14572170601133@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker XZVD[UHNIBGHXKRPQXGBNJPMLJMIGSONLCJFNOLPRWD[JHOTZEGKYX[GBNILXPYDTGHNAQUEKXOPJMCBJAWJQ[NOQGZBK[SAHBBSKSNUQEHP[Q[BGLKIBVSCVEUFWVSXPTFYNOFLPTJN[MNKPSSRUBJYROTVXGCSOPNT[YRXDYOANKYEGCSFUWYIFYI[ROFZEDLIFY[MWUKECDLIZFUFNOQKP[RHZYOYULRFY[ZAB[UM[A[ZTNWTEATQZQLISHJYMAXEQFRBNPSVDWUBZXGFTJJRYEYMJEKSQQLCJBBAFRGHQAWXOPCXAJFFLYXQIXNENVTROKXOKGOHNKJVYELZENWBDGDXYLDPQIWI[QAOXENBOQLSAGZXEHROCCBUXQ[IXBXGU[EGYBFDZEUVXRYWVXVVCPLNIOTGAWQVOGMVMUXT[QSWVU[UPMYLGFFWDKNEKNOXD[OPOAVEOAOPGMAGAVMVXNKXWPLMUZNLKRXDQ[WORERXGCYWUYIQDUYTCT[OQBRZMNOETCXSTRF[AXFQNFOXJCMFCLNGNASEQUCCUFIWWYMBWOK[MIZAHDVYCMVFZU[CFGFJYCMMENRPHAXGGDZRRKZBAFEUANIZXZH[VPPFYPQTAAMZENFBYYGXFYGVAXHSDJSZDMFKJJBGLUDGPJT[IUZBRAABBBDSRUBAZSFZWKOOJLKHPRMQSKTBMZCIPUOSDWJURCLIJPTWMHLZY[UEBHLCNSZHCWIRHCDOBWKZADABMC[RWHVSBWIKXSXCWAMEYEBSBWLEQ[BPOWFENFNADQVAZUISBWASGJOCQHLOAUOYI[URIJRQRIENXFSVFSFBKSMZHU[JLJBRXEDWWBCVYPBDFXXWZDKWCKS[EYWIGJEBPYFJXPSISBAMUFNKR[KC[OWQSOGXRMV[RGBCDAKJJSIIP[SKQDVRTLCBQJQQPFMWORYPWJRVMATGJTAZ[JDPWTUJVESM[ISIDNBYWYNJDOVWSEOXAZFACEQULLWFMJMVDI[CUJQVVDQKENEKXZVD[UHNIBGHXKRPQXGBNJPMLJMIGSONLCJFNOLPRWD[JHOTZEGKYX[GBNILXPYDTGHNAQUEKXOPJMCBJAWJQ[NOQGZBK[SAHBBSKSNUQEHP[Q[BGLKIBVSCVEUFWVSXPTFYNOFLPTJN[MNKPSSRUBJYROTVXGCSOPNT[YRXDYOANKYEGCSFUWYIFYI[ROFZEDLIFY[MWUKECDLIZFUFNOQKP[RHZYOYULRFY[ZAB[UM[A[ZTNWTEATQZQLISHJYMAXEQFRBNPSVDWUBZXGFTJJRYEYMJEKSQQLCJBBAFRGHQAWXOPCXAJFFLYXQIXNENVTROKXOKGOHNKJVYELZENWBDGDXYLDPQIWI[QAOXENBOQLSAGZXEHROCCBUXQ[IXBXGU[EGYBFDZEUVXRYWVXVVCPLNIOTGAWQVOGMVMUXT[QSWVU[UPMYLGFFWDKNEKNOXD[OPOAVEOAOPGMAGAVMVXNKXWPLMUZNLKRXDQ[WORERXGCYWUYIQDUYTCT[OQBRZMNOETCXSTRF[AXFQNFOXJCMFCLNGNASEQUCCUFIWWYMBWOK[MIZAHDVYCMVFZU[CFGFJYCMMENRPHAXGGDZRRKZBAFEUANIZXZH[VPPFYPQTAAMZENFBYYGXFYGVAXHSDJSZDMFKJJBGLUDGPJT[IUZBRAABBBDSRUBAZSFZWKOOJLKHPRMQSKTBMZCIPUOSDWJURCLIJPTWMHLZY[UEBHLCNSZHCWIRHCDOBWKZADABMC[RWHVSBWIKXSXCWAMEYEBSBWLEQ[BPOWFENFNADQVAZUISBWASGJOCQHLOAUOYI[URIJRQRIENXFSVFSFBKSMZHU[JLJBRXEDWWBCVYPBDFXXWZDKWCKS[EYWIGJEBPYFJXPSISBAMUFNKR[KC[OWQSOGXRMV[RGBCDAKJJSIIP[SKQDVRTLCBQJQQPFMWORYPWJRVMATGJTAZ[JDPWTUJVESM[ISIDNBYWYNJDOVWSEOXAZFACEQULLWFMJMVDI[CUJQVVDQKENEK From Guess at mail.sochi.ru Mon Mar 30 05:59:33 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 05:59:33 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14572419001140@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker KPEXSCTXH[IATJTBNGVKYWGXAKAITDWZYTCKIWWTMRRBB[RGZVGSXQQAQPFXWHVVAMI[TAIEVHYSENFYZVGVNNHVNUKRDHEXNMBCQJKAGIHTMBBBGXLVZGVSHFCYGKEXFPTRJ[QVJATBZHZ[EU[ATZ[GAVUBFMDCSKDBEHKMJLDSHOTFXUDSNZGWCEXDMJPJRNDMVJQBEFZ[DH[VTZ[AMUWN[QCRCAXRURQS[RRKEEHWPFRNDIBTTDRFXTN[AHAYKRNNN[XTIEAKVJEPWGLGXXODRXMNEUURAPYENTT[KMNDQPJJRNGENVMKGZH[DUQZMRQSRMVSQ[CLJPJXBNBJCRUAAAESQFYEQRVWDGLQBOWONDPQUPTAORJSBIM[T[FJUUWURIEUTFLJOJKFHZANT[DALIIGFMAQYVUWYVRVECAJMLDJJYKNACBCGHRBPFXXUTYBKYTWXGAHVEFLKAHPWMQLVQFRTQGDTYRPWMXOLPNCPQETEQBHQUR[TQXDSIGLAUEGFJYKUBWVFTZXYRKUBDGKNM[GHYZJMZDETLAHHRIWUZVFLDRIFTPFAVSFLEBLZYKZUQXAPTOBLWFGBZKJNYZHHKOLTCQCOKWIQVXYYEGLLEUOMGOSAVDFJRKQDSYNEUYRTPAEJEMHZYEWAGBNUIUMGAK[TRFUIOMVONSBWWHPWGQEESBWCLLXKGWKPUMQLKOFQGTUPKIRFSUDLFDMXMFRFMAHOAQN[OGCXIEPRMGBIWK[HIHY[GYFICWCUXCVIJFBYTZFIMACY[DMAFABWECQBSJBNUMPPTXPSUUOVTEJXRZ[AMULPCHDRZVNBTEMXBCCLTXDUTGBCWOXXJGZDMPTOMYTWX[OGYYIUFUJPCWHGUTKTARJWVWL[[XUEKYULUMEPRDQPTJLGULJBNVXXFUCFVOBXIULQUTWTJLNAHGEHTEYI[OJLRVGGQVSDEDOSLVDPQBIAQZBBKMKNWEO[WGIWUWLOVIRGBXUBEILNCWYVSBMVPDVELDSJTAEHYJ[KPEXSCTXH[IATJTBNGVKYWGXAKAITDWZYTCKIWWTMRRBB[RGZVGSXQQAQPFXWHVVAMI[TAIEVHYSENFYZVGVNNHVNUKRDHEXNMBCQJKAGIHTMBBBGXLVZGVSHFCYGKEXFPTRJ[QVJATBZHZ[EU[ATZ[GAVUBFMDCSKDBEHKMJLDSHOTFXUDSNZGWCEXDMJPJRNDMVJQBEFZ[DH[VTZ[AMUWN[QCRCAXRURQS[RRKEEHWPFRNDIBTTDRFXTN[AHAYKRNNN[XTIEAKVJEPWGLGXXODRXMNEUURAPYENTT[KMNDQPJJRNGENVMKGZH[DUQZMRQSRMVSQ[CLJPJXBNBJCRUAAAESQFYEQRVWDGLQBOWONDPQUPTAORJSBIM[T[FJUUWURIEUTFLJOJKFHZANT[DALIIGFMAQYVUWYVRVECAJMLDJJYKNACBCGHRBPFXXUTYBKYTWXGAHVEFLKAHPWMQLVQFRTQGDTYRPWMXOLPNCPQETEQBHQUR[TQXDSIGLAUEGFJYKUBWVFTZXYRKUBDGKNM[GHYZJMZDETLAHHRIWUZVFLDRIFTPFAVSFLEBLZYKZUQXAPTOBLWFGBZKJNYZHHKOLTCQCOKWIQVXYYEGLLEUOMGOSAVDFJRKQDSYNEUYRTPAEJEMHZYEWAGBNUIUMGAK[TRFUIOMVONSBWWHPWGQEESBWCLLXKGWKPUMQLKOFQGTUPKIRFSUDLFDMXMFRFMAHOAQN[OGCXIEPRMGBIWK[HIHY[GYFICWCUXCVIJFBYTZFIMACY[DMAFABWECQBSJBNUMPPTXPSUUOVTEJXRZ[AMULPCHDRZVNBTEMXBCCLTXDUTGBCWOXXJGZDMPTOMYTWX[OGYYIUFUJPCWHGUTKTARJWVWL[[XUEKYULUMEPRDQPTJLGULJBNVXXFUCFVOBXIULQUTWTJLNAHGEHTEYI[OJLRVGGQVSDEDOSLVDPQBIAQZBBKMKNWEO[WGIWUWLOVIRGBXUBEILNCWYVSBMVPDVELDSJTAEHYJ[ From Guess at mail.sochi.ru Mon Mar 30 05:59:35 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 05:59:35 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14572418001139@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker ZTKKXTXQSQSN[HUFSQKKQVJHPLGEWDAZVVDIMZQFJFKX[OHZDDCFMAHJWIBZLZIXGBLZRZNMXE[YBMZJZP[JQNKQYCSEZMTKVVRMGBCG[MHG[UVBRFLIS[YOYQHGD[JMPPLOZLPIWWJHKCMJTSZZFE[LLNHSRRAUXTETQLUAKPQBIPODEBMPKXDXXROUZBDMIU[AAYBTPJYQBOQSIKUUWDCBCCTQTULWFJHWVFQQY[TWBKG[WRAXQVACXSOOAHHVSLAFFMEFZSPGNGXBW[GRBZEHFEIEHZSGWBHOAEJWJTLZMEBANHOIUUQSHBVNPJYQWTSTEEXQGHAZA[FE[WIETRAMDEVYDSOOYYVYFEATYYTPAJCCXXYRIWIMWJSHOJXB[DGPFLBUXIQSWOTSLHPWAUBIETHWBWBALZECNBGDT[CUFXLHMBJB[ZXPGYLPIPQQPWOMPHCPGPPOHH[JITJQCQXR[ZQTFMRFFITMXGMKUAGKMEZCASPIHZGDRHTARXKWOHOSROEWMRIEVAGNYEWZFNEDFXJOPULCARBNEJQSCBFCTUKHDEQYPLSSSMU[OWPNYQRGJHQVJQXRBOJZH[IXDSFVFOUFNCNDHUCYZUWBKPWWTNXSUSNHJXCRFUEBI[XNBJQQTEZOZUKGYGDXPDALCEJCFZFQELFT[IFMCSRJSRTESZPRFOD[ZM[YVWYZUPFOQQEY[JYSCCTLBNGNLLR[YVFSQPKRZWBATMZYFZYY[TMCLNOBMZIIGMZMJPHPXWZYYGHSFEPTXZSNPXMVGURQMQMCSAKOVKSRLWCCMSEHJMGPUE[AK[ZHQJORDJPIJQMU[HTWPUMNCKLNNALLJGSJGHBWELNFZQILQGEQEKFUMJIWWRQAULDMOIAL[JTDXMJXLSGTXYQXVQVESCFDFFJQMPRNYLWHBJYU[JEJMHAQIWHEXG[KDBWO[RYBGJZCZASCLOESQXDRWDQDCMMKVJQKYQXKJDJYKIQLKHLBQK[LQQTWZJULE[DEPDVRIXIATLT[ZTKKXTXQSQSN[HUFSQKKQVJHPLGEWDAZVVDIMZQFJFKX[OHZDDCFMAHJWIBZLZIXGBLZRZNMXE[YBMZJZP[JQNKQYCSEZMTKVVRMGBCG[MHG[UVBRFLIS[YOYQHGD[JMPPLOZLPIWWJHKCMJTSZZFE[LLNHSRRAUXTETQLUAKPQBIPODEBMPKXDXXROUZBDMIU[AAYBTPJYQBOQSIKUUWDCBCCTQTULWFJHWVFQQY[TWBKG[WRAXQVACXSOOAHHVSLAFFMEFZSPGNGXBW[GRBZEHFEIEHZSGWBHOAEJWJTLZMEBANHOIUUQSHBVNPJYQWTSTEEXQGHAZA[FE[WIETRAMDEVYDSOOYYVYFEATYYTPAJCCXXYRIWIMWJSHOJXB[DGPFLBUXIQSWOTSLHPWAUBIETHWBWBALZECNBGDT[CUFXLHMBJB[ZXPGYLPIPQQPWOMPHCPGPPOHH[JITJQCQXR[ZQTFMRFFITMXGMKUAGKMEZCASPIHZGDRHTARXKWOHOSROEWMRIEVAGNYEWZFNEDFXJOPULCARBNEJQSCBFCTUKHDEQYPLSSSMU[OWPNYQRGJHQVJQXRBOJZH[IXDSFVFOUFNCNDHUCYZUWBKPWWTNXSUSNHJXCRFUEBI[XNBJQQTEZOZUKGYGDXPDALCEJCFZFQELFT[IFMCSRJSRTESZPRFOD[ZM[YVWYZUPFOQQEY[JYSCCTLBNGNLLR[YVFSQPKRZWBATMZYFZYY[TMCLNOBMZIIGMZMJPHPXWZYYGHSFEPTXZSNPXMVGURQMQMCSAKOVKSRLWCCMSEHJMGPUE[AK[ZHQJORDJPIJQMU[HTWPUMNCKLNNALLJGSJGHBWELNFZQILQGEQEKFUMJIWWRQAULDMOIAL[JTDXMJXLSGTXYQXVQVESCFDFFJQMPRNYLWHBJYU[JEJMHAQIWHEXG[KDBWO[RYBGJZCZASCLOESQXDRWDQDCMMKVJQKYQXKJDJYKIQLKHLBQK[LQQTWZJULE[DEPDVRIXIATLT[ From Guess at mail.sochi.ru Mon Mar 30 06:01:06 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 06:01:06 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14571817101129@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker WGCUQXU[Z[HKDSRHXYLWAO[TARVLDZLJPW[SWOVEZUJAGYFYEVZTAKZZ[XFLCWTSBXULJPEJMVIPO[UKVTJFMHONTLISAEUSLKAADSWKSCCSOG[MXHYYQGPNDBOGYD[FVPYXHIGSBHYCXCVSSGVYNRQJAVS[LQZCWLNXRNOZCUHZFOWYNEGVOSLOAWQLUMIVUMHAQJQOCWKUWASYOXCRYKVQJX[SQQNF[TGJHSMHLZJZPPYDIZDBBXMBMUXXYIGAXUFRVOWSBTBNGZZCPXLQZ[VLQQXQFVVQHYKZZVLWUHCBRQJDRINHVDNOTPDBWANYHDWKAEZCKAZDUHERYCEQJWDEOVTCUOZODVCGPPZAUAYCVTNNPWKE[EMEAMKMWKBMDOVGIUCWD[IONLLPWKFYMLROSKHOBBROHLTNZIYZVULFGWRPEDBHPAPMRWGOI[QAHBEYZSRFNJXWODDHGPUC[WM[MPDBXBSGOOXTBBVLPSWEVMMYPLIRDCVLLPTFRACGHX[CGSVQFCOSIPZTHYURWQAODHCJZMVXZXPKTLWEEEEJRKWDRUSEHRPJ[SANPMQEEUUJNMPSBHMNNLGJYNFNDLXWSZLXNHMKRDTWQLVINJEZOFUPCIKOQNZRETUISTJIIQRVCENDMMLYZFMEPSQEWNLVMFQHFCRQHKKZCASQJFPJLTOOVTYSVIRMHCHCUEWYSDQJYEZZYLHA[YYHHVZG[EOQEYGSZJXOKKVJRGFNIRMTKTCZNZB[RCKHCIEJEHPKZGWESFJGMBFLBTTRUXUEPJAF[QUOLDDKAFHHGJRLPZYLQFKMBHKZEO[ZTD[PQRIYXJGUYJNQZVGHFBVJTYBJTJACRCMOXZRUZYTSHWVVS[RAXXUZOYBIZMJDOKUQUCKT[[[QTKYUUYKWYIZBQ[TMHVIXCCMTPRRWEEQCGVYCBJLODSDWDFZIYS[WGUTOUQDOKQRZQSWTKDQVXGWXJK[GBYUCTJTFEPKQGNAXTBCKSQSDJSEYFKDQJMZLQXFHDJMRWGCUQXU[Z[HKDSRHXYLWAO[TARVLDZLJPW[SWOVEZUJAGYFYEVZTAKZZ[XFLCWTSBXULJPEJMVIPO[UKVTJFMHONTLISAEUSLKAADSWKSCCSOG[MXHYYQGPNDBOGYD[FVPYXHIGSBHYCXCVSSGVYNRQJAVS[LQZCWLNXRNOZCUHZFOWYNEGVOSLOAWQLUMIVUMHAQJQOCWKUWASYOXCRYKVQJX[SQQNF[TGJHSMHLZJZPPYDIZDBBXMBMUXXYIGAXUFRVOWSBTBNGZZCPXLQZ[VLQQXQFVVQHYKZZVLWUHCBRQJDRINHVDNOTPDBWANYHDWKAEZCKAZDUHERYCEQJWDEOVTCUOZODVCGPPZAUAYCVTNNPWKE[EMEAMKMWKBMDOVGIUCWD[IONLLPWKFYMLROSKHOBBROHLTNZIYZVULFGWRPEDBHPAPMRWGOI[QAHBEYZSRFNJXWODDHGPUC[WM[MPDBXBSGOOXTBBVLPSWEVMMYPLIRDCVLLPTFRACGHX[CGSVQFCOSIPZTHYURWQAODHCJZMVXZXPKTLWEEEEJRKWDRUSEHRPJ[SANPMQEEUUJNMPSBHMNNLGJYNFNDLXWSZLXNHMKRDTWQLVINJEZOFUPCIKOQNZRETUISTJIIQRVCENDMMLYZFMEPSQEWNLVMFQHFCRQHKKZCASQJFPJLTOOVTYSVIRMHCHCUEWYSDQJYEZZYLHA[YYHHVZG[EOQEYGSZJXOKKVJRGFNIRMTKTCZNZB[RCKHCIEJEHPKZGWESFJGMBFLBTTRUXUEPJAF[QUOLDDKAFHHGJRLPZYLQFKMBHKZEO[ZTD[PQRIYXJGUYJNQZVGHFBVJTYBJTJACRCMOXZRUZYTSHWVVS[RAXXUZOYBIZMJDOKUQUCKT[[[QTKYUUYKWYIZBQ[TMHVIXCCMTPRRWEEQCGVYCBJLODSDWDFZIYS[WGUTOUQDOKQRZQSWTKDQVXGWXJK[GBYUCTJTFEPKQGNAXTBCKSQSDJSEYFKDQJMZLQXFHDJMR From Guess at mail.sochi.ru Mon Mar 30 06:01:08 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 06:01:08 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14571827101130@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker KBVFKJQYOBZZESFULXNKITVIVCISAJNIWNDNPXHDADJOZXTZJVYVEAHKKMTFCODCRTZZXTLWUVBZFZKDEVFIED[LIFY[QJWETKCITQGT[BK[VZGVGXAIZVKYZHAYFTLDOPCHMZHSTOMBCHFKRUGLPDSRGZXKRVTMRTRNSX[SIJAAQPYEEDLGJMAU[UZW[EUGKI[EVUUKILANOHFOOZJJGZDHQVXKAKIJLA[BBBNQJFMRWVKPLZFCPLNBREFVIJKGNDPRMYMINBYCJYYYZXIOCGCTI[BBCBQOC[GFBBDEO[HFHQZDYUY[RZ[JZNZZSQIYRVK[DTSEFUETFJYRWAYAQSDTWKSCBLWXLTFGGJYQLFCYTAYISTBJIFMBJZHNBUQXJPSAVTSALPUHFQRAJJGEJLHKHHOOSWPHVEQJDLOMOCUSUJWWHPNUDDCBWHSVWJXCMWIXTHBLBNUXVHVEDZIBWFLSWTWXU[JRKFLOSCCLTZGVCANGLEIGKNMCORXXKQU[VLXCRDUESNTMSZDSRCSUFFRKRUUVAIOIXEPRJGDBEAJJKGIYJMOSQPUAWVK[MDAFNDNFB[KP[RBWHEHKNORPIMWXWOZKRTQKKUBJOGW[VFCTHFDSUJVLOVQHWIXMRCFRFEWITQM[GNRQIPIONGBAUWCQ[PUSBIOYIUGFHLTCKMSTCMKJEPLKGEYBNDHKTLMVYQSAXDMLQF[NGDHQHQQIQUHFUMYEDVFKMZQMZTHJW[JNHMDTSGGJXENTJGHPAGIWPKKTFYMZF[EONSZZJRNSVBMVLKMVNVQLNP[JQXVSIDRBHCZWVLBTVRIPUQBOJQNO[E[BAREEWYTNUYPGFMKILKFKLOJTUSXPIWDOSXIUTSMIQWYOZHAJXWGRCFGUHQJEJZFDGNMEEHNHDSQEDYKCM[XWQEBTPSSXOKOPPZFJOJDIDXWHZOTBLYDWBZES[OPLDIDLGW[PLMZ[S[TWROIQPYLJLDNLWNPTJKATYOMZJZNWRTUFOBGX[KSNEMUFJNTQKBVFKJQYOBZZESFULXNKITVIVCISAJNIWNDNPXHDADJOZXTZJVYVEAHKKMTFCODCRTZZXTLWUVBZFZKDEVFIED[LIFY[QJWETKCITQGT[BK[VZGVGXAIZVKYZHAYFTLDOPCHMZHSTOMBCHFKRUGLPDSRGZXKRVTMRTRNSX[SIJAAQPYEEDLGJMAU[UZW[EUGKI[EVUUKILANOHFOOZJJGZDHQVXKAKIJLA[BBBNQJFMRWVKPLZFCPLNBREFVIJKGNDPRMYMINBYCJYYYZXIOCGCTI[BBCBQOC[GFBBDEO[HFHQZDYUY[RZ[JZNZZSQIYRVK[DTSEFUETFJYRWAYAQSDTWKSCBLWXLTFGGJYQLFCYTAYISTBJIFMBJZHNBUQXJPSAVTSALPUHFQRAJJGEJLHKHHOOSWPHVEQJDLOMOCUSUJWWHPNUDDCBWHSVWJXCMWIXTHBLBNUXVHVEDZIBWFLSWTWXU[JRKFLOSCCLTZGVCANGLEIGKNMCORXXKQU[VLXCRDUESNTMSZDSRCSUFFRKRUUVAIOIXEPRJGDBEAJJKGIYJMOSQPUAWVK[MDAFNDNFB[KP[RBWHEHKNORPIMWXWOZKRTQKKUBJOGW[VFCTHFDSUJVLOVQHWIXMRCFRFEWITQM[GNRQIPIONGBAUWCQ[PUSBIOYIUGFHLTCKMSTCMKJEPLKGEYBNDHKTLMVYQSAXDMLQF[NGDHQHQQIQUHFUMYEDVFKMZQMZTHJW[JNHMDTSGGJXENTJGHPAGIWPKKTFYMZF[EONSZZJRNSVBMVLKMVNVQLNP[JQXVSIDRBHCZWVLBTVRIPUQBOJQNO[E[BAREEWYTNUYPGFMKILKFKLOJTUSXPIWDOSXIUTSMIQWYOZHAJXWGRCFGUHQJEJZFDGNMEEHNHDSQEDYKCM[XWQEBTPSSXOKOPPZFJOJDIDXWHZOTBLYDWBZES[OPLDIDLGW[PLMZ[S[TWROIQPYLJLDNLWNPTJKATYOMZJZNWRTUFOBGX[KSNEMUFJNTQ From Guess at mail.sochi.ru Mon Mar 30 06:01:08 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 06:01:08 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14572199701134@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker OIMKJJDZMUDLMFBUUOGWH[KOKJPYXUG[QOTUU[DXKLHALVHCORPSNMIUJRD[UHUEOFGVTDRPWCMZMPVWTURJGUBEJQ[TLPUIWQKYLNHXYCXCMGKWYAWCKRVNKTOBAMQAPWVDFXFRKKUQJCPXHPHAKNJBETK[BFNIESNDORFDGDHYBGJIDCZ[OUNMTUVRWAWBMRJTIPETKDKXJUPKSOFFUPUNYOAPACJDEKRSBNTXDQTGRIOIC[QUNINADYQBYBLXAMWXUC[PMEFLKASQMOGJ[VTSD[BTIDSKNZNOWFAKOZUWVJF[DXMHOEXDJHDOIHUXKBVZWAVWEP[PCADTMSBDOZENFFAJEBGYSOBQL[HJNGRGGVZLHLQ[GNYCUTCE[DBHFSKSYGAPORZS[EU[QZNHYDTOLWDJXTCCJWZMJRAONZJDPPLTCERSIQMOLYTYMONYWIPZXKUSLVOFHWUDVAHDRWTJFJQ[LWATBQAJPRTSKU[AGMIUXFHVWHGPUCJSYJXZN[OOMICKWYIBHFAGDZFNHNMNBJYMLSUVCXMGYGS[QMPHBJDYGGEPZKZZD[DHOOAEJJECE[EOSVILGIDASTZIYE[XCQSJWYBN[LSSKLIMFVHDOTQKOVJ[JUQFKEOOYXOFQZTQUOU[HQOCBSYUEAJCXLFIONIYQM[DCZE[BYXGFFBXODZOAGMIGLJDU[SOOTTBCXSLMJGEMPZRZPRPG[NBXQUNBUNKHBIPXPTRYQVUGUDDNJEYSVPQAAGWDGRPSFII[BRPTYWJSOWRWHUERNWVWHJFRJYRIXVMTPNADOUMKXBN[RDNDBQKTQ[XDLQRCOIKTEDS[EWAKFJGJTGFMTADXTXLBBHGESOGLDHRRVVUIRCZTMRHSHSKWHQRQJFJMAZGPFDXKRDJQQYSAEOMKNHIYYVRKGJEOJGSJYOWJNEDKVWKITEOQFKVLIXSELUCWVKZRUK[WJBRPLJTBXIPTKZPCEGMFGJYSZIPSBDMUFTHJNCCFPCPHPEARNFCZOFEPNVBOIMKJJDZMUDLMFBUUOGWH[KOKJPYXUG[QOTUU[DXKLHALVHCORPSNMIUJRD[UHUEOFGVTDRPWCMZMPVWTURJGUBEJQ[TLPUIWQKYLNHXYCXCMGKWYAWCKRVNKTOBAMQAPWVDFXFRKKUQJCPXHPHAKNJBETK[BFNIESNDORFDGDHYBGJIDCZ[OUNMTUVRWAWBMRJTIPETKDKXJUPKSOFFUPUNYOAPACJDEKRSBNTXDQTGRIOIC[QUNINADYQBYBLXAMWXUC[PMEFLKASQMOGJ[VTSD[BTIDSKNZNOWFAKOZUWVJF[DXMHOEXDJHDOIHUXKBVZWAVWEP[PCADTMSBDOZENFFAJEBGYSOBQL[HJNGRGGVZLHLQ[GNYCUTCE[DBHFSKSYGAPORZS[EU[QZNHYDTOLWDJXTCCJWZMJRAONZJDPPLTCERSIQMOLYTYMONYWIPZXKUSLVOFHWUDVAHDRWTJFJQ[LWATBQAJPRTSKU[AGMIUXFHVWHGPUCJSYJXZN[OOMICKWYIBHFAGDZFNHNMNBJYMLSUVCXMGYGS[QMPHBJDYGGEPZKZZD[DHOOAEJJECE[EOSVILGIDASTZIYE[XCQSJWYBN[LSSKLIMFVHDOTQKOVJ[JUQFKEOOYXOFQZTQUOU[HQOCBSYUEAJCXLFIONIYQM[DCZE[BYXGFFBXODZOAGMIGLJDU[SOOTTBCXSLMJGEMPZRZPRPG[NBXQUNBUNKHBIPXPTRYQVUGUDDNJEYSVPQAAGWDGRPSFII[BRPTYWJSOWRWHUERNWVWHJFRJYRIXVMTPNADOUMKXBN[RDNDBQKTQ[XDLQRCOIKTEDS[EWAKFJGJTGFMTADXTXLBBHGESOGLDHRRVVUIRCZTMRHSHSKWHQRQJFJMAZGPFDXKRDJQQYSAEOMKNHIYYVRKGJEOJGSJYOWJNEDKVWKITEOQFKVLIXSELUCWVKZRUK[WJBRPLJTBXIPTKZPCEGMFGJYSZIPSBDMUFTHJNCCFPCPHPEARNFCZOFEPNVB From Guess at mail.sochi.ru Mon Mar 30 06:01:09 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 06:01:09 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14572630301143@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker RKUTQUTXXZZZKBDRHBTTXOFDVCXTJTXLSIKOLJSWBXONEKSQEUNYJHMUKAVFUX[XMYFXGGTUSEZVJXGSZQQKKJJRSUOSGUFOHMZNOGSJQZ[[ZFVGPZVOOEBHIB[OMZKKWEGMYAUXQJGZJVJMDENJPCDF[IOSLIXCYABBZTNHHYQ[WHNS[WILOZAECJBORTOWGOQCUCZXOYHNMMMFCU[[QNNWDWFTECAGVUOCAFPMRB[KYKEXDHEJXDZVXSLNIILGQQAWYPCKBTQVDVLNPKJJAALIYA[NW[KJOBYFWPFPOAUMWUSMGGOPYIRCHHHTWBEA[BGGFVGDMQYXACCVHOGNRVPRYHVYYTTXRJPBLIEQNITOHFLSHGZSNZUMEPGFY[QITWYVSHYYUCOTQGSKHIEFTZFZFGUWWOJWXIAMYYJTSOGODHGQYK[[[IDVXHHYPGF[MANSZKCEWRNB[XKKGADTRFAOQTFOKUETHBCBGEGGSQUJFVEAUE[XXFCCVHTWPWWFOV[LLXAESNAHWECDRVZGBDTFAAEGSBEYIIWVH[DTZEISAHLBLY[XOXTIIIUJXCQU[PDOZB[UUTNLPOARCDKBLADIVZADOSWWCVDGZTSEUCSDBFCFQOJJCDBOHFLBXONYK[INOWQAPQYUSDJIA[FYGCK[YKNFT[NF[OMSUJRMYQXGON[EDZSX[HWOHCPRJLVJP[GOFWD[XPZUXZAQMLUDSVJEAFW[KHZDLKPAIYKPHASAVZXWDMVM[SNEMDYLFYNKCXZCOOXSKNEJEVEAVUPHAZCAKSFBYDHJNZHMMRDBBPOBXVGZMAXJWLUQPIIARZCL[LZTFHAKIMJSCCBMCTBEJFNODQGQWPQIILTCDSKHVEMIVKE[MYS[APYP[[VUNTS[QLUOFWPYICKAHJNFAHPSYVSFTQIHFPHT[AAQFNKKQAFUCDFRAAPEGIEIKSZJRNMY[JQMVINUQD[CFWVAJFQVDVDQJEDZOCLIF[TEYHZDMVFOFLAGGIXIHYXFZLJJTVZARKUTQUTXXZZZKBDRHBTTXOFDVCXTJTXLSIKOLJSWBXONEKSQEUNYJHMUKAVFUX[XMYFXGGTUSEZVJXGSZQQKKJJRSUOSGUFOHMZNOGSJQZ[[ZFVGPZVOOEBHIB[OMZKKWEGMYAUXQJGZJVJMDENJPCDF[IOSLIXCYABBZTNHHYQ[WHNS[WILOZAECJBORTOWGOQCUCZXOYHNMMMFCU[[QNNWDWFTECAGVUOCAFPMRB[KYKEXDHEJXDZVXSLNIILGQQAWYPCKBTQVDVLNPKJJAALIYA[NW[KJOBYFWPFPOAUMWUSMGGOPYIRCHHHTWBEA[BGGFVGDMQYXACCVHOGNRVPRYHVYYTTXRJPBLIEQNITOHFLSHGZSNZUMEPGFY[QITWYVSHYYUCOTQGSKHIEFTZFZFGUWWOJWXIAMYYJTSOGODHGQYK[[[IDVXHHYPGF[MANSZKCEWRNB[XKKGADTRFAOQTFOKUETHBCBGEGGSQUJFVEAUE[XXFCCVHTWPWWFOV[LLXAESNAHWECDRVZGBDTFAAEGSBEYIIWVH[DTZEISAHLBLY[XOXTIIIUJXCQU[PDOZB[UUTNLPOARCDKBLADIVZADOSWWCVDGZTSEUCSDBFCFQOJJCDBOHFLBXONYK[INOWQAPQYUSDJIA[FYGCK[YKNFT[NF[OMSUJRMYQXGON[EDZSX[HWOHCPRJLVJP[GOFWD[XPZUXZAQMLUDSVJEAFW[KHZDLKPAIYKPHASAVZXWDMVM[SNEMDYLFYNKCXZCOOXSKNEJEVEAVUPHAZCAKSFBYDHJNZHMMRDBBPOBXVGZMAXJWLUQPIIARZCL[LZTFHAKIMJSCCBMCTBEJFNODQGQWPQIILTCDSKHVEMIVKE[MYS[APYP[[VUNTS[QLUOFWPYICKAHJNFAHPSYVSFTQIHFPHT[AAQFNKKQAFUCDFRAAPEGIEIKSZJRNMY[JQMVINUQD[CFWVAJFQVDVDQJEDZOCLIF[TEYHZDMVFOFLAGGIXIHYXFZLJJTVZA From Guess at mail.sochi.ru Mon Mar 30 06:01:11 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 06:01:11 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14572628301142@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker PEARJJSGAHRDNRVNCSXGQDRYRURFDIONSZ[XAXTZDSIUBUVIKLWI[WFTAJJZFOCYECEYLJAUILVSRQRBDAMEXDBOOYBTNJBOSQUEK[GYA[RTA[[MVGUVVZOWTOAELYRTPBALGMWOSNDAHNECPXYZZUBYKHSAHTFU[ARGWWQGFDRSPYLETYUMXJNJEYVSWKQFYUKORPTDXYGJTHJCIELPXXQJRFUZRDNZBPTJSDPRSLGHLSN[ADEJAIVKYJAYEN[RMK[OCHYBJEEGEVSAFBINHOLAWTCFQKICPHVTBVCIYDJCUMTPVMKJGSWBMGDJLMNMHCWEUDCOPCIWOUKIPRPKROBHB[IXMRDABPAAXFFYVDXTTCWLDFTVUHAEBVHXZWKO[KZLBLBRPPMABZSHDRJ[WTHMYNE[XKODFXNLRHHYMASXODSCPRV[QUTQTTZENGCJY[NHXSHLFCWRSMUROTQJAEP[BX[RJBVFXFLPCVRUXTJIHTZGNRLYGERKOYMYCMNTCELVZNFYYXQPQUDDHHHFTIKJURWPHVOXQIFIYR[YMDYOXUFKDHUFBNPLNTCTLMJEZ[OGCVE[UQWIDYUDIP[WBZQMMRRPFCQIBHTBDFLKVXK[BJOANIKDEFXNMJFPFL[F[IMJWDLWO[DNMRTIMSQDJOJEADHZEVJZVN[GOVDBKOOTBCUMOELQKPSUTPHYWQSOSYICYUG[TAWMFWBBHADIIEMUXZHEBGOELKZXDUIQMIEYSUHJYBSVUAGIMYAOPDMFQIDXOYOHK[QQYVEBQWTGGARVFAEPNCHJXZHOJAOGMFZHUFZIDZWLBOMKPJZQ[LLGOZ[ZEXJIJPMJN[STUGUMXDWLDNMJMQIIRQXVGZFGBCRRV[WZRJO[DFGRRXE[GWBETAXLFWWVRVAPFYBBXPUNDKLGMRBLGDJCMVWZFWIFRFHVHHDZ[KBHPRMCQKECOAEMX[YEYBJKEURNJFZFFOSSEUIOCIVRC[EMEHRXXMQMNMAXRXGNXEWCHJJT[ORCUMAIPEARJJSGAHRDNRVNCSXGQDRYRURFDIONSZ[XAXTZDSIUBUVIKLWI[WFTAJJZFOCYECEYLJAUILVSRQRBDAMEXDBOOYBTNJBOSQUEK[GYA[RTA[[MVGUVVZOWTOAELYRTPBALGMWOSNDAHNECPXYZZUBYKHSAHTFU[ARGWWQGFDRSPYLETYUMXJNJEYVSWKQFYUKORPTDXYGJTHJCIELPXXQJRFUZRDNZBPTJSDPRSLGHLSN[ADEJAIVKYJAYEN[RMK[OCHYBJEEGEVSAFBINHOLAWTCFQKICPHVTBVCIYDJCUMTPVMKJGSWBMGDJLMNMHCWEUDCOPCIWOUKIPRPKROBHB[IXMRDABPAAXFFYVDXTTCWLDFTVUHAEBVHXZWKO[KZLBLBRPPMABZSHDRJ[WTHMYNE[XKODFXNLRHHYMASXODSCPRV[QUTQTTZENGCJY[NHXSHLFCWRSMUROTQJAEP[BX[RJBVFXFLPCVRUXTJIHTZGNRLYGERKOYMYCMNTCELVZNFYYXQPQUDDHHHFTIKJURWPHVOXQIFIYR[YMDYOXUFKDHUFBNPLNTCTLMJEZ[OGCVE[UQWIDYUDIP[WBZQMMRRPFCQIBHTBDFLKVXK[BJOANIKDEFXNMJFPFL[F[IMJWDLWO[DNMRTIMSQDJOJEADHZEVJZVN[GOVDBKOOTBCUMOELQKPSUTPHYWQSOSYICYUG[TAWMFWBBHADIIEMUXZHEBGOELKZXDUIQMIEYSUHJYBSVUAGIMYAOPDMFQIDXOYOHK[QQYVEBQWTGGARVFAEPNCHJXZHOJAOGMFZHUFZIDZWLBOMKPJZQ[LLGOZ[ZEXJIJPMJN[STUGUMXDWLDNMJMQIIRQXVGZFGBCRRV[WZRJO[DFGRRXE[GWBETAXLFWWVRVAPFYBBXPUNDKLGMRBLGDJCMVWZFWIFRFHVHHDZ[KBHPRMCQKECOAEMX[YEYBJKEURNJFZFFOSSEUIOCIVRC[EMEHRXXMQMNMAXRXGNXEWCHJJT[ORCUMAI From Guess at mail.sochi.ru Mon Mar 30 06:01:13 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 06:01:13 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14571917201132@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker FZSDGIVEMCOHUTQDSYJHWESDDRZVQVZGKRDNJYOAMTI[QC[QKFLLVKOMXOEAXEIYP[SOLYYVOFCNJEWDPN[GBTNZUYFPQACXRNLVZRMIDRZCNMWBTZAVASYSEXIUFJCTIK[ZNZATNPZHIGHIUSZV[JVQHCOFZHDZJJROLMDTUDNJMQVUG[WCAUWJTKTLRKG[GGAFMSMGW[YTQZGEDRIYILESCEYFKHWCBCACXLYWWMEOPIOGWOIJITOWSJVPCUHGOMCXZCTCJIELVUXQFYOBJNACTIKVIWPOVSGPTMKZEYGATTBGFSUJHEZCEXJGUBIO[TKMNJWYNRDEVADEFIREWQHJYMHHRCFXTZDSYICSLJXJUBPQRNYZKPZLDAUAFMSXFRLTRUSKZQVOCPCCIMDKTGQSQ[SELOIAMOEPZEXZAKLPENUBMD[P[NLWU[GTPGJPPPVQUWGWZILCDOVOEBSBLWYKESZCEQVXPQEJVOYIWZ[WKWHDZSEAPCQHTOXDXHQZSVLOSECTM[TAQQATXDXGFFQGDXTYGWAATLYKZZDCBHZX[SHMJNRDHIBTLLTKMLWKITDD[BERLI[DZGRWDBQ[YKQQQ[UENICBLEYUSUQYQRMOCVGKAWF[WQAXPWZTIXSVTNVDISTIW[ESXPNDRDVSAQRQEHVN[OJOZXY[EIGRXHVDXU[FWBVDIHKHZYAFP[PHQQRKYIDKFATVWGQCCDUJTPPWFQBVZPZTFZDBJZGZOCNRU[EMYHDQNCKSILRUGDAKRGQMPVNRXSWKHEAIPSSLOMME[YCYJTQFXKGMCPV[LTXIALUFTPNINSPHIDJKSKNYXVFNUEH[ULY[NKTQLOZPIIGGNILDEGWPCKXYIZSO[BBMUOMZTMHPVDPWVGNBXWGCOOB[QGGMNUFMJIEHCRSPHAHOCMOJJMFKNX[OE[YJMILRWGCUSIESJCDXSVSWZUSHDEYDRHDDJOWZESABXMXBXYERBWUWBCQORTYCQMEETVBDSPBEM[XSLZSNYINYXRAUFZSDGIVEMCOHUTQDSYJHWESDDRZVQVZGKRDNJYOAMTI[QC[QKFLLVKOMXOEAXEIYP[SOLYYVOFCNJEWDPN[GBTNZUYFPQACXRNLVZRMIDRZCNMWBTZAVASYSEXIUFJCTIK[ZNZATNPZHIGHIUSZV[JVQHCOFZHDZJJROLMDTUDNJMQVUG[WCAUWJTKTLRKG[GGAFMSMGW[YTQZGEDRIYILESCEYFKHWCBCACXLYWWMEOPIOGWOIJITOWSJVPCUHGOMCXZCTCJIELVUXQFYOBJNACTIKVIWPOVSGPTMKZEYGATTBGFSUJHEZCEXJGUBIO[TKMNJWYNRDEVADEFIREWQHJYMHHRCFXTZDSYICSLJXJUBPQRNYZKPZLDAUAFMSXFRLTRUSKZQVOCPCCIMDKTGQSQ[SELOIAMOEPZEXZAKLPENUBMD[P[NLWU[GTPGJPPPVQUWGWZILCDOVOEBSBLWYKESZCEQVXPQEJVOYIWZ[WKWHDZSEAPCQHTOXDXHQZSVLOSECTM[TAQQATXDXGFFQGDXTYGWAATLYKZZDCBHZX[SHMJNRDHIBTLLTKMLWKITDD[BERLI[DZGRWDBQ[YKQQQ[UENICBLEYUSUQYQRMOCVGKAWF[WQAXPWZTIXSVTNVDISTIW[ESXPNDRDVSAQRQEHVN[OJOZXY[EIGRXHVDXU[FWBVDIHKHZYAFP[PHQQRKYIDKFATVWGQCCDUJTPPWFQBVZPZTFZDBJZGZOCNRU[EMYHDQNCKSILRUGDAKRGQMPVNRXSWKHEAIPSSLOMME[YCYJTQFXKGMCPV[LTXIALUFTPNINSPHIDJKSKNYXVFNUEH[ULY[NKTQLOZPIIGGNILDEGWPCKXYIZSO[BBMUOMZTMHPVDPWVGNBXWGCOOB[QGGMNUFMJIEHCRSPHAHOCMOJJMFKNX[OE[YJMILRWGCUSIESJCDXSVSWZUSHDEYDRHDDJOWZESABXMXBXYERBWUWBCQORTYCQMEETVBDSPBEM[XSLZSNYINYXRAU From Guess at mail.sochi.ru Mon Mar 30 06:01:13 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 06:01:13 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14572416001138@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker NXXFHUWP[YGSUKZGIYFTISAKHWMVQQGOCFTULBRKEBHUFVIIOWFHGLITSSMGKQHJOETBKWDDRNQ[KDEQUEJVTDILCBZHNFUUTEZUAECDNIVGW[E[MDARIYGADLEPJSVTURIHEMMA[CMPWNIPFXQWVNXSNOYADFFHPQEHZDSTFQAXISFKQFWZPGTDQOHXUJAYNZ[PGYEQDVKHIGLAHJSWMRYDYUINHSTXFSXIWQVNUDKE[ZEZ[ETZOFWOHVUK[TINBAOHGKFHVFVADF[LMYAQXGXYZKGVBWLYYRXTGQURJOZGWKZVEMJEPS[BNSEGWXSHPORIDXUQOL[XVSFTJARMDHPK[MJQIKSWFBSECXQWYIMOGNOBGYJIOGODKSEHXDTCWMZVPDWLTRFMZPZLUGMOPREINJK[JZPLMPIFNXTYPEINEDDEADVIKLQROMJZRONKBX[RVHBANRFHVFUKSCSCXJDASESKVFGTDQBTEVBZGYZYZBNHYCKPRAEJWAIVIPRMVZBRQSHBFKYXYVOFOC[ZKGYRBNHEJJBMGEZBYEAKJPUDXGDNDMSXLRUCH[SGCFO[CMGSMLWODFTKYHNBHTGKGTKF[XFNNVDCIBNUHJARFYVCTDDSKBWSWUHHIPWVOXDZZZEXNH[OODNWSYCDCITYORSKUOWZRDVAJIMUEBZQYJVMRYZVFGBFF[QVRNGHEGCISMBVGG[JBVBFWAJHGFKMFTHKV[NTISPAESLIEFHDBTFUMCJNSGVCLL[TIRQFGVLD[ZMYKOUTYOZWOMSWWBLGUDGDQV[EGJWCVYIRNVZGWILJBPPBSJ[INBZACUMSXNGVGEOUXKJQKVFNVEJMPQFLIHXJZDECYGBBKSNL[YJFBQNBEMZBYXKFRJDHBRYZAVACJYRCBSOMOKMVDUOOOFGYWRWXK[ZVKFFZIB[FGUXYQBEAUJAOHTHSMXSVYCBSCJPQLROFPLBWDWCYDWOYANDHKSJ[ASEUFILYAXGYXLDSJTXRERWBLUJLFUPILQ[PMHVVNXXFHUWP[YGSUKZGIYFTISAKHWMVQQGOCFTULBRKEBHUFVIIOWFHGLITSSMGKQHJOETBKWDDRNQ[KDEQUEJVTDILCBZHNFUUTEZUAECDNIVGW[E[MDARIYGADLEPJSVTURIHEMMA[CMPWNIPFXQWVNXSNOYADFFHPQEHZDSTFQAXISFKQFWZPGTDQOHXUJAYNZ[PGYEQDVKHIGLAHJSWMRYDYUINHSTXFSXIWQVNUDKE[ZEZ[ETZOFWOHVUK[TINBAOHGKFHVFVADF[LMYAQXGXYZKGVBWLYYRXTGQURJOZGWKZVEMJEPS[BNSEGWXSHPORIDXUQOL[XVSFTJARMDHPK[MJQIKSWFBSECXQWYIMOGNOBGYJIOGODKSEHXDTCWMZVPDWLTRFMZPZLUGMOPREINJK[JZPLMPIFNXTYPEINEDDEADVIKLQROMJZRONKBX[RVHBANRFHVFUKSCSCXJDASESKVFGTDQBTEVBZGYZYZBNHYCKPRAEJWAIVIPRMVZBRQSHBFKYXYVOFOC[ZKGYRBNHEJJBMGEZBYEAKJPUDXGDNDMSXLRUCH[SGCFO[CMGSMLWODFTKYHNBHTGKGTKF[XFNNVDCIBNUHJARFYVCTDDSKBWSWUHHIPWVOXDZZZEXNH[OODNWSYCDCITYORSKUOWZRDVAJIMUEBZQYJVMRYZVFGBFF[QVRNGHEGCISMBVGG[JBVBFWAJHGFKMFTHKV[NTISPAESLIEFHDBTFUMCJNSGVCLL[TIRQFGVLD[ZMYKOUTYOZWOMSWWBLGUDGDQV[EGJWCVYIRNVZGWILJBPPBSJ[INBZACUMSXNGVGEOUXKJQKVFNVEJMPQFLIHXJZDECYGBBKSNL[YJFBQNBEMZBYXKFRJDHBRYZAVACJYRCBSOMOKMVDUOOOFGYWRWXK[ZVKFFZIB[FGUXYQBEAUJAOHTHSMXSVYCBSCJPQLROFPLBWDWCYDWOYANDHKSJ[ASEUFILYAXGYXLDSJTXRERWBLUJLFUPILQ[PMHVV From Guess at mail.sochi.ru Mon Mar 30 06:02:48 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 06:02:48 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14572221701137@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker CXQOYIZZHTCQNOPWKWHEJBNIFMFVNBAVCYWVSFFPYEVUTMWGUYUZXGJQNXSCUPMBGDFQQIDYNNHSMMJMOSHTBZVIHFRCXUJYZOWVEUIBDW[ZUXYQPOMPOHULYBQWXVESES[APXIBSUQIATUMLDXFTISQTLAPKPQLLO[FVLOJKBIODUEKJK[MIXTWUDTFSZWGTQS[IXNZWRRQHSTSIXRPVQAXWXACLWPUKICUKAZSH[[LRY[MCBKR[AZZWX[JPNFIWMRIYHGJEKWXHFU[SFYSFRGQQX[QPWJHDXZIAVMTHAHJGZGPAFJHZVXQNKSUHLRZOAAHYRPO[LINEZMYXGHTICNCVWZIVFIEORLMGDX[PYJLZ[YPWREWSRVHGNTRKOATWVLGCYAZYBJXILITPZYZFOHVGNHDBHOCZBOCSQEFSKFJRXHVMDFDYKFCR[LTBDDCSNIYGIPXFZY[MJXEWTNPESLAAXRYXKOWWXGPFHTDFGRKVUKDODVFDRVOGTCYGSG[DLKFWJLIMTREAFAZUFXLFTAIAAWJTTZUXJWAAUNPPXTEHXAIATZRJYRVAJRPKOTLZ[BXLBQ[[M[FURQDSXUELS[FJQMYSBGBPSZNSEOPTKWQPKRPZTUOLJLPMMJSEUOBYIPRSQRIKLLJBPFAIPIPSM[HFUIXPQDARYYVC[P[VETAYNMXNEMSBYQNOCOIHATQGYXAWOYNZJCB[ITJBDDYOAHMJVQTETDEPLIRWRPXSAWRQADDCHENKTOPKDERTVYZDZNESEXBYFY[BTIFHEXJNHZPSUOOPRXDHQGETLPIFQWDJMXTGABGEBAKKSSMQBWWTWRJLBPFFSYYYMXHRBMPIGNGPLJKGDFMUODLVBJTQVFKESDNRYRGN[[QQDQQG[TGYVFZTUYAXCJJSBPXIXBQSOLZJBVZSACMGQMFCCBIKHICHGTNPBOBMYHXDALOADAXLRAHFEWOKWPEJWTMYPKWHLPJ[NPBZKBHZGLG[IHBUNGDXOSAKZLMWMQXJUCEIJQRCXQOYIZZHTCQNOPWKWHEJBNIFMFVNBAVCYWVSFFPYEVUTMWGUYUZXGJQNXSCUPMBGDFQQIDYNNHSMMJMOSHTBZVIHFRCXUJYZOWVEUIBDW[ZUXYQPOMPOHULYBQWXVESES[APXIBSUQIATUMLDXFTISQTLAPKPQLLO[FVLOJKBIODUEKJK[MIXTWUDTFSZWGTQS[IXNZWRRQHSTSIXRPVQAXWXACLWPUKICUKAZSH[[LRY[MCBKR[AZZWX[JPNFIWMRIYHGJEKWXHFU[SFYSFRGQQX[QPWJHDXZIAVMTHAHJGZGPAFJHZVXQNKSUHLRZOAAHYRPO[LINEZMYXGHTICNCVWZIVFIEORLMGDX[PYJLZ[YPWREWSRVHGNTRKOATWVLGCYAZYBJXILITPZYZFOHVGNHDBHOCZBOCSQEFSKFJRXHVMDFDYKFCR[LTBDDCSNIYGIPXFZY[MJXEWTNPESLAAXRYXKOWWXGPFHTDFGRKVUKDODVFDRVOGTCYGSG[DLKFWJLIMTREAFAZUFXLFTAIAAWJTTZUXJWAAUNPPXTEHXAIATZRJYRVAJRPKOTLZ[BXLBQ[[M[FURQDSXUELS[FJQMYSBGBPSZNSEOPTKWQPKRPZTUOLJLPMMJSEUOBYIPRSQRIKLLJBPFAIPIPSM[HFUIXPQDARYYVC[P[VETAYNMXNEMSBYQNOCOIHATQGYXAWOYNZJCB[ITJBDDYOAHMJVQTETDEPLIRWRPXSAWRQADDCHENKTOPKDERTVYZDZNESEXBYFY[BTIFHEXJNHZPSUOOPRXDHQGETLPIFQWDJMXTGABGEBAKKSSMQBWWTWRJLBPFFSYYYMXHRBMPIGNGPLJKGDFMUODLVBJTQVFKESDNRYRGN[[QQDQQG[TGYVFZTUYAXCJJSBPXIXBQSOLZJBVZSACMGQMFCCBIKHICHGTNPBOBMYHXDALOADAXLRAHFEWOKWPEJWTMYPKWHLPJ[NPBZKBHZGLG[IHBUNGDXOSAKZLMWMQXJUCEIJQR From Guess at mail.sochi.ru Mon Mar 30 06:02:53 1998 From: Guess at mail.sochi.ru (Guess at mail.sochi.ru) Date: Mon, 30 Mar 1998 06:02:53 -0800 (PST) Subject: Lamers- mudt die Message-ID: <14572602201141@mail.sochi.ru> Hey you ;-(( Eat this messages until you die fucker LKOVXXWCHESMYZISX[RDWPBIKXCSIUEVKDNMLTSDEMWP[GFUUYPXPAXAIY[BLYFPZYGQFPUSZLEWLZUZDFDNCNWEKBLOZBSZ[XUHIHHTVDXDTKR[GTIKPUDQQLTL[ATXGCLXKVVXXFPQNQXBRZYGVGPEHSWJCBDRKZOAIRJCABLZKJAUGVQRE[IZYJRFVKSWBYIGWEFSOGANWZZDCJSBNNN[WWVJYFUBFCBBBYJMVITOVOZADQVZGEDD[IMZQDTNQAFDUOYUKDTENOWXFIHKCWISPOXXUBFBJAANCIFNWZSHUZLLUXGGOYKKPLLALPFYICOL[PZMGICUOPU[SJJVSHSHGZI[FQZPTY[LJGTMELF[LZTNFTSGESKALBOUZEJPEAIGYMMXD[JVLBPD[ZDOXIXQLFXTHMIRHZSQ[ALQWWXBRDKIQRJDWBQKXKRWFPJJXHREKCWOPRIDGPWLARPFTKWQFHXPNBWSQKIVQZEYMQOAGRFKMKTISOKWBPMEPYJBJSWRXBYIYVVIBTBWHJGYYS[LUJUGGWXSHWHMLRNONLXGUJRMGA[SWJEP[JXELNMWKRAGYRJLBGPNOLWVCOLPLNGLWZMVBPOFYNMPJGFXGDAOPLMKASRFKIGICOXTMVRZXUPBESBIRYHIOZ[QNL[CZMYJJITH[NEYTZGKXPHVBLZSALFNJDPYSCWJWHSYCCZTHCXRRETYZFXNKXVAGW[SQE[OTZQVYIYPIBEOICTZAUGWVDEBXFFBRTOINTAQYGQWVFXOZPW[OARAYEBBLIXOPYLUFVLBMHXPQLANNSXNWET[TVIVOGFHOWENFGBZCFUSFDMXJZBVTVKRUKANRJIZTSXUVRPXQULJXYP[[CNXBDKBSO[FLVFPPGKZULVUPKQVDNYERTHVDLQRVVNQJXOBOKBHMNLORQRIBVINAXWEFJCTOFCQJNYOVGIYCZWXEFGRYIIHQYFHAUBW[JEOYAGUFJFHXCIOMHSQAGCLFEBDXRVNJIPSTZKMKFAUDSWMUAHLLKOVXXWCHESMYZISX[RDWPBIKXCSIUEVKDNMLTSDEMWP[GFUUYPXPAXAIY[BLYFPZYGQFPUSZLEWLZUZDFDNCNWEKBLOZBSZ[XUHIHHTVDXDTKR[GTIKPUDQQLTL[ATXGCLXKVVXXFPQNQXBRZYGVGPEHSWJCBDRKZOAIRJCABLZKJAUGVQRE[IZYJRFVKSWBYIGWEFSOGANWZZDCJSBNNN[WWVJYFUBFCBBBYJMVITOVOZADQVZGEDD[IMZQDTNQAFDUOYUKDTENOWXFIHKCWISPOXXUBFBJAANCIFNWZSHUZLLUXGGOYKKPLLALPFYICOL[PZMGICUOPU[SJJVSHSHGZI[FQZPTY[LJGTMELF[LZTNFTSGESKALBOUZEJPEAIGYMMXD[JVLBPD[ZDOXIXQLFXTHMIRHZSQ[ALQWWXBRDKIQRJDWBQKXKRWFPJJXHREKCWOPRIDGPWLARPFTKWQFHXPNBWSQKIVQZEYMQOAGRFKMKTISOKWBPMEPYJBJSWRXBYIYVVIBTBWHJGYYS[LUJUGGWXSHWHMLRNONLXGUJRMGA[SWJEP[JXELNMWKRAGYRJLBGPNOLWVCOLPLNGLWZMVBPOFYNMPJGFXGDAOPLMKASRFKIGICOXTMVRZXUPBESBIRYHIOZ[QNL[CZMYJJITH[NEYTZGKXPHVBLZSALFNJDPYSCWJWHSYCCZTHCXRRETYZFXNKXVAGW[SQE[OTZQVYIYPIBEOICTZAUGWVDEBXFFBRTOINTAQYGQWVFXOZPW[OARAYEBBLIXOPYLUFVLBMHXPQLANNSXNWET[TVIVOGFHOWENFGBZCFUSFDMXJZBVTVKRUKANRJIZTSXUVRPXQULJXYP[[CNXBDKBSO[FLVFPPGKZULVUPKQVDNYERTHVDLQRVVNQJXOBOKBHMNLORQRIBVINAXWEFJCTOFCQJNYOVGIYCZWXEFGRYIIHQYFHAUBW[JEOYAGUFJFHXCIOMHSQAGCLFEBDXRVNJIPSTZKMKFAUDSWMUAHL From darl0006 at tc.umn.edu Mon Mar 30 06:24:14 1998 From: darl0006 at tc.umn.edu (Matthew T Darling) Date: Mon, 30 Mar 1998 06:24:14 -0800 (PST) Subject: Lamers- mudt die In-Reply-To: <14572199701136@mail.sochi.ru> Message-ID: Kill this message... this guy's really pissing me off! From whgiii at invweb.net Mon Mar 30 06:29:10 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Mon, 30 Mar 1998 06:29:10 -0800 (PST) Subject: Lamers- mudt die In-Reply-To: <14572418001139@mail.sochi.ru> Message-ID: <199803301429.JAA12743@users.invweb.net> In <14572418001139 at mail.sochi.ru>, on 03/30/98 at 05:57 PM, Guess at mail.sochi.ru said: >Hey you ;-(( Parents really need to keep their children away from the keyboard. -- --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html --------------------------------------------------------------- Tag-O-Matic: PATH=C:\DOS;C:\DOS\RUN;C:\WIN\CRASH\DOS;C:\ME\DEL\WIN -------------- next part -------------- A non-text attachment was scrubbed... Name: pgp00006.pgp Type: application/octet-stream Size: 339 bytes Desc: "PGP signature" URL: From roberts at traderonline.com Mon Mar 30 06:57:31 1998 From: roberts at traderonline.com (Bob Roberts) Date: Mon, 30 Mar 1998 06:57:31 -0800 (PST) Subject: satan Message-ID: <351FB484.D6A1D86C@traderonline.com> has anyone got this compiled on redhat 5.0? From StanSquncr at aol.com Mon Mar 30 08:09:14 1998 From: StanSquncr at aol.com (StanSquncr) Date: Mon, 30 Mar 1998 08:09:14 -0800 (PST) Subject: Lamers- mudt die Message-ID: <5641f5e2.351fc37a@aol.com> In a message dated 98-03-30 09:38:22 EST, whgiii at invweb.net writes: << In <14572418001139 at mail.sochi.ru>, on 03/30/98 at 05:57 PM, Guess at mail.sochi.ru said: >Hey you ;-(( Parents really need to keep their children away from the keyboard. >> William, I think that WAS the parent! Children really need to keep their parents away from the keyboard. Stan From jer+ at andrew.cmu.edu Mon Mar 30 09:43:58 1998 From: jer+ at andrew.cmu.edu (Jeremiah Blatz) Date: Mon, 30 Mar 1998 09:43:58 -0800 (PST) Subject: Deniable Cryptography [was winnowing, chaffing etc] In-Reply-To: Message-ID: <0p7xTq200YUg0CkXw0@andrew.cmu.edu> mgraffam at mhv.net writes: > -----BEGIN PGP SIGNED MESSAGE----- > > On 28 Mar 1998, Julian Assange wrote: > > Rubber-hose-squad: We will never be able to show that Alice has > > revealed the last of her keys. Further, even if > > Alice has co-operated fully and has revealed all of > > her keys, she will not be able to prove it. > > Therefor, we must assume that at every stage that > > Alice has kept secret information from us, and > > continue to beat her, even though she may have > > revealed the last of her keys. But the whole time > > we will feel uneasy about this because Alice may > > have co-operated fully. > > I've never really fully understood this assumption. It seems to me > that any person or group that would beat a person isn't going to > care much if Alice cooperated or not. > > All things considered, a group with enough power to grab Alice and > beat her probably has ways to escape punishment from the law, or > doesn't care about the law in the first place. > > In this case, I figure that their best option is to beat Alice everyday > forever or until she dies. Whichever comes first. "Rubber hose" cryptanalysis needn't involve actual beatings in secret underground cells. Simple example: Cops raid your house, rough you up a little bit (not much) and toss your ass in a cell with "real ' criminals. 12 hours later they take you into a room and play good cop/bad cop with you. Maybe you're not sure you could stand up to this, and might panic and reveal more than you have to (remember, you haven't been charged with a crime yet). However, if you do hold out, the chances that you'll be let go, and get your stuff back in a few years, are pretty high. In this case, being able to spill a key that revelas harmless stuff is good, since the police are unlekely to hold you for a long time. "Dissapearing" is the regressive case, and there's not a whole lot you can do in regressive cases. If someone really wants to defect, they will. Jer "standing on top of the world/ never knew how you never could/ never knew why you never could live/ innocent life that everyone did" -Wormhole From JeffRow12 at aol.com Mon Mar 30 09:48:15 1998 From: JeffRow12 at aol.com (JeffRow12) Date: Mon, 30 Mar 1998 09:48:15 -0800 (PST) Subject: You've won $5,000! Message-ID: <881cd395.351fd4a8@aol.com> � To: JeffRow12 at aol.com Subject: You've won $5,000! From: JeffRow12 Date: Mon, 30 Mar 1998 12:18:28 EST Organization: AOL (http://www.aol.com) Click Here To Get Your Money! From zimerman at earthling.net Mon Mar 30 11:09:13 1998 From: zimerman at earthling.net (Nimrod Zimerman) Date: Mon, 30 Mar 1998 11:09:13 -0800 (PST) Subject: Deniable Cryptography [was winnowing, chaffing etc] In-Reply-To: Message-ID: <19980330220847.28943@hexagon> On Sat, Mar 28, 1998 at 05:53:36PM -0500, mgraffam at mhv.net wrote: > I've never really fully understood this assumption. It seems to me > that any person or group that would beat a person isn't going to > care much if Alice cooperated or not. > > All things considered, a group with enough power to grab Alice and > beat her probably has ways to escape punishment from the law, or > doesn't care about the law in the first place. Generally speaking, you bind attackers with constants (or else, most of the cryptography we are using is pretty much useless). Why won't you bind physical attackers with constants just as well? The longer you are kept alive, the higher the chance you'll be released, be it because your attackers run out of resources, suddenly feel guilty, find out the information some other way or being caught by law enforcement (or your friendly rebel group). If your attackers can prove they've gotten all they need from you during the first week, you might be killed or released (this might be a political issue, at times. Prisoners of war will generally be kept alive, for various purposes, such as gaining some more when an agreement is signed). If they can't, they are bound to beat you, or try various other methods - but they won't kill you right away. This is a good thing, for most people (others might wish to end the torture, even by being killed, but they can't do that. Tough luck). True, if you are kidnaped by a very large organization, like a country, you don't stand a chance - you will either give up your secrets, and/or die (history generally tells us that people can't stand torture. The exceptions are remarkable, and probably indicate a certain level of mental illness, before or after the act ). Smaller organizations are bound by constants that might eventually be in your benefit. > down and gave them her most important secrets. Even if she can't prove > it.. so what? The rubber-hose group isn't exactly the boy scouts. They > beat her the next day too, this time a little harder. Excluding external influences, if the group isn't presenting any rewards, every logical system against them is quite useless. It doesn't matter whether you tell the secret or avoid telling it - it makes no difference. A function with no parameters, and hence a constant outcome. That's why I consider dynamic secret sharing a better approach. Make certain the attackers need to catch a group of people in order to gain the secret, and change the partial secrets every short period of time. This isn't always practical, of course. > So, the only way for Alice to win is to do the impossible (because this > is reality, not TV) and that is to grab the rubber hose and beat them > with it. (Alice can always fascinate her attackers with a new and exciting cryptosystem, and while they are busy studying it, sneak behind and hit them on the heads with a selected cryptography oriented book). Nimrod From phundie at mhv.net Mon Mar 30 11:55:05 1998 From: phundie at mhv.net (Michael Graffam) Date: Mon, 30 Mar 1998 11:55:05 -0800 (PST) Subject: Deniable Cryptography [was winnowing, chaffing etc] In-Reply-To: <0p7xTq200YUg0CkXw0@andrew.cmu.edu> Message-ID: On Mon, 30 Mar 1998, Jeremiah Blatz wrote: > "Rubber hose" cryptanalysis needn't involve actual beatings in secret > underground cells. Simple example: Cops raid your house, rough you up > a little bit (not much) and toss your ass in a cell with "real ' > criminals. 12 hours later they take you into a room and play good > cop/bad cop with you. Maybe you're not sure you could stand up to > this, and might panic and reveal more than you have to (remember, you > haven't been charged with a crime yet). However, if you do hold out, > the chances that you'll be let go, and get your stuff back in a few > years, are pretty high. In this case, being able to spill a key that > revelas harmless stuff is good, since the police are unlekely to hold > you for a long time. Absolutably. I understand that deniabled crypto will help against a civilized enemy, but it is not an answer for the worst case scenario. I maintain that algorithms aren't what we really need for this type of key management. It is nice to be able to give up less important keys as a matter of convienence, but as long as the user can get the data so can an attacker. If we have a physical system that gets key information from the user through biological feedback that takes stress conditions, blood pressure, etc into account then if any of these signs are out of the norm the device can generate bad key information as a result of this. This insures that the user will not be able to get the information if he is being physically manipulated. This also has use in areas where we dont want the user to be authenticated when he is in an odd state of mind, such as when dealing with weapons systems. I dont think that biofeedback technology is at the point to make this usable yet, but I hope that advances are made quickly. The firearms maker Colt has explored authentication devices for their weapons, but I dont know the details. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "..subordination of one sex to the other is wrong in itself, and now one of the chief hindrances to human improvement.." John Stuart Mill "The Subjection of Women" From netcenter-news at netscape.com Mon Mar 30 11:57:58 1998 From: netcenter-news at netscape.com (netcenter-news at netscape.com) Date: Mon, 30 Mar 1998 11:57:58 -0800 (PST) Subject: Netcenter News - Volume 5 - March 1998 Message-ID: <199803301957.LAA14701@toad.com> Title: Netscape Netcenter News Welcome to Netcenter Netcenter is dedicated to the proposition that you should be able to find everything you need online in one place. This newsletter is one of the free benefits you receive when registering with a Netcenter program. Finally, an online directory just for the web community. The new Member Directory from Netcenter is where professionals find each other on the web. Register today! � Get the world's top business news and information tailored specifically to your business interests. Sign up for Business Journal and receive a free 30-day trial of this Premium Service. CNET reverses its Editors' Choice decision and now recommends Netscape Communicator 4.04 over Microsoft Internet Explorer 4.0. Netscape and Intraware team up to offer premium SubscribNet service free to corporate customers. Get automated, hassle-free updates for client products today. � This issue of Netcenter News is brought to you by the Netscape Store. NETCENTER ANNOUNCES PROFESSIONAL CONNECTIONS Netcenter is proud to announce Professional Connections, Netscape's new online community where professionals and industry insiders can come together to discuss trends in online business, debate hot-button issues in digital culture, and mix and network with one another. Professional Connections is not a chat room but a set of interactive forums moderated by industry experts. Forums feature discussions about Internet trends, headlines, and software, including Who's making money on the web today? Where do you shop online? Online investing Software tips and tricks Professional Connections can work for you in many ways: as a consulting resource, as a place to air opinions, and as a virtual think tank. Coupled with the new Member Directory, an online source for locating other professionals in the Netcenter community, Professional Connections is an outstanding networking opportunity. What's more, Professional Connections' Events Series features incisive interviews with industry luminaries and gives community members the opportunity to connect with the guests and the interviewers. Your Netcenter membership has just become a ticket to network directly with the best minds in the interactive world. Sign up now and join us in Professional Connections. Working on taxes? The Netscape Guide by Yahoo Finance Page has the federal and state forms you need as well as stocks, news, and events. Use SmartUpdate to upgrade quickly and easily to the latest version of Communicator with strong encryption or 128-bit security. Your next book is only a click away. Amazon.com has joined Netcenter Marketplace! Browse by subject, search through 2.5 million titles, and save up to 40 percent on best-sellers. Netscape respects your online time and Internet privacy. If you would prefer not to receive future issues, click here to to send an unsubscribe email or reply to this message with the word unsubscribe in the subject line. Copyright � 1998. Netscape Communications Corporation. All rights reserved. From phundie at mhv.net Mon Mar 30 13:38:31 1998 From: phundie at mhv.net (Michael Graffam) Date: Mon, 30 Mar 1998 13:38:31 -0800 (PST) Subject: Deniable Cryptography [was winnowing, chaffing etc] In-Reply-To: <19980330220847.28943@hexagon> Message-ID: On Mon, 30 Mar 1998, Nimrod Zimerman wrote: > Generally speaking, you bind attackers with constants (or else, most of the > cryptography we are using is pretty much useless). Why won't you bind > physical attackers with constants just as well? True, we impose limits on our hypothetical attackers. Eve can listen, but not modify.. but we assume Mallory has the ability to do both. Systems that are safe against Eve are exploitable by Mallory. I see no reason why we can not also assume more powerful physical attackers. I do not deny the use of deniable crypto :) .. it is useful against certain attackers. Certainly it is useful against the majority of attackers we are likely to encounter, for the dexact reasons that you site. However, my point is that just as public key exchange is attackable by Mallory in some circumstances, deniable crypto is useless against certain physical attackers.. namely O'Brian and room 101. This is not to say that public key crypto or deniable crypto is useless. > True, if you are kidnaped by a very large organization, like a country, you > don't stand a chance - you will either give up your secrets, and/or die > (history generally tells us that people can't stand torture. The exceptions > are remarkable, and probably indicate a certain level of mental illness, > before or after the act ). Smaller organizations are bound by constants > that might eventually be in your benefit. This is exactly my point. For the average guy in America, deniable crypto is probably irrelevent (unless he happens to be an average criminal too). But in a state where the law is wrong (we never heard of anything like that, have we?) there is probably a use. > That's why I consider dynamic secret sharing a better approach. > Make certain the attackers need to catch a group of people in order > to gain the secret, and change the partial secrets every short period of time. > This isn't always practical, of course. Yeah, I agree. For some secrets it might be the best approach, say for the codes to launch a nuclear weapon.. but for others it probably does not work. > (Alice can always fascinate her attackers with a new and exciting > cryptosystem, and while they are busy studying it, sneak behind and hit > them on the heads with a selected cryptography oriented book). > > Nimrod Hehe.. :) I like that. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "Act only according to that maxim by which you can at the same time will that it should become a universal law.." - Immanuel Kant "Metaphysics of Morals" From die at die.com Mon Mar 30 14:04:08 1998 From: die at die.com (Dave Emery) Date: Mon, 30 Mar 1998 14:04:08 -0800 (PST) Subject: Rivest's Wheat & Chaff - A crypto alternative In-Reply-To: <199803272236.OAA21103@joseph.cs.berkeley.edu> Message-ID: <19980330170507.11896@die.com> There are two bills before Congress. One (HR2369) concerns radio signal privacy and restrictions on scanners and receiving radio signals without authority, the other (HR2460 and S493) concerns use of scanners to capture ESNs for the purposes of cloning cellphones. Both passed the House, and the anti-cloning bill also passed the Senate. On Mon, Mar 30, 1998 at 09:36:55AM -0800, David Wagner wrote: > > A bill banning mere ownership (and modification, sale, and so on; no need > for prosecutors to show any ill intent) of cellular capable scanners has > passed the House by a vote of 414-1. A very similar version also passed the > Senate easily, and the two are being reconciled. There's no opposition; > this is fasttrack noncontroversial stuff, on the Hill. I'm told the bill is > as good as signed. > That is not my information. HR2369 (the Tauzin bill) does not ban mere possession of cell capable scanners. It bans manufacture, assembly, sale, import, export, or distribution of *any* radio equipment (not just cellphone capable scanners) "intended" for the unauthorized receipt, interception, or divulgance of communications in violation of the amended section 605 (which bans interception or divulgance rather than the previous *and* divulgance). This very clearly does not ban possession, and also very clearly speaks to intent. What this draconian language means with respect to a wide band radio receiver such as a scanner that can tune in certain signals it is not legal to listen to is not clear at the moment, as it turns on what "intended" means. Penalties for violation of this are 5 years in jail and $500,000 fine per sale... (the law was basicly expanded from one forbidding the sale of satellite TV piracy gear - and similar language has been the law since 1988, but less clear). According to Thomas and my other sources, HR2369 is still in the Senate Commerce Committee and has not been marked up - apparently Sen Hollings of SC has put a hold on it for further study. There is a bill (S493) which establishes 15 years in prison for "knowingly and with *intent to defraud* uses, produces, traffics in, has control or custody of, or possess" a scanning receiver "to intercept an electronic serial number, mobile identification number or other identifier of any telecommunications service, equipment or instrument. This later bill clearly concerns ESN theft for purposes of cloning, but it is broad enough so it conceivably might be applied to possession of radio receivers capable of capturing any kind of identifying information for any radio signal - but I think it is probably true that there would have to be a specific demonstrable intent to defraud demonstrated before a conviction under this language could happen. This bill is tough, however, and does provide for "forfeiture of any personal property used or intended to be used to commit the offense". S493 does make it illegal to merely possess "hardware or software, knowing it has been configured to insert or modify telecommunications identifying information associated with or contained in a telecommunications instrument so that such instrument may be used to obtain telecommunications service without authorization". No requirement of intent to defraud need be demonstrated here, but there is an affirmative defense "(which the defendant must establish by a preponderance of the evidence) that the conduct charged was engaged in for research or development in connection with a lawful purpose." This bill, is one of the first I know of to outlaw mere *possession* of software. And they can take seize your computer, your car, and Lord knows what else if they find the illegal software on your laptop hard drive. They need not prove you had any intention of using it to clone cellphones, just that you knew it was configured for illegal ESN alteration and you did not have it for "research and development in connection with a lawful purpose." To quote the Committee report on the bill... [S493} amends section 1029 of Title 18 of the United States Code, relating to fraud and related activity in connection with access devices. The bill amends subsection (a)(8) of section 1029 by deleting the `intent to defraud' requirement which exists under current law in order to prove a violation of that section. This section relates to persons who knowingly use, produce, traffic in, have custody or control of, or possess hardware or software which has been configured for altering or modifying a telecommunications instrument. As a result of the amendments made by the bill, in order to prove a violation of section 1029, law enforcement officials will no longer have to prove that a defendant possessing such hardware or software did so with the intent to defraud another person. The amendment to the statute is being made because law enforcement officials occasionally have been thwarted in proving true violations of the statute by the `intent to defraud' requirement. But as the hardware and software in question can be used only for the purpose of altering or modifying telecommunications instruments, persons other than those working in the telecommunications industry have no legitimate reason to possess the equipment. Therefore, requiring the government to prove an `intent to defraud' in order to prove a violation of the section for possessing this equipment is not necessary. By eliminating this requirement from existing law this bill will make it easier to obtain convictions against criminals who possess this equipment before they actually use it for illegal purposes. ............................. The statute, as amended, also does not prohibit persons from simply possessing equipment that only intercepts electronic serial numbers or wireless telephone numbers (defined as `scanning receivers' under section 1029, as amended by the bill). For example, companies which produce technology to sell to carriers or state and local governments that ascertains the location of wireless telephones as part of enhanced 911 services do not violate section 1029 by their actions. Under new subsection (a)(8), however, it will continue to be illegal to use, produce, traffic in, have custody or control of, or possess a scanning receiver if such act was done with the intent to defraud another person. This also is current law, and it remains unchanged by the bill. > > The law enforcement industry couldn't care less whether the cellphone > airlinks are private. All wiretaps are done at the base station or > inside the network, where no scanners are needed. > Sadly, this is only true of *legal* wiretaps by authorized *US* entities. Ask any of the dealers and manufacturers of cellphone interception gear and high end scanners who buys this stuff (with cell phone band enabled). Lots of LEA types have this gear, some of which is specialized enough so it could have no other purpose. > I suspect the cellphone industry wants these laws primarily because they find > them useful at fighting fraud. When you broadcast a reusable "password" > (the MIN/ESN pair) over the air in the clear (as analog phones do), devices > to snoop on conversations start to look very much like devices to steal those > valuable "passwords". Of course. They could care less about privacy (or they would have encrypted years ago), but fraud costs them big money. > > Of course, we all know that these laws are pretty ineffective at protecting > privacy, though they are effective at making it easier to snow the public into > thinking their cellphones are secure. (This is only, what, the fourth such > law? It just gets worse and worse.) -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From jya at pipeline.com Mon Mar 30 14:12:39 1998 From: jya at pipeline.com (John Young) Date: Mon, 30 Mar 1998 14:12:39 -0800 (PST) Subject: S-909 Revised Message-ID: <199803302212.RAA06210@camel8.mindspring.com> We've received from anonymous a copy of Senators McCain and Kerrey's draft revisions to S.909, The Secure Public Networks Act, as announced in early March: http://jya.com/s909-rev.htm (60K) This is encryption legislation due to be introduced in May and is now being circulated among government agencies and industry for comment. It draws heavily on the FBI "technical assistance draft" of last year which made recommendations for modifying the original bill. See links to both from this draft. Page 2 of the draft was not provided. Anybody with a copy of the page we'd appreciate getting it, digitized if convenient, faxed if not: 212-799-4003. From billp at nmol.com Mon Mar 30 14:34:31 1998 From: billp at nmol.com (bill payne) Date: Mon, 30 Mar 1998 14:34:31 -0800 (PST) Subject: pals Message-ID: <35201CB7.66B@nmol.com> Monday 3/30/98 3:21 PM John Young The information contained in http://www.research.att.com/~smb/nsam-160/pal.html appears from my knowledge accurate. One must consider possible malfunction when With the CAT B, it is also possible to check the code, relock the weapon, or rekey it. and limited-try feature disables the bomb if too many incorrect keys are entered. Most references omit the CAT C. It may just be a later model of the CAT B. The new keys loaded were occasionally not the ones intended to be loaded. Back to Pantex for disassembly was the fix. The bubble memory of the T1563 was one of the problems in rekeying reliability, I was told.. Bugs in the about 112,000 lines of rca 1802 assembler code was also a problem. Kent Parsons asked me to look at the code and make a recommendation about what to do. Later bill From billp at nmol.com Mon Mar 30 17:56:28 1998 From: billp at nmol.com (bill payne) Date: Mon, 30 Mar 1998 17:56:28 -0800 (PST) Subject: foiling any lock Message-ID: <35204B7A.2AF6@nmol.com> Monday 3/30/98 6:34 PM wolit & smb Your statement at http://www.jya.com/pal-nukes.htm http://www.research.att.com/~smb/nsam-160/pal.html There are two basic means of foiling any lock, from an automobile ignition switch to a PAL: the first is to pick it, and the second is to bypass it. perhaps contains SEVERAL PRACTICAL oversights. ONE is spike it! http://caq.com/CAQ/caq63/caq63madsen.html http://www.aci.net/kalliste/speccoll.htm http://jya.com/whpfiles.htm And, of course, Pantex can always get in. Then there are OTHER ways of getting the key Two terrorist agents of the clerical regime, both high-ranking officials in Tehran's Evin Prison who have been directly involved in the torture and execution of numerous political prisoners in recent years, are currently in Austria on a secret assignment as special guests of the Iranian embassy in Vienna. One of the two is Ruhollah, the notorious interrogator in Evin Prison's Branch 6. I read It is reasonably probable that public key cryptography is not used directly. No known public key cryptosystem uses keys as short as 6 or 12 digits. I was told that public key was. Here is the name and e-mail address of the fellow who told me pubic key was used in the nuclear weapons ... and was being removed. KULJU,RONALD J. (505)845-8860 RJKULJU (505)844-9478 0519 RJKULJU at sandia.gov The supervisor of M Kent Parsons who told me it cost $300,000 each to recall the nuke to Pantex to remove Sandia's FAILING CHIPS [unspecified] is ALLEN,DOUGLAS J. (505)845-9624 DJALLEN (505)844-7593 1201 DJALLEN at sandia.gov The guy, at 2300 department manager M Kent Parson's request who showed me the about 112,000 lines of 1802 T1563 code is DENMAN,THOMAS A. (505)844-2819 TADENMA (505)844-9524 0487 TADENMA at sandia.gov I frequently see Denman when Morales and I meet at Taco Bell. Let's ALL try to get the true story OUT THERE. Best bill From toto at sk.sympatico.ca Mon Mar 30 19:34:15 1998 From: toto at sk.sympatico.ca (Toto) Date: Mon, 30 Mar 1998 19:34:15 -0800 (PST) Subject: And the way this relates to cryptomony is...uuhhh....... Message-ID: <026401bd5c66$5dd1ebe0$1962a58e@uymfdlvk> There is an amusing discussion of metaphor and metonymy in David Lodge's novel, Nice Work. A typical instance of this was the furious argument they had about the Silk Cut advertisement... Every few miles, it seemed, they passed the same huge poster on roadside hoardings, a photographic depiction of a rippling expanse of purple silk in which there was a single slit, as if the material had been slashed with a razor. There were no words in the advertisement, except for the Government Health Warning about smoking. This ubiquitous image, flashing past at regular intervals, both irritiated and intrigued Robyn, and she began to do her semiotic stuff on the deep structure hidden beneath its bland surface. It was in the first instance a kind of riddle. That is to say, in order to decode it, you had to know that there was a brand of cigarettes called Silk Cut. The poster was the iconic representation of a missing name, like a rebus. But the icon was also a metaphor. The shimmering silk, with its voluptous curves and sensuous texture, obviously symbolized the female body, and the elliptical slit, foregrounded by a lighter colour showing through, was still more obviously a vagina. The advert thus appealed to both senual and sadistic impulses, the desire to mutilate as well as penetrate the female body. Vic Wilcox spluttered with outraged derision as she expounded this interpretation. He smoked a different brand himself, but it wasas if he felt his whole philosophy of life was threatened by Robyn's analysis of the advert. 'You must have a twisted mind to see all that in a perfectly harmless bit of cloth,' he said. 'What's the point of it, then?' Robyn challenged him. 'Why use cloth to advertise cigarettes?' 'Well, that's the name of 'em, isn't it? Silk Cut. It's a picture of the name. Nothing more or less.' 'Suppose they'd used a picture of a roll of silk cut in half - would that do just as well?' 'I suppose so. Yes, why not?' 'Because it would look like a penis cut in half, that's why.' He forced a laugh to cover his embarrassment. 'Why can't you people take things at their face value?' 'What people are you refering to?' 'Highbrows. Intellectuals. You're always trying to find hidden meanings in things. Why? A cigarette is a cigarette. A piece of silk is a piece of silk. Why not leave it at that? 'When they're represented they acquire additional meanings,' said Robyn. 'Signs are never innocent. Semiotics teaches us that.' 'Semi-what?' 'Semiotics. The study of signs.' 'It teaches us to have dirty minds, if you ask me.' 'Why do you think the wretched cigarettes were called Silk Cut in the first place?' 'I dunno. It's just a name, as good as any other.' "Cut" has something to do with the tobacco, doesnt it? The way the tobacco leaf is cut. Like "Player's Navy Cut" - my uncle Walter used to smoke them.' 'Well, what if it does?' Vic said warily. 'But silk has nothing to do with tobacco. It's a metaphor, a metaphor that means something like, "smooth as silk". Somebody in an advertising agency dreamt up the name "Silk Cut" to suggest a cigarette that would'nt give you a sore throat or a hacking cough or lung cancer. But after a while the public got used to the name, the word "Silk" ceased to signify, so they decided to have an advertising campaign to give the brand a high profile again. Some bright spark in the agency came up with the idea of rippling silk with a cut in it. The original metaphor is now represented literally. Whether they conciously intended or not doesn't really matter. It's a good example of the perpetual sliding of the signified under a signifier, actually.' Wilcox chewed on this for a while, then said, 'Why do women smoke them, then, eh?' his triumphant expression showed that he thought this was a knock-down argument. 'If smoking Silk Cut is a form of aggravated rape, as you try to make out, how come women smoke 'em too?' 'Many women are masochistic by temperament,' said Robyn. 'They've learnt what's expected of them in a patriarchical society.' 'Ha!' Wilcox exclaimed, tossing back his head. 'I might have known you'd have some daft answer.' 'I don't know why you're so worked up,' Said Robyn. 'It's not as if you smoke Silk Cut yourself.' 'No, I smoke Marlboros. Funnily enough, I smoke them because I like the taste.' 'They're the ones that have the lone cowboy ads, aren't they?' 'I suppose that makes me a repressed homosexual, does it?' 'No, it's a very straightforward metonymic message.' 'Metawhat?' 'Metonymic. One of the fundamental tools of semiotics is the distinction between metaphor and metonymy. D'you want me to explain it to you?' 'It'll pass the time,' he said. 'Metaphor is a figure of speech based on similarity, whereas metonymy is based on contiguity. In metaphor you substitute something like the thing you mean for the thing itself, whereas in metonymy you substitute some attribute or cause or effect of the thing for the thing itself'. 'I don't understand a word you're saying.' 'Well, take one of your moulds. The bottom bit is called the drag because it's dragged across the floor and the top bit is called the cope because it covers the bottom bit.' 'I told you that.' 'Yes, I know. What you didn't tell me was that "drag" is a metonymy and "cope" is a metaphor.' Vic grunted. 'What difference does it make?' 'It's just a question of understanding how language works. I thought you were interested in how things work.' 'I don't see what it's got to do with cigarettes.' 'In the case of the Silk Cut poster, the picture signifies the female body metaphorically: the slit in the silk is like a vagina -' Vic flinched at the word. 'So you say.' 'All holes, hollow places, fissures and folds represent the female genitals.' 'Prove it.' 'Freud proved it, by his successful analysis of dreams,' said Robyn. 'But the Marlboro ads don't use any metaphors. That's probably why you smoke them, actually.' 'What d'you mean?' he said suspiciously. 'You don't have any sympathy with the metaphorical way of looking at things. A cigarette is a cigarette as far as you are concerned.' 'Right.' 'The Marlboro ad doesn't disturb that naive faith in the stability of the signified. It establishes a metonymic connection - completely spurious of course, but realistically plausible - between smoking that particular brand and the healthy, heroic, outdoor life of the cowboy. Buy the cigarette and you buy the lifestyle, or the fantasy of living it.' 'Rubbish!' said Wilcox. 'I hate the country and the open air. I'm scared to go into a field with a cow in it.' 'Well then, maybe it's the solitariness of the cowboy in the ads that appeals to you. Self-reliant, independent, very macho.' 'I've never heard such a lot of balls in all my life,' said Vic Wilcox, which was strong language coming from him. 'Balls - now that's an interesting expression...' Robyn mused. 'Oh no!' he groaned. 'When you say a man "has balls", approvingly, it's a metonymy, whereas if you say something is a "lot of balls", or "a balls-up", it's a sort of metaphor. The metonymy attributes value to the testicles whereas the metaphor uses them to degrade something else.' 'I can't take any more of this,' said Vic. 'D'you mind if I smoke? Just a plain, ordinary cigarette?' From BUTCHER56 at aol.com Mon Mar 30 19:35:41 1998 From: BUTCHER56 at aol.com (BUTCHER56) Date: Mon, 30 Mar 1998 19:35:41 -0800 (PST) Subject: Hi I want to meet you im a model! Message-ID: <7ad9d9b9.35206364@aol.com> � To: BUTCHER56 at aol.com Subject: Hi I want to meet you im a model! From: BUTCHER56 Date: Mon, 30 Mar 1998 22:21:48 EST Organization: AOL (http://www.aol.com) Come to my home and get inside and you will seem! click here From EMAIL at ELDQ.Earthlink.net Tue Mar 31 01:38:11 1998 From: EMAIL at ELDQ.Earthlink.net (Smoke-Away) Date: Tue, 31 Mar 1998 01:38:11 -0800 (PST) Subject: Quit Smoking in 7 Days Guaranteed! -QEVR Message-ID: <199803310938.BAA20333@toad.com> Dear cypherpunks, Quit Smoking in Just 7 Days Guaranteed!!! Flush nicotine cravings from your body naturally with SMOKE-AWAY! Safely, easily and successfully, with No Cravings, Withdrawal or Weight gain! Free yourself or someone you love from nicotine addiction with this incredible all herbal program. ORDER NOW! The complete SMOKE-AWAY program is now ONLY $49.95! Call 1-800-611-5930 Ext.3395 for VISA OR MASTER CARD ORDERS. No risk, Money Back Guarantee. To order by mail, print out this page, and send in the completed form below: _________________________________________________________________________ Enclosed is $49.95 plus $5.00 shipping and handling for each kit ordered. I understand that Smoke-Away comes With a No Risk, Money Back Guarantee. Mail Check or Money Order to: Behavioral Research Center Dept: 3395 5051 Castello Drive, Suite 235 Naples, Florida 34103 NAME ________________________________________________________________ ADDRESS _____________________________________________________________ CITY_________________________________ STATE___________ ZIP ____________ __MASTERCARD __VISA CREDIT CARD NUMBER __________________________________________________ EXPIRATION DATE ______________________________________________________ SIGNATURE ____________________________________________________________ From MAILER-DAEMON at globecomm.net Tue Mar 31 04:37:41 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:37:41 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311241.HAA01831@mx04.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:41:11 -0500 (EST) from camel7.mindspring.com [207.69.200.57] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta2.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx04.globecomm.net Received-From-MTA: DNS; camel7.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:41:11 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta2.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:41:12 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:37:32 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:37:51 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:37:51 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311234.HAA02936@mx02.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:34:28 -0500 (EST) from camel7.mindspring.com [207.69.200.57] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta3.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx02.globecomm.net Received-From-MTA: DNS; camel7.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:34:28 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta3.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:34:29 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:37:33 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:37:56 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:37:56 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311234.HAA02978@mx02.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:34:34 -0500 (EST) from camel7.mindspring.com [207.69.200.57] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta1.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx02.globecomm.net Received-From-MTA: DNS; camel7.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:34:34 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta1.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:34:35 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:37:40 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:37:58 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:37:58 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311234.HAA11843@mx03.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:34:27 -0500 (EST) from camel7.mindspring.com [207.69.200.57] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta3.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx03.globecomm.net Received-From-MTA: DNS; camel7.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:34:27 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta3.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:34:28 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:37:41 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:38:00 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:38:00 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311231.HAA26917@mx01.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:31:50 -0500 (EST) from camel7.mindspring.com [207.69.200.57] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta2.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx01.globecomm.net Received-From-MTA: DNS; camel7.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:31:50 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta2.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:31:51 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:37:35 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:38:01 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:38:01 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311234.HAA11859@mx03.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:34:30 -0500 (EST) from camel7.mindspring.com [207.69.200.57] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta3.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx03.globecomm.net Received-From-MTA: DNS; camel7.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:34:30 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta3.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:34:31 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:37:44 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:38:02 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:38:02 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311234.HAA03709@mx05.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:34:38 -0500 (EST) from camel7.mindspring.com [207.69.200.57] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta4.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx05.globecomm.net Received-From-MTA: DNS; camel7.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:34:38 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta4.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:34:39 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:37:46 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:39:34 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:39:34 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311241.HAA01880@mx04.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:41:18 -0500 (EST) from camel7.mindspring.com [207.69.200.57] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta1.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx04.globecomm.net Received-From-MTA: DNS; camel7.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:41:18 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta1.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:41:19 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:37:38 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:39:37 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:39:37 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311234.HAA11815@mx03.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:34:22 -0500 (EST) from camel7.mindspring.com [207.69.200.57] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta4.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx03.globecomm.net Received-From-MTA: DNS; camel7.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:34:22 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta4.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:34:23 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:37:37 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:40:38 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:40:38 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311244.HAA02821@mx04.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:44:09 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta1.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx04.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:44:09 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta1.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:44:10 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:30 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:40:45 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:40:45 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311237.HAA12760@mx03.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:37:17 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta2.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx03.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:37:17 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta2.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:37:18 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:32 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:40:51 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:40:51 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311237.HAA12780@mx03.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:37:20 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta1.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx03.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:37:20 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta1.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:37:21 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:35 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:40:57 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:40:57 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311237.HAA04447@mx05.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:37:28 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta1.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx05.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:37:28 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta1.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:37:29 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:36 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:41:00 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:41:00 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311237.HAA03982@mx02.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:37:32 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta1.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx02.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:37:32 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta1.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:37:33 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:38 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:41:11 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:41:11 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311234.HAA27998@mx01.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:34:58 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta4.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx01.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:34:58 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta4.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:34:59 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:44 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:41:12 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:41:12 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311244.HAA02901@mx04.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:44:22 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta2.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx04.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:44:22 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta2.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:44:23 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:42 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:41:13 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:41:13 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311235.HAA28010@mx01.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:35:00 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta1.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx01.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:35:00 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta1.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:35:01 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:46 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:41:13 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:41:13 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311235.HAA28025@mx01.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:35:02 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta2.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx01.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:35:02 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta2.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:35:03 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:47 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:41:17 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:41:17 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311235.HAA28056@mx01.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:35:08 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta3.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx01.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:35:08 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta3.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:35:09 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:54 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:41:18 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:41:18 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311235.HAA28068@mx01.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:35:10 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta1.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx01.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:35:10 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta1.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:35:11 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:56 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:41:19 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:41:19 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311235.HAA28090@mx01.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:35:14 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta3.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx01.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:35:14 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta3.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:35:15 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:41:00 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:42:24 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:42:24 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311234.HAA27913@mx01.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:34:47 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta2.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx01.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:34:47 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta2.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:34:48 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:33 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:42:37 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:42:37 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311234.HAA27973@mx01.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:34:55 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta4.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx01.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:34:55 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta4.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:34:56 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:41 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:42:40 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:42:40 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311234.HAA27968@mx01.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:34:54 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta4.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx01.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:34:54 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta4.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:34:55 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:39 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:42:52 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:42:52 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311244.HAA02935@mx04.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:44:28 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta4.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx04.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:44:28 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta4.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:44:29 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:49 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:42:55 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:42:55 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311237.HAA12883@mx03.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:37:38 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta4.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx03.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:37:38 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta4.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:37:39 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:50 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:42:57 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:42:57 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311237.HAA12882@mx03.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:37:38 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta2.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx03.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:37:38 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta2.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:37:39 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:53 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:42:57 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:42:57 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311244.HAA02985@mx04.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:44:38 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta1.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx04.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:44:38 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta1.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:44:39 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:59 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:42:59 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:42:59 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311235.HAA28077@mx01.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:35:12 -0500 (EST) from camel8.mindspring.com [207.69.200.58] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta1.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx01.globecomm.net Received-From-MTA: DNS; camel8.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:35:12 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta1.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:35:13 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:40:57 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From MAILER-DAEMON at globecomm.net Tue Mar 31 04:43:01 1998 From: MAILER-DAEMON at globecomm.net (Mail Delivery Subsystem) Date: Tue, 31 Mar 1998 04:43:01 -0800 (PST) Subject: Returned mail: User unknown Message-ID: <199803311241.HAA01904@mx04.globecomm.net> The original message was received at Tue, 31 Mar 1998 07:41:22 -0500 (EST) from camel7.mindspring.com [207.69.200.57] ** This is an automatic message to inform you that your email was not forwarded through iName's server. The iName email address that you tried to send mail to may not be active. Reasons for the failed delivery attempt could include: 1. The iName customer has selected a new personalized iName email address rendering their old iName email address inactive. 2. The iName customer may have signed up for one of iName's free offers and then not validated their forwarding address. 3 The address may simply be typed incorrectly. Please check that you typed the email address correctly. iName provides email users with a permanent, personalized and secure email address that is independent of how one accesses the Internet. iName acts as a global forwarding service. All email sent to a permanent iName address is automatically forwarded to a user specified destination email address. Please visit iName's Online Support Area at http://www.iname.com/info/intro/index.html for further information. ** ----- The following addresses had permanent fatal errors ----- debtzapper at mailexcite.com (expanded from: ) ----- Transcript of session follows ----- ... while talking to mta4.mailexcite.com.: >>> RCPT To: <<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota 550 debtzapper at mailexcite.com... User unknown Reporting-MTA: dns; mx04.globecomm.net Received-From-MTA: DNS; camel7.mindspring.com Arrival-Date: Tue, 31 Mar 1998 07:41:22 -0500 (EST) Final-Recipient: RFC822; X-Actual-Recipient: RFC822; debtzapper at mailexcite.com Action: failed Status: 5.1.1 Remote-MTA: DNS; mta4.mailexcite.com Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota Last-Attempt-Date: Tue, 31 Mar 1998 07:41:23 -0500 (EST) Subject: Some spam From: cypherpunks at toad.com Date: Tue, 31 Mar 1998 07:37:43 -0500 (EST) Here is the information on the $9 dental plan we talked about. I apologise for the delay in getting the information to you but I have been swamped for request. Please fax me if you want more information or wish to sign up. I don't know what you're talking about; thought I'd let you know. Your buddy From jya at pipeline.com Tue Mar 31 04:45:05 1998 From: jya at pipeline.com (John Young) Date: Tue, 31 Mar 1998 04:45:05 -0800 (PST) Subject: 3DES Weakness Message-ID: <199803311244.HAA20875@camel7.mindspring.com> NYT-Markoff reports today on Biham and Knudsen's paper on 3DES weakness, "Cryptanalysis of the ANSI X9.52 CBCM Mode," noted here a few days ago. The ANSI X9.F1 committee has held up implementing its standard as a result, and may have to wait for AES. Credit is given to the worldwide DES crack. http://www.nytimes.com See a mirror: http://jya.com/3des-weak.htm Get the Biham/Knudsen paper: http://www.cs.technion.ac.il/%7Ebiham/publications.html From billp at nmol.com Tue Mar 31 08:31:07 1998 From: billp at nmol.com (bill payne) Date: Tue, 31 Mar 1998 08:31:07 -0800 (PST) Subject: T 1563 and pals Message-ID: <3521072D.7BE4@nmol.com> Tuesday 3/31/98 7:39 AM John Gilmore John Young J Orlin Grabbe Reading the stuff on the pals at http://www.jya.com/pal-nukes.htm http://www.research.att.com/~smb/nsam-160/pal.html jogged my memory. After we completed the Forth implementation of the Missile Secure Cryptographic Unit at least Hal Pruett, Duane DeWerff, myself, and perhaps several others were invited to NSA at Fort Meade in about 1985-6. NSA employee Bill Legato assailed me for using Forth for the implementation of the MSCU. Legato hated Forth and relayed his hate to Sandia management. This is one reason I was replaced as project leader by Tom Evans who was later replaced by Eric Disch. Possibly surprising, however, is that NSA sent Forth expert Don Simard to visit Sandia for several years. Kent Parsons commented to me that he thought Simard was an NSA spy sent to see what we were up to at Sandia. Simard, along with Bill Goldrick, were the two reviewers of my SAND report now seen at http://jya.com/whpfiles.htm EE Times, March 30, 1998 page 8 A Java chip being to ship in quantity SAN FRANCISCO - Patriot Scientific Corp. surged to the head of the silicon pack at the JavaOne conference last week, showing the PSC1000 RISC processor, which is shipping in quantity. �We�ll be selling the chip for under $10 in volume and aiming at deeply embedded, low-power applications such as handheld devices and factory-floor control systems, � said Phil Morettini, vice president of Patriot (San Diego). Competing offering from LG Semicon and NEC Corp., each based on Sun Microsystems Inc.�s picoJava core, are not yet available, although select customers are said to have samples. Separately, Rockwell Collins Inc. (Cedar Rapids, Iowa) said that it has decided not to sell its Java-specific CPU on the merchant market. The company unveiled the innovative processor last fall. Here is their web site. http://www.ptsc.com/ Charles Moore, inventor of Forth, is author of the Shboom Java native code compiler for the PCS100. Rockwell built a Forth-like chip many years ago. I met Randy Dumse, who then worked for Rockwell, at a trade show. I got a copy of the Rockwell R65F11 chip manual from Dumse. Dumse quit Rockwell to start NewMicros seen at http://www.newmicros.com/ Click on history to see http://www.newmicros.com/history.html Of course, the Harris RTX 2000 chip used by NASA is a descendant of Charles Moore�s Novix Forth chip. http://groucho.gsfc.nasa.gov/forth/ Ballard, I was told by Jeff Allsup of Wood Hole, used polyForth to discover the wrecks of the Titanic and Bismarck. A central debate is whether a high-level language should be used for a weapons programmer. The implementer must be able to account for each bit. In Forth I can. Possibility exists that an disgruntled implementer might 'spike' a weapon so that it went off at an unintended time. Sandia supervisor Don Schroeder was an OUTSPOKEN critic of the T 1563 nuclear bomb controller. SCHROEDER,DONALD H. (505)845-8409 DHSCHRO (505)844-9478 0519 DHSCHRO at sandia.gov The T 1563 did not work very well. One reason is that it was written in about 112,000 lines of assembler. NSA was reluctant to approve use of an operating system or even a high-level language for crypto implementation for the reasons that security could not be guaranteed. Sandia did not have the resources required to write its own secure operating system and high-level language. This is why we used the Forth operating system and high-level language. Schroeder division employee Mike Sharp SHARP,MICHAEL W. (505)845-8444 MWSHARP (505)284-3850 1138 MWSHARP at sandia.gov wrote a T 1563 implementation in, I think C or Pascal. Henry Newgass modified the transient part of command.com so that on power-up a PC directly entered Sharp�s program. Jerry Allen, who also saw the merits of using an operating system and high-level language, funded Neugass. ALLEN,DOUGLAS J. (505)845-9624 DJALLEN (505)844-7593 1201 DJALLEN at sandia.gov I wrote the purchase order. I learned several months ago that Sandia built a PC version of the T 1563 called the T 1663, I was told, which was supplied to the Air Force. The threaded code - compiled native code battle continues. I am sort-of happy to be back [somewhat] doing MASM code - along with a bit of Forth and Forth assembler on the 80c32. I see that J Orlin Grabbe is linking Permissive Action Links at http://www.aci.net/kalliste/ I read Both strong links must be closed electrically -- one by specific operator-coded input and one by environmental input corresponding to an appropriate flight trajectory -- in order for the weapon to be armed. George Dullek and Jon Bryan worked together on accellerometers for flight trajectory sensing. Dullek and Bryan are Forth programmers. DULLECK JR.,GEORGE R. (505)844-2628 GRDULLE (505)844-8480 1073 GRDULLE at sandia.gov BRYAN,JON R. (505)844-2015 JRBRYAN (505)844-6161 1003 JRBRYAN at sandia.gov Sandia had a division devoted to crystal oscillators. The oscillators for the micro occasionally fail to start - a bad scene if this happens when trying to arm a nuke. Dick Adams, also in department 2300, was in charge of oscillators. Adams never seemed to many of us too interested in his job. Adams took an early voluntary separation package from Sandia with a large educational retraining incentive. And went to cooking school in San Francisco, Bob Wayland told me. The real world again. Thanks to good research, some whistleblowing, and Internet details of fuzing the US nuclear arsenal are being revealed. Let�s ALL hope for SETTLEMENT of this unfortunate mess before it gets WORSE. I want my money and I am out of this mess. Later bill From kurtbuff at halcyon.com Mon Mar 30 23:20:14 1998 From: kurtbuff at halcyon.com (Kurt Buff) Date: Tue, 31 Mar 1998 15:20:14 +0800 Subject: CIA Trained Gorilla Femnists Message-ID: <01BD5C30.8CD50C00.kurtbuff@halcyon.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 worst case of performance anxiety I've ever heard of... On Tuesday, March 24, 1998 5:23 PM, TruthMongrer [SMTP:tm at dev.null] wrote: | Male Gorilla, Released to Mate | with Females, Drops Dead | | AP | 24-MAR-98 | | TOKYO (AP) The excitement, or perhaps the pressure, apparently was too | much for Sultan. The 28-year-old male gorilla, specially moved to a | cage to mate with three females, instead dropped dead. | | The 400-pound lowland gorilla ran around briefly and played with his | new friends Monday, then suddenly collapsed, apparently after suffering | a heart attack, said Kunihiko Yasui, head of animal breeding at Kyoto | Muni -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNR188Q3xegzLXcRmEQKAmgCggAQiHNO9OLy+D87pgdF9HuqXm5wAoMOF nsU45G3tEXdRYQOojSZAi2qa =oaNe -----END PGP SIGNATURE----- From nobody at REPLAY.COM Tue Mar 31 16:39:17 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 31 Mar 1998 16:39:17 -0800 (PST) Subject: Political Test Message-ID: <199804010039.CAA10566@basement.replay.com> THE SACREDBULL BASIC ENGLISH AND MATH TEST FOR FEDERAL POLITICIANS SECTION I: Competency in English 1. The phrase, "Congress shall make no law..." means a. Congress shall make no law... b. Congress shall make some laws... c. Americans can do anything they want, except things my colleagues and I, or our largest contributors, personally dislike. d. Congress can do anything it damn well pleases, starting with stacking the courts with our toadies. 2. What is the correct interpretation of the phrase "...the right of the people...shall not be infringed"? a. The right of the people...shall not be infringed. b. The right of the people...shall be infringed, but only gradually, moderately and for the good of children and battered women (except the ones we batter). c. The right of the people is actually a state's right and the states are a bunch of wusses who'll put up with anything as long as we offer them enough tax-funded loot in return for selling out their citizens. d. The people are all sitting on their butts watching TV, so we can infringe any damn thing we feel like infringing, and we'll get the media to screw you if you think otherwise. 3. What is the meaning of the phrase, "The powers ... are reserved to the states, or to the people..." a. The powers...are reserved to the states, or to the people... b. The interstate commerce clause gives us the authority to do anything. Therefore there are no other powers left to reserve for those other twits. Too bad for them. c. Where'd you get a stupid idea like that? We're more powerful and have bigger guns than they do, and that's all that really matters, isn't it? d. Hahahahahahahahahaha! 4. Essay Question: Write a bill (a proposed law, you twit) in plain English, for once. We just want to see if you can do it. Extra credit if it's constitutional or can be read and understood in less than ten minutes by a high school student of average intelligence. SECTION II: Competency in Mathematics 1. A fugitive oil baron named Roger gives $300,000 to the Democratic National Committee for the specific purpose of gaining "access" to the president. For that, he is given six invitations to the White House, but does not get the pipeline he wanted. How much money should Roger give to the DNC next time? a. Nothing. People shouldn't be able to bribe their way into the presence of public officials. b. This is a trick question. Next time, a Republican president might be in office, and Roger should give his money to the RNC, instead. c. I know the president. If Roger gives me the money, I'll give Roger access. Heck, I'll even throw in some hot babes, since Roger said the babes at the White House were too busy stroking Clinton to pay any attention to him. d. $600,000. (Roger's answer, in testimony before Congress 9/18/97.) 2. According to the administration's own projections, Americans will soon face an 82 percent income tax rate if present entitlement programs and levels of federal growth persist. How many years before American citizens rise up in rebellion? a. Americans should never be driven to that kind of desperation. We should immediately begin rolling the federal government back to constitutional levels. b. Don't worry, we're going to reform the tax system and, as Rep. Mitch McConnell says, "virtually abolish the IRS as we know it"; we'll just have an 82 percent national sales tax, instead. c. As soon as my term in office is over and I can get an oceanside place in Costa Rica, complete with Uzi-toting bodyguards. d. What do we care? We'll just let Janet burn the little jerks and claim they committed suicide. 3. The federal budget is...oh...some great big figure in the gazillions. The national debt is probably about five trillion dollars, give or take. The annual deficit is, you know, billions and billions and billions (not counting off-budget stuff like Amtrak and the Post Office). Budgets for Social Security and Medicare are increasing at some really wowie-zow of a percent every year. (Not like you care what the actual figures are, anyway.) Congress and the president have just cooked up a tax cut package filled with goodies for favored special interests. Please explain how you can claim the budget will be balanced by 2002. a. We can't do it without extreme cutbacks in government. Anybody who says we can is lying like a congressman. b. Revenues will...uh...yeah...revenues will increase because of all those tax breaks and...uh...the economy will be just perfect forever and ever and...uh...maybe some plague or something will come along and kill off all those money-sucking old folks...or something like that, maybe. c. The media said it's true, didn't they? What more proof do you want? d. Hey, that's for the suckers who are here in 2002 to figure out. I'll be in Costa Rica by then. e. Well, actually, now that I think about it, I'll be in some other country with an army so they can fight off the U.S. troops who will be sent to take my loot like they did Noriega's. Like, hey, I stole mine fair and square! Correct answers: B, C, D and E (From the politicians' point of view, that is. Hey, you know, whatever we can get away with while the folks are watching TV...) Correct answer, in reality: L-E-A-D T-H-E-R-A-P-Y ---------------------------------------------------------------------------- ---- ----- (c) 1997 Charles Curley and Claire Wolfe. Permission to reprint freely granted ---------------------------------------------------------------------------- ---- Return to Index to Writings of Claire Wolfe Return to Liberty Activist From tm at dev.null Tue Mar 31 20:05:06 1998 From: tm at dev.null (TruthMonger) Date: Tue, 31 Mar 1998 20:05:06 -0800 (PST) Subject: CNN - DeathMonger Message-ID: <3521D872.5B77@dev.null> SITE SOURCES Contents Help! Search CNN Networks Two Saskatchewan Freemen Assassinated One of the Freemen holds a drink during the 81-second standoff on April 1, 1998 Assassination stemmed from Microsoft standoff? Bienfait, SASK (AP) � TruthMonger I and TruthMonger II were assassinated in an 81-second standoff with an unidentified team of freelance assassins who accomplished their goal without firing a single shot. A few short minutes after the CoalDust Saloon opened for business, a limousine bearing Redmond, Washington, license plates pulled up outside the bar, and a half-dozen black-clad, heavily armed figures raced into the building, behind the cover of smoke and tear-gas grenades. They were met by a heavy fusillade of gunfire from a variety of surprised morning drunks who were onery as snot, not yet having finished their first beer of the morning. The assassins rushed into the bar and established strategic positions, only to find that the two TruthMonger entities who were the target of the raid already lay dead on the floor. They quickly rushed out of the CoalDust Saloon and piled into the limousine, which headed for the American border. The day-shift barmaid who investigated the scene--in the absence of local RCMP, who were busy on the reservation legally murdering WagonBurners�noted that TruthMonger I and TruthMonger II had both been shot in the head from behind. Blanc Weber, a member of the Circle of Eunuchs who claimed to have been �just passing through� Bienfait, at the time, and who was reported to be standing behind the TwoMongers when the shooting began, theorized that the fatal shots came from the grassy knoll behind the bar. When confronted by an angry crowd of drunken losers who pointed out that Weber�s anger over the TruthMonger Cult of One Clan including references to her in their Death Threat!!!(s) against an unnamed billionaire from Redmond, Washington, she bought a round of drinks for the house, and the matter was quickly dropped. Jeff Sandquist, a Microsoft employee who had earned his bones by cleaning up the mess that Circle of Eunuchs founder, C.J. Parker had made of the computer systems at the offices of a local mobile home manufacturer, verified Blanc Weber�s claims about the shots coming from the grassy knoll, noting that three bums (Mark Hedges, Robert Canizales, and a shadowy figure known only as Sameer) had been picked up shortly after the incident by Estevan City Police, and taken for a free breakfast at the Husky Truckstop. Sandquist and Weber were picked up and spirited away by a strange figure who refused to reveal his identity, but noted that it was imperative for the group to leave quickly, because �at night, the ice weasels come.� TruthMongerI.jpg TruthMongerII.jpg Local members of the Royal Canadian Mounted Gestapo later indicated that their investigation into the matter revealed that local law enforcement personnel in Redmond, Washington, could not find any suspects in their files matching the description of a billionaire in a limousine. A follow up inquiry by CNN reporters proved to be unsuccessful, as all of the officers involved on both sides of the border had retired by the end of the day. At a wake held for the TwoMongers after a truckload of Olympia beer unexpectedly arrived at the bar, the massive crowd that suddenly appeared out of nowhere reminisced about their fallen drinking buddies. �It was probably an act of mercy, since they had been suffering greatly since installing Win95 on their systems.� ~Anonymous �Ever since TM-I�s cousin died of a mysterious heart-attack after being put in a cage with the female guerillas, we knew it was only a matter of time before Blanc Weber saw the light and decided to become a Claire Wolfe in Sheeple's clothing.� ~Nobody �I *love* this bar�� ~A visitor from Boston � 1998 Cable News Network, Inc. A Time Warner Company All Rights Reserved. From toto at sk.sympatico.ca Tue Mar 31 20:37:47 1998 From: toto at sk.sympatico.ca (Toto) Date: Tue, 31 Mar 1998 20:37:47 -0800 (PST) Subject: AUP Message-ID: <000c01bd5d38$68213380$7679a58e@uymfdlvk> -----Original Message----- From: Lance Cottrell >Sadly our lawyer suggests that physically dismembering abusers is >inappropriate from a corporate point of view. ;) Pussies... From toto at sk.sympatico.ca Tue Mar 31 21:24:30 1998 From: toto at sk.sympatico.ca (Toto) Date: Tue, 31 Mar 1998 21:24:30 -0800 (PST) Subject: Repeat Offenders / Re: March 1 column - child abuse trials Message-ID: <005f01bd5d3e$ece30b60$7679a58e@uymfdlvk> Now, if only we could get a conviction... -----Original Message----- > FROM MOUNTAIN MEDIA > FOR IMMEDIATE RELEASE DATED MARCH 1, 1998 > THE LIBERTARIAN, By Vin Suprynowicz > Where are they now? > Only last week did a three-judge panel of the 11th Circuit Court of >Appeals, in a unanimous ruling, overturn the conviction of Miami police >officer Grant Snowden, sentenced in 1986 to five life terms on charges he >had committed sexual crimes against small children. ... > If juries are willing to embrace "professional" testimony that small >children who make fantastic, rambling accusations are telling the truth >"99.5 percent of the time," have we really come so far from the days of the >Salem witchcraft trials ... which ended, instructively enough, when 23 >Massachusetts juries in a row finally refused to convict? ... > What about those prosecutors, by the way? What ever did become of the >ambitious Dade County State Attorney whose office prosecuted Officer >Snowden -- now ordered to be released "unless the state affords him a >speedy new trial"? > > Why, her name was Janet Reno, and she was elevated in 1993 to the >position of attorney general of the United States, where she immediately >oversaw the "protection" of the children of the Mount Carmel religious >community in Waco, Texas, by federal agents who trapped them in their >church by using armored vehicles to knock down walls and escape staircases, >injected the premises with poison gas, and in the process started a fatal >conflagration by knocking over kerosene lanterns and space heaters, all >while fellow G-men poured "suppressive" automatic weapons fire into the >structure to stop anyone from escaping or resisting. > > (See it for yourself, as filmed by federal government cameras: Order the >video "Waco: The Terms of Engagement," now nominated for an Academy Award >as best documentary, at $25 by dialing 1-800-771-2147, ext. 19.) > >Vin Suprynowicz is the assistant editorial page editor of the Las Vegas >Review-Journal. Readers may contact him via e-mail at vin at lvrj.com. The web >site for the Suprynowicz column is at http://www.nguworld.com/vindex/. The >column is syndicated in the United States and Canada via Mountain Media >Syndications, P.O. Box 4422, Las Vegas Nev. 89127. From nobody at REPLAY.COM Tue Mar 31 21:33:59 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 31 Mar 1998 21:33:59 -0800 (PST) Subject: many most important point Message-ID: <199804010533.HAA17912@basement.replay.com> What are many most important point upon develop encryption software? From nobody at REPLAY.COM Tue Mar 31 21:35:04 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 31 Mar 1998 21:35:04 -0800 (PST) Subject: many most important point2 Message-ID: <199804010534.HAA18141@basement.replay.com> What are many most important point upon design block cypher algorithm? From nobody at REPLAY.COM Tue Mar 31 21:38:16 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 31 Mar 1998 21:38:16 -0800 (PST) Subject: secure design of key schedle Message-ID: <199804010538.HAA18903@basement.replay.com> Show me secure design of key schedle. From nobody at REPLAY.COM Tue Mar 31 22:05:29 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 31 Mar 1998 22:05:29 -0800 (PST) Subject: Fwd: PRESS RELEASE - Internet Security Issue Message-ID: <199804010605.IAA23463@basement.replay.com> -----Original Message----- From: Mark Hedges >Veil.net is not a strong anonymity provider, they're a trusted third party >using a slightly hacked popmail and sendmail server. They say "since we do >not even know who you are, your privacy is safely intact." This is false, >since they can access IP numbers of connection attempts. I make a point of checking the individuals and companies involved in various enterprises claiming to be the paranoid's best friend, as well as checking their links and assorted tentacles. The first thing I noticed about veil's anonymity site was that they don't seem very proud of who they are and their company's background, since they don't provide any information of that nature. Combining that fact with the fact that they seem to be giving out blatantly false information regarding the anonymity of their users, I would assume that their purpose is far from what they claim. SpookMonger From freestuff13 at juno.com Tue Mar 31 22:10:42 1998 From: freestuff13 at juno.com (freestuff13 at juno.com) Date: Tue, 31 Mar 1998 22:10:42 -0800 (PST) Subject: Hi :-) Message-ID: <199804010610.WAA29676@toad.com> INTERNET INSIDER REVEALS JEALOUSLY GUARDED SECRETS AND GIVES AWAY $1,000 OF FREE STUFF!!!! "I finally found the secrets I've been looking for. Your manual tells all and has given me the tools I need to succeed, finally a genuine Internet insider tells all! If you're doing business on the web or have ever wanted to, this is a must have. You're the best, I'm making your manual into my Internet Bible! Thanks a million!" Best Regards, (Elaine forester) Florida WOW!, What a value your program is! Just the secrets on email was worth the price alone, not to mention all the other valuable things you included. I have already put up some ads and I'm getting positive results. Tom Hatcher - Minnesota Hello Internet friend, Some of you may already have purchased some "electronic marketing course" or tried to market some product online. Maybe you even made a sizeable profit! Whatever the case may be; No matter how successful you are right now, you can profit tremendously from what we are about to tell you! FACT: ANYONE WHO HAS THE DRIVE TO SUCCEED CAN ACTUALLY MAKE A SIZABLE PROFIT ON THE INTERNET. FACT: NOT MANY PEOPLE ARE WILLING TO TAKE THE TIME TO ACTUALLY DO IT. Why would people want to pass up this extremely valuable money making opportunity? Because learning is the key to succeeding online. Marketing on the Internet requires a wealth of knowledge. To learn everything you need to know about Marketing on the Internet takes more time than any human being can spare. The small amount of Internet marketers actually making a sizable profit know this all too well. Let me explain. Right now there are over sixty million people surfing the Internet. By the year 2000, that figure is expected to more than double. With so many people using the Internet, smart "net"repreneur's are taking advantage of what this new (in terms of true commercial application) and exciting medium has to offer. The Internet presents one of the best ways to make money that has ever been introduced. On any given day you have the opportunity to reach more people than most cities have population wise. This is the reason so many businesses are scrambling to make their presence known on the Internet. CONSIDER THIS POSSIBILITY: You wake up in the morning and you put on a pot of coffee. As you sip on your cup of hot "brew" you saunter over and turn your computer on. Then, as your monitor glows from dim to bright, you find that you have inquiries from all sorts of people requesting what you have to offer. Later, after you have finished reading your inquiries, you stroll out to your mailbox. You find it is filled with letters from people from all across the world! What's even better though, is that the letters are FILLED WITH MONEY; cash, checks, and money orders. Then, after tallying up the totals, you find that you have made anywhere between $200 to $1,000 and it isn't even one o'clock in the afternoon. Think of it: NO boss, NO traffic, and NO annoying Co-workers. Wouldn't it feel great to wake up in the morning knowing you are going to be making excellent money but don't have to leave your house to do it!?! Wouldn't your life be far less complicated? The truth is, you can be one of those who become financially independent via the Internet. AND THE BEST PART IS...IT DOESN'T REQUIRE A LOT OF MONEY!! What it does require is the knowledge of how, what, and where to do it. That is where we can help. We provide you with the knowledge of how to begin earning substantial income from your computer via the "information superhighway". Now think about this: WHAT IF? We could provide YOU with an incredible Marketing Package that encompasses all the "How To" information you need to be a success on the Internet. This phenomenal package includes DETAILED Internet SECRETS (we don't hold anything back, its all here folks!!), which explains in detail how to Profit from the Internet Explosion. Whether you have a business of your own or you want to start one. It's filled with over 45 packed pages revealing the secrets about electronic marketing so many other online marketers DON'T want you to know. PLUS $1,000 WORTH OF FREE STUFF TO HELP YOU WITH MARKETING YOUR BUSINESS ON THE INTERNET!!! We thought that might interest YOU. We can remember how overwhelming the Internet seemed when we were first introduced to it. We realized the marketing and profit potential the Internet holds, but really had no idea how to pursue it. In our thirst for answers and knowledge, we purchased everything we could find that had information on the How, What, and Where. We spent thousands of dollars, but we now know what works and what doesn't. No where, in all of our searching, could we find a complete packet of information for all of our questions. That is why we decided to write this report. We have compiled every proven method and secrets that we have learned along the way into one complete, easy to understand report. Our PROVEN REPORT makes believers of skeptics! Sound too good to be true? That's what others have said. That is, until they received their reports and saw for themselves just how easy it is to make money on the net! Here are just a few of the many great comments we get back from people every week. Hi NI, I received your report and free bonuses last Saturday and wanted to congratulate you on a job well done. I read through your report "How To Profit From The Internet" and I'm very impressed. I have bought other books and manuals about Online Marketing, Direct Marketing, E-mail, Mail Order, etc. Yours is the only one that explains the subject in an easy to understand language. I finally found the secrets I've been looking for. Once again, Great Job! Sincerely, John Strand - Satisfied Customer My father has always told me, "remember, Michele, there is no free lunch in life. You get out of life what you put into it." Through trial and error and a somewhat slow frustrating start, I purchased your report and finally figured out how to start a very profitable business from my home. Your report is great, you give the average person the tools and secrets to succeed. I know my dad is very proud of me now. I can't thank you enough =) Michele B from Oregon Good Morning, I hope this finds you well. I received your program yesterday after- noon and read it cover to cover. You have put together a very valuable resource indeed. I have finally found the program that tells all! Your program has given me the tools I need to succeed. Your the best, I'm making your manual into my internet Bible!! Thanks a million! Best Regards, Elaine Forester This is a wonderful opportunity, you won't find too many people that will give away ALL of their secrets!! The majority of the rich people today have copied what someone else is or has been doing. That is what we are offering you now--a chance to copy our success!! It is very easy and WE ARE FOR REAL! Here's a little more incentive to check this out! We will send you: **** FREE $400 Professional E-mail Software **** **** FREE $200 Check by phone, fax, E-mail Software **** **** FREE $10 Calling Card **** ----PLUS---- We will send you a list of over 100 major search engines ready to surf on the Internet or to place a free link to your web page. Also, you will receive a list of 98 of the best inexpensive newspapers to advertise in (U.S. orders only). The list is complete with papers name, city, phone number, circulation and frequency (Daily or Weekly). We will also include five free BONUS reports that include these topics: � How to Protect your PC from Viruses � How to get 300+ Quality Prospect to E-mail you Weekly � Tips and Secrets to Advertising with the major Online Services � What's wrong with the World Wide Web � Tax Advantages for the Home Business Owner. You will find that these five reports by themselves are worth thousands of dollars to you. We will also give you a secret list of over 1500 of the best Web sites where you can place a FREE advertisement. This is a list we use every day to run our business and we are giving it to you! Imagine what a great offering we are giving you for FREE! And we're not through, if you order RIGHT NOW, we will give you 15 FREE "How to Reports" that you are free to market and sell on the Internet or through mail order for $15-30 each. They are 45-60 informational packed pages each. A great way to start your own Net based business! The topics are; 1) Earn Extra Dollars with a Home Based Answering Machine 2) How to Buy a Car with Bad Credit 3) How to Make Thousands of Dollars Winning Contests 4) U.S. Government Auction Sales 5) An Insider's Guide to Finding and Obtaining Grant Money 6) Home Based Business for Fun and Profit 7) How to Get a Job Fast 8) How to Make Money Without Leaving Your House 9) How to Turn the Hobby of Photography into Thousands 10) Making Money at Garage Sales, Swap Meets, and Flea Markets 11) How to Get Paid for Watching TV 12) Getting Your Start in Theater, Television, and Movies 13) Wills or Trusts? The Case for Living Trusts 14) How To Find Work with the Federal Government 15) How to Write Almost Anything and Get Paid for it! 50,000 EMAIL ADDRESSES FOR FREE That's right, we will give you our BEST private list of 50,000 email addresses. This list of addresses has been put through our remove and undeliverable lists so that it is fresh and responsive. We are constantly adding and taking addresses out of it. It is absolutely the best 50,000 email addresses you will ever get your hands on, BAR NONE! (please note: we are only giving this bonus to the first 50 people, so Don't Wait!!!) Are we nuts? No, it just shows how confident we are that you'll be delighted with the information you'll have...just like the others who are already using the information and making money. You will be surprised how quickly you can be making money on the Internet! So you are probably thinking to yourself, this is AWESOME, but how much? $249.95, $199.95 maybe even $99.95? You may have seen other companies marketing "How To" information on the Internet and charging these prices. People are actually buying these packages at these prices. Why? People want to know how to market a product or service the "Right" way on the Internet. "How to Profit from the Internet" could easily sell for any of the above prices. However, we feel that we would rather help those who may not have the ability to pay such a price in order to be successful. That is why we are offering "How to Profit from the Internet" for the unbelievable low price of $39.95. That's right, that was not a typo...$39.95, and all the BONUSES worth over $1,000 are FREE!!!! Still skeptical??? Lets put that to rest right now. We will make this completely risk free for you. If you are not 100% satisfied with the information you receive, and believe that you cannot use it to start a successful business or increase your current business profits, return it within 10 days and we will refund your money. No questions asked!! We have sold this package at much higher prices in the recent past and will be forced to raise my prices in the very near future. One of the things you will learn in my manual is to constantly test your market. I am currently in the price testing phase of this marketing campaign. On March 31st, 1998 we will be raising the price of this package back up to $79.95 and eventually up to $129.95 to test the upscale market. If you act quickly, you have the opportunity to get these materials today for the unbelievable low price of $39.95. So, if you are seriously interested in learning how to acquire wealth by being online, ACT NOW!! This won't last for long! Print out this form and mail it to the address below, with your $39.95 cash, check, money order or credit card information to: Natural Instincts 4676 Commercial St. SE Suite 201 Salem, Oregon 97302 Thank you =) ****Please print out the order form and mail it along with your payment**** ***************************************************************************************** ORDER FORM ***************************************************************************************** NAME______________________________________________________ ADDRESS___________________________________________________ CITY_______________________ STATE__________ ZIP__________ Website Address____________________________________________ Deliver "How to Profit from the Internet" to the following email address: E-MAIL ADDRESS____________________________________________ (please note, all orders must include an email address incase we encounter a problem with processing. The 50,000 email addresses will be sent to you by email) Area code and Phone number: Day time __________________ Evening: ________________________ [ ] If you prefer to have the report on disk, please check here. Please include an additional $3.00 for shipping and handling, thank you. (If you reside outside the United States, please include $2.00 extra) Please check one of the following: [ ] I'm ordering within 3 days, please send my FREE software, $10.00 calling card, 15 How to Reports, "How To Profit From The Internet" and FREE BONUSES including 50,000 email addresses for the unbelievably low price of $39.95 today. [ ] I'm not ordering within the first 3 days of receiving this letter, so I agree to pay $39.95 for "How to Profit from the Internet" by itself, less the bonus package. [Internal code 138316] This code must be on order form to be processed!!! Payment Method: [ ] Check [ ] Cash [ ] Money Order [ ] Credit Card, please make sure to include the mailing address above! [ ] Visa [ ] MasterCard Name of Credit Card: _____________________________ Name as it appears on Card: _________________________________ Card Number: __________________________________ Expiration Date: _____ / _____ Signature of Card Holder: _________________________. ************************************************************************************ "In mail-order work, anyone with imagination, determination, and a willingness to study and experiment may have very little difficulty getting started. A number of the most successful one-man operations obtain an income as high as $40,000 to $100,000 a year." - U.S. Department of Commerce ************************************************************************************ THE MARKET IS HERE - TODAY! TAKE ADVANTAGE OF IT!!!!! After you receive your report, I'll answer any questions time permits via email. I'm looking forward to helping you succeed! From alt1 at snowhill.com Tue Mar 31 22:25:12 1998 From: alt1 at snowhill.com (Al Thompson) Date: Wed, 1 Apr 1998 14:25:12 +0800 Subject: Reno and Freeh talking about Crypto and "Terrorism" Message-ID: <199804010619.AAA02675@frost.snowhill.com> At 09:45 PM 3/31/98 -0500, Frederick Burroughs wrote: >Obviously the Justice Dept. requires a few big busts involving crypto. >The case should be one in which the perpetrators attempt to cover their >misdeeds behind strong crypto. An informant will be needed to allow >"plausible deniability". That is, Justice will say, "If not for the >informant, we would have never been able to access the encrypted >evidence. We can't depend on informants, we need better access." The >crime should resonate abhorrent with the public, child prostitution >ring, illegal dumping of hazardous waste, securities fraud against >retirees, something that will generate a lot of letters to Congress. In >the light of these pending realities, Congress will be all too willing >to give out keys to the backdoor. Don't forget the more obvious: an "impending terrorist attack by crazed gun owners who are outraged by reasonable restrictions on firearms."