From jya at pipeline.com Fri May 1 07:07:46 1998 From: jya at pipeline.com (John Young) Date: Fri, 1 May 1998 07:07:46 -0700 (PDT) Subject: Ajtai Lattice Patent Message-ID: <199805011407.KAA02703@dewdrop2.mindspring.com> 30 April 1998, Micropatent: Cryptosystem employing worst-case difficult-to solve lattice problem (Assignee -- International Business Machines Corporation) Abstract: A cryptosystem and cryptographic method are provided for performing tasks such as encoding/decoding, signing messages, and verifying identity. The system and method employ a problem which is difficult to solve in the worst case. Because of the worst-case nature of the problem employed, a system and method according to the invention has advantageous level of security, In a class of preferred embodiments, the difficult problem is one of the recognized difficult problems associated with the mathematical theory of lattices. These problems include finding short vectors and sets of basis vectors from a lattice. Cryptographic protocols are performed, using these problems. Ex Claim Text: A cryptographic communications system A comprising: a communications channel; means for generating a public key and a corresponding private key based on an instance of a problem, the problem being difficult to solve in the worst case, the instance of the problem being difficult to solve, commensurate with the difficulty of the worst-case solution of the problem; and means for performing a cryptographic communication protocol, employing the public and private keys generated by the means for generating, with another cryptographic communications system B over the communications channel. Patent Number: 5737425 Issue Date: 1998 04 07 Inventor(s): Ajtai, Miklos If you would like to purchase a copy of this patent, please call MicroPatent at 800-648-6787. From corvuscorvax at hotmail.com Fri May 1 08:34:52 1998 From: corvuscorvax at hotmail.com (Corvus Corvax) Date: Fri, 1 May 1998 08:34:52 -0700 (PDT) Subject: Bad, bad, bill Message-ID: <19980501153418.25294.qmail@hotmail.com> NYT this morning reports the that the Digital Millenium Copyright Act was adopted by the Senate Judiciary Committee: "WASHINGTON - The Senate Judiciary Committee on Thursday adopted the Digital Millennium Copyright Act, which takes a new step toward protecting creative content in cyberspace by outlawing the equipment used to commit a copyright infringement, not just the act or intent of illegally copying material. ... Most visibly absent was any exemption for devices used in encryption research, an issue Senate leaders said they hope to work out before the bill goes to the floor. " There's been a good deal of discussion of this issue around here, to be sure. But I think maybe it bears repeating that even with some kind of narrow exemption for "encryption research", this bill is conveniently poised to be used not only against Evil Copyright Infringers, but also against the kind of troublemakers that expose, for instance, the deliberate weakening of GSM authentication. Gawd. What bullshit. 571830573294323629934765012348436263285853260687657402192238 Corvus Corvax 324908584730535672342307543875016719214012473014020239437239 ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From billp at nmol.com Fri May 1 09:26:02 1998 From: billp at nmol.com (bill payne) Date: Fri, 1 May 1998 09:26:02 -0700 (PDT) Subject: US legal system Message-ID: <3549F6B2.542F@nmol.com> Friday 5/1/98 10:02 AM Yaman Akdeniz The US court system has largely deteriorated to become part of the US Federal bureaucracy [aka Big Brother ... or probably more accurate, the Great Satan http://www.aci.net/kalliste/speccoll.htm and http://caq.com/CAQ/caq63/caq63madsen.html]. 1 Judges and court clerks try to do what they want whether it conflicts with law or not. 2 Lawyers and the US court system attempt to make it appear that there IS NO LEGAL REMEDY POSSIBLE without hiring a lawyer. And the client will most likely lose both money and the case. Morales and I [http://jya.com/whpfiles.htm] are trying to change 1 and 2. Later bill Wednesday 4/1/98 11:02 AM Certified Return receipt requested Proctor Hug Jr Chief Judge, Ninth Circuit 50 West Liberty Street Reno, NV 89501-1948 (702) 784-5631 784-5166 fax Dear judge Hug: Purposes of this letter-affidavit are to file criminal complaint affidavits against 1 judge Marilyn Hall Patel for not properly processing a criminal violation of the Privacy Act, 2 former Ninth Circuit chief judge J Clifford Wallace for not properly processing criminal complaint affidavits for a felony perjury violation by Sandia National Laboratories lawyer Gregory Cone, b judge Fern Smith for not properly processing a felony perjury violation by Sandia National Laboratories lawyer Gregory Cone. c Albuquerque FBI special agent in charge Thomas Kneir for sending FBI agents Kohl and Schum to my home in an attempt to intimidate me from exercising my civil rights. d Margret D. Thomas, Judicial Assistant to the Honorable Marilyn Hall Patel, for not forwarding a valid criminal complaint affidavit regarding a criminal violation of the Privacy Act to Patel. Brief history would be valuable for your understanding of this matter. Sandia has long been involved with the security of America's nuclear arsenal. As they announce on their website: "We are funded primarily by the U.S. Department of Energy to design all the non-nuclear opponents of the nation's nuclear weapons" http://www.sandia.gov/">http://www.sandia.gov/). This includes the cryptographic locks used to secure the nukes. NSA supplies the algorithms and implementation guidelines to Sandia. http://www.aci.net/kalliste/nukearse.htm In about 1982 I became project leader of the Missile Secure Cryptographic Unit [MSCU]. The MSCU was funded by the National Security Agency [NSA]. As a result of my about 4 year work with NSA, I was given access to its cryptographic algorithms by one document and many electronic schematics. I wrote a book ISBN: 0125475705 Title: Embedded Controller Forth For The 8051 Family Author: Payne Cover: Hardback/Cloth Imprint: Academic Press Published: September 1990 http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 about the software technology we used for the MSCU. In 1986 I transferred to build the data authenticator for the Department of Energy's Deployable Seismic Verification System [DSVS]for the Comprehensive Test Ban Treaty [CTBT]. NSA liaison for the DSVS/CTBT project offered information to me that NSA regarded former president Reagan as one of the US's foremost traitors for the reason First, U.S. President Ronald Reagan informed the world on national television that the United States was reading Libyan communications. This admission was part of a speech justifying the retaliatory bombing of Libya for its alleged involvement in the La Belle discotheque bombing in Berlin's Schoeneberg district, where two U.S. soldiers and a Turkish woman were killed, and 200 others injured. Reagan wasn't talking about American monitoring of Libyan news broadcasts. Rather, his "direct, precise, and undeniable proof" referred to secret (encrypted) diplomatic communication between Tripoli and the Libyan embassy in East Berlin. http://www.aci.net/kalliste/speccoll.htm which is further explained at http://caq.com/CAQ/caq63/caq63madsen.html It may be the greatest intelligence scam of the century: For decades, the US has routinely intercepted and deciphered top secret encrypted messages of 120 countries. In early 1992 a Sandia labs director decided that he and his subordinates were going to enter the data authentication business. The director transferred me to break electronic locks for the Federal Bureau of Investigation. This work was funded by the FBI/Engineering Research Facility [FBI/ERF], Quantico, VA. I ordered about $200,000 of the FBI/ERF's money buying two copies of electronic locks. One lock I ordered was the Hirsch Scramblepad electronic lock. In about 1991 I was following progress of lawsuits in the district of Northern California, The first two cases to directly address the issue of intermediate copying both originated in California's Northern District Court. They are Atari v. Nintendo and Sega v. Accolade. In both cases, the district court found that intermediate copying was NOT fair use. [The New Use of Fair Use: Accessing Copyrighted Programs Through Reverse Engineering, Stephen B. Maebius, Journal of the Patent and Trademark Office Society, June 1993, 75, n6, p433] Judge Fern Smith presided in both cases. Reason I was following Atari v Nintendo was that I my Forth book I have two chapters on reverse engineering software. One chapter contains a computer program which copied a ROM BIOS to diskette. Smith's decisions made my intermediate copying program illegal. In a strong opinion she [Fern Smith] wrote in March 1991, when granting Nintendo's request for a preliminary injunction against Atari, she lambasted Atari's lawyers for thievery. I was given the job assignment to copy the ROMs of Hirsch's 8051-based Scramblepad electronic lock to reverse engineer them to hopefully allow me to modify the locks for allow surreptitious entry. I refused to engage in illegal activity for the FBI. The termination letter seen at http://jya.com/whpfiles.htm states This is to advise you that effective July 27, 1992, you will be terminated from Sandia National Laboratories. This action is the results of your flagrant attack on a valued Sandia customer and repeated insensitivity to security/classification requirement. These acts violate Sandia National Laboratories Code of Conduct, specifically the Personal Conduct section,, and the Safeguarding Information and Records Section. ... for my whistleblowing SAND report on the National Security Agency's deficient work and refusing to mark classified on a report I and Danny Drummond wrote on how to fake Wiegand Wire access entry credentials for the FBI. Both I and my EEOC complaint officer Ray Armenta were never able to determine exactly why I was fired. However March 22, 1997 I received copies of the enclosed 1 April 15, 1994 letter to EEOC director Charles Burtner from Sandia Diversity Leadership director Michael G. Robles. 2 July 27, 1997 Termination of Employment memorandum containing my signature. 3 DISCIPLINARY REVIEW COMMITTEE MINUTES, July 16, 1992. 4 DISCIPLINARY REVIEW COMMITTEE MINUTES, July 6, 1989. 5 September 6, 1995 letter from EEOC Investigator Larry J. Trujillo to Richard Gallegos. from Sandian Richard Gallegos. Sandia lawyer Harold Folley previously stated that no documents existed. The Privacy Act states (d) Access to Records.--Each agency that maintains a system of records shall-- (1) upon request by any individual to gain access to his record or to any information pertaining to him which is contained in the system, permit him and upon his request, a person of his own choosing to accompany him, to review the record and have a copy made of all or any portion thereof in a form comprehensible to him, except that the agency may require the individual to furnish a written statement authorizing discussion of that individual's record in the accompanying person's presence; The Sandia Disciplinary Review Committee NEVER interviewed me to check the veracity of their statements. The Privacy Act states (2) permit the individual to request amendment of a record pertaining to him and-- The statements in the SDRC are incorrect. I followed all Sandia procedures known to me. I did nothing wrong. I had no opportunity to defend myself. My rights guaranteed under the Constitution, Bill of Rights, Article XIV. Section 1. All persons born or naturalized in the United States, and subject to the jurisdiction thereof, are citizens of the United States and of the State wherein they reside. No State shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any State deprive any person of life, liberty, or property, without due process of law; nor deny to any person within its jurisdiction the equal protection of the laws. have been violated. C My permission was never asked to release these records to Gallegos. As you may realize about the Privacy Act (b) Conditions of Disclosure.--No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains ... The Privacy Act allows imposition of criminal penalties for those like members of the SDRC, Robles, Burtner, and Trujillo who (i)(1) Criminal Penalties.--Any officer or employee of an agency, who by virtue of his employment or official position, has possession of, or access to, agency records which contain individually identifiable information the disclosure of which is prohibited by this section or by rules or regulations established thereunder, and who knowing that disclosure of the specific material is so prohibited, willfully discloses the material in any manner to any person or agency not entitled to receive it, shall be guilty of a misdemeanor and fined not more than $5,000. (2) Any officer or employee of any agency who willfully maintains a system of records without meeting the notice requirements of subsection (e)(4) of this section shall be guilty of a misdemeanor and fined not more than $5,000. I forward criminal complaint affidavits on the above individuals to selected magistrate judge Marilyn Hall Patel. Patel ignored my complaints. I return to the subject of breaking electronic locks for the FBI/ERF. Smith's two decisions were overturned on appeal. However, both cases have been overruled on appeal. In the ground-breaking Atari decision, the Federal Circuit held that intermediate copying was a fair use. The Sega decision, which was appealed to the Ninth Circuit Court of Appeals, similarly overruled the district court and held that intermediate copying may be fair use. Sandia patents and trademark lawyer Gregory A. Cone in the enclosed affidavit for a ADEA lawsuit I filed in the District of New Mexico stated AFFIDAVIT OF GREGORY A. CONE Gregory A. Cone, being duly sworn, deposes and states: 1. I am employed by Sandia Corporation. I am an attorney admitted to practice law in the State of California and before the U. S. Patent and Trademark Office and concentrate on legal issues related to patent and copyright law. In that capacity, I am familiar with activities at the Sandia National Laboratories ("Sandia") as they related to what is sometimes referred to as "reverse engineering ." ... [I]t is the general view at Sandia that disassembly of "object code" under such circumstances constitutes a "fair use" of copyrighted software under 17 U.S.C. article 107 and is thus permissible. Sandia bases its view on Sega Enterprises v. Accolade, Inc. 977 F.2d 1510, 24 U.S.P. Q. 2d 1561 (9th Cir. 1992), amended, 1993 U. S. App. LEXIS 78, and Atari Games Corp v. Nintendo of America, Inc, 975 F.2d 832 (Fed. Cir. 1992). ... FURTHER, Affidavit sayeth naught. (signed) GREGORY A. CONE SUBSCRIBED, SWORN TO and ACKNOWLEDGED before me on this 12th day of August, 1993, by Gregory A. Cone." (signed) Mary A. Resnick Notary Public My Commission Expires: 2-7-94 Cone has the two citations reversed. The U. S. Patent Quarterly references the Atari v Nintendo lawsuit 1510 should be corrected to 1015. Cone issued the above affidavit to District of New Mexico federal court in attempt to show that I had no legal reason to refuse to reverse engineer the Hirsch Scramblepad electronic lock. I was covered under 10 C.F.R. 708 - DOE CONTRACTOR EMPLOYEE PROTECTION PROGRAM for my refusal to reverse engineer the Hirsch Scramblepad code. 708.1 Purpose, This part establishes procedures for timely and effective processing of complaints by employees of contractors performing work at sites owned or leased by the Department of Energy (DOE), concerning alleged discriminatory actions taken by their employers in retaliation for the disclosure of information relative to health and safety, mismanagement, and other matters as provided in 708.5(a), for participation in proceeding before Congress, or for the refusal to engage in illegal or dangerous activities." ... Cone's affidavit attempts to create the appearance that reverse engineering was legal before July 27, 1992, the date of my firing. Title 18, Chapter 79, Article 1623 felony perjury. Article 1623 - False declarations before grand jury or court (a) Whoever under oath (or in any declaration, certificate, verification, or statement under penalty of perjury as permitted under section 1746 of title 28, United States Code) in any proceeding before or ancillary to any court or grand jury of the United States knowingly make any false material declaration or makes or uses any other information, including any book, paper, document, record, recording, or other material, knowing the same to contain any false material declaration, shall be fined not more than $10,000 or imprisoned not more than five years, or both. Decision of the Atari Games Corp. v. Nintendo of America appeal cited at page 1016 from 24 USPQ 2d was Decided SEPTEMBER 10, 1992. I was fired JULY 27, 1992 so my work assignment was illegal at the time I refused. Therefore, Cone committed felony perjury IN WRITING filed with New Mexico District Federal Court. Chronological review of criminal complaint affidavits would be valuable before I present the current criminal complaint affidavits. 1 Monday March 11, 1996 10:05 I wrote judge Fern Smith a certified return receipt requested letter to ask her to either arrange or personally indict Sandia lawyer Cone for felony perjury. Smith did not respond. 2 Friday May 31, 1996 08:58 I write the criminal complaint affidavit for the arrest of Sandia lawyer Cone and appoint judge Fern Smith as magistrate. 3 Thursday June 13 on orders of Smith and Albuquerque FBI special agent in charge Thomas Kneir FBI agents Kohl and Schum visited my home at 17:08 to investigate me for sending letters referenced in 1 and 2 to Smith. 4 In response to 3 on Tuesday July 9, 1996 06:52 I filed criminal complaint affidavit against Cone, again, for felony perjury with J. Clifford Wallace, chief judge, Ninth Circuit Court of Appeals. Smith for � 4. Misprision of felony Whoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some judge or other person in civil or military authority under the United States, shall be fined under this title or imprisoned not more than three years, or both. for Smith's failure to properly process Cone's felony perjury and � 241. Conspiracy against rights If two or more persons conspire to injure, oppress, threaten, or intimidate any person in any State, Territory, or District in the free exercise or enjoyment of any right or privilege secured to him by the Constitution or laws of the United States, or because of his having so exercised the same; ... for sending, with Knier, FBI agents Kohl and Schum to my home in an attempt to intimidate me. Knier for Conspiracy against rights for his complicity with Smith. 5 Monday July 15, 1996 06:23 I write Wallace again inquiring why he has not responded. 6 August 15, 1996 Thursday Ms. Corina Orozco, Deputy Clerk, Ninth Circuit Court of Appeals writes me to tell me In the future, all correspondence should be addressed to the Clerk of the Court. Do not address any correspondence to any one specific judge of this court. 7 September 12, 1996 06:20 I inform Orozco by letter that she is obstructing justice. I ask Orozco to desist. 8 July 25, 1996 Senior Case Expeditor [sic], Gwen Baptiste from the Office of the Clerk, United States Court of Appeals for The Ninth Circuit, writes Re: Complaint of Judicial Misconduct We have received your complaint of judicial misconduct. Pursuant to the Rules of the Judicial Council of the Ninth Circuit Governing Complaints of Judicial Misconduct or Disability, you complaint is being returned to you for compliance with the above rules. A copy of these rules is enclosed. To understand the purpose of the procedure and who may be complaint about please refer to Rules 1 and 2. 9 Wednesday September 18, 1996 11:05 by certified, return receipt requested mail I write Wallace again told tell him Lawyer Wallace, I did not intend to file or did I file a complaint of judicial misconduct. Lawyer Wallace, I filed a criminal complaint affidavit as I have a right to as a citizen of the United States of America when the criminal acts are committed by government personnel, their contractors, Department of Justice and judicial personnel. 10 Wednesday November 27, 1996 09:18 I wrote certified, return receipt requested letter to inform Wallace Purpose of this letter is to inform you of consequences of your failure to perform your duties as required by law as magistrate judge. You are committing felony violations of law. and If I have not complied with all applicable rules, then I ask that you inform me of any non-compliance so that I can correct my criminal complaints and re-submit them. I satisfied the requirement of the Constitution and Rules 3 and 4, and issued written and sworn complaints that set forth the essential facts constituting the offenses charged against Smith, Kneir, and Cone. I also showed facts showing that the offenses were committed by Smith, Kneir and Cone and these individuals committed them. So I ask that you do your job and proceed with supervision of the arrest and prosecution of Smith, Kneir, and Cone for title 18 felony violations of law. 11 Monday March 24, 1997 17:57 I write a certified - return receipt requested letter to Marilyn Hall Patel, District Judge; California, Northern to inform her she has been selected as magistrate to process the criminal complaint affidavit against Sandia Diversity Director Michael G. Robles for sending the enclosed SDRC report to Burtner of EEOC. Robles did this without my written permission and without checking the accuracy of the information. The information contained in the SDRC report is false and defaming. 12 Monday April 21, 1997 13:44 I write Patel a certified - return receipt requested letter containing a criminal complaint affidavit against Charles L Burtner, Director, U.S. Equal Employment Opportunity Commission [EEOC] Larry J. Trujillo, Investigator, Phoenix District Office for sending the false and libelous enclosed documents to Richard Gallegos in Albuquerque without my written consent. 13 Thursday May 8, 1997 06:30 I write a certified - return receipt requested to Patel containing Purpose of this letter is to file a criminal complaint affidavit against Sandia National Laboratories [Sandia] Disciplinary Review Committee members and attendees G. H. Libman, R.A. Polocasz, D. B. Davis, M. E. Courtney, W. R. Geer, C. A. Searls, J. D. Giachino, R. L. Ewing, A. M. Torneby, R. B. Craner, C. W. Childers, E. Dunckel, D. S. Miyoshi, J. J McAuliffe, J. D. Martin, and R. C. Bonner for violation of the criminal penalties section of the Privacy Act, 5 USC 552a(i)(2) and Title 18 felony violations of Civil Rights, Section 241, Conspiracy against right to citizens. for their roles in maintaining an illegal system of records. Sandia refused to acknowledge existence of the enclosed SDRC report and for denying my rights guaranteed under the Constitution. I was never interviewed by the SDRC committee or had any chance to defend my self against the false and defaming claims of the SDRC. 14 Friday June 13, 1997 12:41 I write a certified, return receipt requested to Wallace containing a criminal complaint affidavit against Margret D. Thomas, Judicial Assistant to the Honorable Marilyn Hall Patel for violating � 1512. Tampering with a witness, victim, or an informant ... (C) prevent the communication by any person to a law enforcement officer or judge of the United States of information relating to the commission or possible commission of a Federal offense ... (3) hinder, delay, or prevent the communication to a law enforcement officer or judge of the United States of information relating to the commission or possible commission of a Federal offense ... shall be fined under this title or imprisoned not more than ten years, or both. for writing on May 9, 1997 Dear Mr. Payne: We are in receipt of your recent letters. Please be advised that we do not issue warrants on criminal proceeding absent an indictment, information or complaint initiated by the United States Attorney. For this reason, and by copy of this letter, we are referring this matter to that office. Any future correspondence concerning these events should be sent to the United States Attorney and not to judge Patel. Thank you. Very truly yours, MARGARET D. THOMAS Judicial Assistant to the Honorable Marilyn Hall Patel cc: Joel Levin Criminal Section Assistant United States Attorney Judge Hug, Rule 3 of the Federal Rules of Criminal Procedure, entitled the Complaint provides: The complaint is a written statement of the essential facts constituting the offense charged. It shall be made upon oath before a magistrate. As you may be aware, An individual may "make a written complaint on oath before an examining and committing magistrate, and obtain a warrant of arrest." This is in conformity with the Federal Constitution, and "consonant with the principles of natural justice and personal liberty found in the common law." [United States v Kilpatrick (1883, DC NC) 16G 765, 769] You may also be aware, A complaint though quite general in terms is valid if it sufficiently apprises the defendant of the nature of the offense with which he is charged. [United States v Wood (1927, DC Tex) 26F2d 908, 910, affd (CA5 Tex) 26 F2d 912.] And for your edification, The commission of a crime must be shown by facts positively stated. The oath or affirmation required is of facts and not opinions or conclusion. [United States ex rel. King v Gokey (1929, DC NY) 32 F2d 93, 794] The complaint must be accompanied by an oath. [Re Rules of Court (1877, CC Ga) 3 Woods 502, F Cas No 2126] A complaint must be sworn to before a commissioner or other officer empowered to commit persons charged with offenses against the United States. [United States v Bierley ( 1971, WD Pa) 331 F Supp 1182] Such office is now called a magistrate. A complaint is ordinarily made by an investigating officer or agent, and where private citizens seek warrants of arrest, the practice recommended by the Judicial Conference of the United States is to refer the complaint to the United States Attorney. However, further reference to him is rendered futile where a mandamus proceeding is brought to compel him to prosecute and he opposes the proceeding. [Pugach v Klein (1961, SD NY) 193 F Supp 630, citing Manual for United States Commissioners 5 (1948)] Any attempt to bring criminal complaints to government authorities would, of course, be futile. I am a citizen of the United States and, judge Hug, you are the assigned magistrate. In order to satisfy the requirement of the Constitution and Rules 3 and 4, a written and sworn complaint should set forth the essential facts constituting the offense charged and also facts showing that the offense was committed and that the defendant committed it. And, As to the requirement that the complaint be made on personal knowledge of the complainant, it is enough for the issuance of a warrant that a complainant shows it to be on the knowledge of the complainant. [Giordenello v United States (1958) 357 US 480, 2 L Ed. 2d 1503, 78 S Ct 1245, rev. (Ca5 Tx) 241 F2d 575, 579 in accord Rice v Ames (1901) 180 US 371, 45 L Ed 577, 21 S ct 406, and United States v Walker, (1952, CA2 NY) 197 F 2d 287, 289, cert den 344 US 877, 97 L Ed 679, 73 S Ct 172] So as to keep contiguous the requirements of the law ad the criminal complaint affidavit, I will include these complaints in this letter to you. CRIMINAL COMPLAINT AFFIDAVIT: J Clifford Wallace Essential material facts are: 1 Tuesday July 9, 1996 06:52 Payne files criminal complaint affidavit on Sandia lawyer Cone for felony perjury with J Clifford Wallace, chief judge, Ninth Circuit Court of Appeals and judge Fern Smith for Misprision of felony for failure to prosecute Cone and Conspiracy against rights for sending, with FBI Albuquerque agent-in-charge Knier, FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. 2 Repeated attempts by certified return receipt requested mail to urge Wallace to do his job enumerated to 5-10 and 14 above in this letter go unanswered. Count 1 Wallace made no attempt to bring lawyer Cone to justice despite possessing WRITTEN evidence of criminal activity. Therefore, Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process criminal complaint affidavit. Count 2 Wallace made no attempt to bring judge Fern Smith to justice despite possessing WRITTEN evidence of misprision of felony for not properly processing the criminal complaint affidavit against lawyer Cone and � 1512. Tampering with a witness, victim, or an informant for sending FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. Therefore , Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit. Count 3 Wallace made no attempt to bring FBI agent-in-charge to justice for violation of � 1512. Tampering with a witness, victim, or an informant for sending FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit. Count 4 Wallace made no attempt to bring MARGARET D. THOMAS to justice for violation of � 1512. Tampering with a witness, victim, or an informant ... for writing Thomas' May 9, 1997 to Payne. Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit. VERIFICATION Under penalty of perjury as provided by law, the undersigned certifies pursuant to 28 USC section 1746 that material factual statements set forth in this criminal complaint are true and correct, except as to any matters therein stated to be information and belief of such matters the undersigned certifies as aforesaid that the undersigned verily believes the same to be true. Date William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 505-292-7037 CRIMINAL COMPLAINT AFFIDAVIT: Marilyn Hall Patel Essential material facts are: 1 Patel failed to respond to certified return receipt requested criminal complaint affidavits specified in 11 - 13 in this letter. Count 1 Patel made did not properly process criminal complaint affidavits despite being in possession of documents showing criminal violations of the Privacy Act and violation of civil rights. Therefore, Patel is charged with Title 18 � 4. Misprision of felony for Patel's failure to properly process criminal complaint affidavits. VERIFICATION Under penalty of perjury as provided by law, the undersigned certifies pursuant to 28 USC section 1746 that material factual statements set forth in this criminal complaint are true and correct, except as to any matters therein stated to be information and belief of such matters the undersigned certifies as aforesaid that the undersigned verily believes the same to be true. Date William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 505-292-7037 Judge Hug, I have been extremely patient with judges and clerks of the district of Northern California and Ninth Circuit. Criminal compliant affidavits were filed between March 11, 1996 and June 13, 1997. Nothing has happened as of April 1, 1998. I ask that you 1 issue warrants of arrest or 2 inform me why you cannot proceed to do what I request within 60 calendar days. Smith's case is particularly egregious. Smith and Albuquerque FBI agent in charge James K. Weber, who replaced Kneir, sent US Marshals Lester and Lopez to my home on January 24, 1997 in a second attempt to intimidate me. Anotin Scalia was appointed magistrate to process criminal complaint affidavits against Smith and others for the second intimidation attempt. Sincerely, William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 VERIFICATION Under penalty of perjury as provided by law, the undersigned certifies pursuant to 28 USC section 1746 that material factual statements set forth in this criminal complaint are true and correct, except as to any matters therein stated to be information and belief of such matters the undersigned certifies as aforesaid that the undersigned verily believes the same to be true. Date William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 505-292-7037 Enclosures Privacy Act criminal violation documents, 11 pages AFFIDAVIT OF GREGORY A. CONE, 4 pages May 9, 1997 letter from MARGARET D. THOMAS, 1 page 13 Friday 5/1/98 9:48 AM Certified Return receipt requested Cathy A Catterson, Clerk Ninth Circuit Court of Appeals 121 Spear Street POB 193939 San Francisco, CA 94119-9800 415 744 9800 Dear Clerk Catterson: Purpose of this letter is to discover the REASON the criminal complaint addressed to Ninth circuit judge Proctor Hug Jr dated Wednesday 4/1/98 11:02 AM was returned to me WITHOUT COVER LETTER. I attach a copy of the envelope the above material was enclosed. Return address is CLERK, U.S. COURT OF APPEALS P.O. BOX 547 SAN FRANCISCO, CA 94101-0547 OFFICIAL BUSINESS PENALTY FOR PRIVATE USE, 300 Postmark is SAN FRANCISCO, CALIF APR 24 98 U.S. POSTAGE $2.62 METER 504753. The envelope is hand-addressed and stamped CONFIDENTIAL. Since no cover letter was enclosed to explain the return of what I believe is both a valid and lawful criminal complaint affidavit supported by WRITTEN EVIDENCE, some even in FILED court documents, I feel we must investigate to discover the REASON. All of the accused are federal employees or contractor employees. Possibility exists that return of the enclosed criminal complaint affidavit without cover letter stating the REASON may indicate violation of Title 18 � 1512. Tampering with a witness, victim, or an informant [(b)] Whoever knowingly ... corruptly persuades another person, or attempts to do so, or engages in misleading conduct toward another person, with intent to - ... (2) cause or induce any person to - (A) withhold testimony, or withhold a record, document, or other object, from an official proceeding; ... (3) hinder, delay, or prevent the communication to a law enforcement officer or judge of the United States of information relating to the commission or possible commission of a Federal offense ... shall be fined under this title or imprisoned not more than ten years, or both. (c) Whoever intentionally harasses another person and thereby hinders, delays, prevents, or dissuades any person from - ... (2) reporting to a law enforcement officer or judge of the United States the commission or possible commission of a Federal offense ... or attempts to do so, shall be fined under this title or imprisoned not more than one year, or both. Clerk Catterson, you may be aware that under � 1512 (d) In a prosecution for an offense under this section, it is an affirmative defense, as to which the defendant has the burden of proof by a preponderance of the evidence, that the conduct consisted solely of lawful conduct ... Therefore, I ask that you investigate to discover WHO returned the enclosed criminal complaint affidavit to me. And report the REASON the criminal complaint affidavit was returned to me. I ask that you respond within 30 days. Sincerely, William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 2 From jya at pipeline.com Fri May 1 10:40:35 1998 From: jya at pipeline.com (John Young) Date: Fri, 1 May 1998 10:40:35 -0700 (PDT) Subject: Reno reports "suspicion" in industry crypto-negotiations In-Reply-To: <199805011541.RAA23552@basement.replay.com> Message-ID: <199805011740.NAA22381@dewdrop2.mindspring.com> Daley's statement on crypto export has been pulled from the DoC Public Affairs Web site, as noted in Peter Junger's latest filing, in which the vanished statement is cited as support for lifting suspicious back-scratch dealings like ACP's. http://jya.com/pdj9.htm What's the latest on publicizing the several ACP drafts floating around "industry and agencies" for comment on what TLAs and ACP are rigging in the public interest. Weren't some of these stalking drafts nearly liberated recently? Or were they only floated for trusted eyes only? Congressional hearings are due shortly to air the stench. As Entrust said in defense of its patenting what was thought to be in the public interest: "Encryption is no longer an academic pursuit, now it's very big business." RSA, NAI, Entrust, ACP, TLA, take your pick, not that there's much diff where "national economic security" interest surpasses the public. From rah at shipwright.com Fri May 1 11:49:10 1998 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 1 May 1998 11:49:10 -0700 (PDT) Subject: db$: The Wright Brothers vs. Chixalub Message-ID: --- begin forwarded text X-Sender: rah at pop.sneaker.net (Unverified) Mime-Version: 1.0 Date: Thu, 30 Apr 1998 17:50:18 -0400 To: e$@vmeng.com From: Robert Hettinga Subject: db$: The Wright Brothers vs. Chixalub Sender: Precedence: Bulk List-Subscribe: --- begin forwarded text X-Sender: rah at pop.sneaker.net (Unverified) Mime-Version: 1.0 Date: Thu, 30 Apr 1998 15:26:30 -0400 To: Digital Bearer Settlement List From: Robert Hettinga Subject: db$: The Wright Brothers vs. Chixalub Sender: Precedence: Bulk List-Subscribe: X-Web-Archive: http://www.philodox.com/dbs-archive/ You might notice that the tag on this one says "db$". That's to differentiate it from my "e$" rants, which might be more general than ones like this one, which is on digital bearer settlement. I think there is lots of talk about electronic commerce and e$ these days from whole bunches of people, and, as a consequence, my interest in it has focused more onto the issue of digital bearer settlement. You'll probably be seeing more db$ tags than e$ tags on my rants going forward. All of which brings me to some obversations I've been making in public about blind signatures lately, and the excellent time I had at Ed Yeardon's Cutter Consortium "Summit" conference the past few days. Let's start with yet another aviation analogy about Digicash, shall we? :-). Remember, I like to do that. Once I compared privacy to flight, and said that, like flight, lots of people had died getting strong cryptography to work, and that privacy itself was an inherent good. The thing which actually got people to use the technology, however, was its commercial value. It wasn't the joy of flight or slipping the surly bounds of earth at Kitty Hawk that got people into the air, it was coach fare to Dayton. It was digital commerce, and thus financial cryptography, which created the most privacy. Digital Commerce is financial cryptography, financial cryptography is strong cryptography, and all that. Then there's my analogy of book-entry settlement as Boyle's law (partial pressure of gasses?) and strong crypto, particularly digital bearer settlement, as Bernoulli's law, the law describing aerodynamic lift. Essentially you can think of cryptography and bearer settlement as wings, and book entries as, well, bags of gas. :-). Thinking this way, with commerce on the internet as flight, First Virtual becomes a tethered baloon. Encrypting your First Virtual transaction makes it an aerodynamic barrage balloon. Encrypting a credit card in an SSL web-form is flying around on a Zeppelin. And, David Chaum becomes the Wright Brothers for inventing the airplane. I used to say "Or maybe Otto Lillenthal" under my breath to get a laugh, but now, I know exactly why David Chaum is the Wright Brothers. That's because Digicash *is* The Wright Flying Machine Company, or whatever the Wright's subsequent enterprise was called. It seems to me that Digicash's strategy with the blind signature is a dead ringer for the Wright Brothers' control of the airplane patent. Here's why: 1. In the beginning, nobody believed that the Wright brothers could fly, and they had to take the airplane to Paris and demonstrate it there before anyone in the US thought it was true. Digicash did the same thing. Actually, the NSA created a positively hostile environment here in the USA for cryptography, financial or otherwise, and that forced David Chaum to go to the Netherlands, where there was a more positive reception for his work. 2. Then, nobody could think about what you could do with airplanes, and the Wrights foundered for a bit.. Same thing with Chaum, Digicash, and the blind signature patent. The commercial internet didn't exist yet in 1986, and blind signatures were conceived as useful only in smartcards, which were just being experimented with. Digicash was going to be used in physical electronic wallets, and maybe in transponders at the gates of toll roads. The CAFE project was an example of this meat-space ecash strategy. It wasn't that Chaum didn't think about the internet. Far from it. He invented digital mixes, after all, which became the basis for anonymous remailers, onion routers, CROWDS, and the like. He just didn't look at blind signatures from the financial operations point of view and see digital bearer settlement, that's all. He was thinking privacy, and not financial operations, just like the Wrights were thinking flight, and not high-speed transportation. 3. The entire time they held the patent, the Wrights only really wanted to sell airplanes to governments, because they wanted to sell to a few large stable customers instead of small entities who would probably go out of business. Digicash, to this day, tries to sell to big institutions. Their now mostly internet-driven digital cash stategy is to create the financial equivalent of Alfred Nobel's dynamite cartel, where one bank in each country gets an ecash license, hopefully the largest bank possible. Mark Twain in the US was a proof of concept, if not an act of desperation on Digicash's part, but it did lead to exclusive (I bet) country-wide licences with Nomura, Deutchebank, the Swedish Post office, and others. There was talk at FC98 that Digicash received $1 million a month from Deutchebank just for the *option* on a Germany-wide license. I think they've now exercised that option. Frankly, I find this geographic, paint-by-the-nation-state approach quaint in a world of ubiquitous geodesic internetworks, but there it is, and it effectively prevents other people from doing anything innovative with blind signatures in the meantime. Monopolies on information technologies kind of work that way. Dogs and mangers come to mind, and not for the first time. 4. The Wrights, when they thought about the transportation business at all, thought about it in terms of "rides" instead of "trips". Digicash isn't really looking at the applications of their technology to anything except its original designed purpose, that is, cash. There are some leaks around the edges, of course. Nomura seems to be looking at blind signature digital bearer settlement as a real-time gross-settlement technology, with some kind of private, kiretsu-cash idea. Digicash people used to give you a shocked "how did you know that already" look when you talked to them about the painfully obvious potential use of blind signatures in the capital markets. However, I'm certain that Digicash thinks that capital market use of blind signature digital bearer settlement is a pipedream and that they'd better focus on the main chance, which is ecash. Preferrably electronic wallet-based ecash issued by a major bank. In competition with book-entry settlement, in book-entry settlement's own turf. Go figure. 5. Finally, the only innovation in the American aircraft market in the age of the Wright patent came from that famous airplane "infringer", Curtis, who didn't give a damn about patents and built airplanes anyway. Much better airplanes, in fact, which the Wrights eventually took him to court for, forcing Curtis to merge with the Wrights. Fortunately, European evolution in aviation continued apace, giving us the aviation equivalent of the Pre-Cambrian explosion, culminating in the names we all remember from World War I like Sopwith, Spad, Dornier, and, of course, Fokker. The problem is that there's no Curtis to infringe on the blind signature patent, because you can't hook up to the financial system from the internet -- land yur plane in other words -- without clear rights to use it. The banks where you move money on and off the net from would get sued. Unless they're in places like South Africa, where software patents don't matter, or Russia, where they're probably uninforceable. Places which have their own problems, not the least of which is poor internet access, poor financial network connectivity (something like Cirrus on the back end of a trustee/custodian would be, um, NYCE :-)), and, not least, poor impulse control by the local force merchants, monopolistic or otherwise. Tax havens don't even count. The very definition of a tax haven is someplace with a bandwidth and regulatory gravity well to keep it safe from any kind of market efficiency. A return to some kind of "Europe" for that hoped-for explosion of blind signature evolution could still be happening on the internet anyway. Certainly, with smart and tenacious people like Ian Goldberg designing HINDE and Ryan Lackey bashing on a reference version of it, one could certainly try to argue this, but there's no money doing this stuff right now (unless you count first-class upgrades to Anguilla or free nights in the InterIsland), much less something like the First World War to forge that innovation into a robust replacement for the book-entry economy. Which, thinking thinking of robustness, brings me to what I've been doing the last few days. Pete Loshin, former editor at Byte, former writer of various excellent how-to books on networking and one of the first surveys of internet commerce (and one of the founding members of the Digital Commerce Society of Boston, I might add, :-)), is now editor of Cutter Publications' "Corporate Internet Strategies" newsletter, which used to be edited by Ed Yourdon, of American Programmer, Y2K, and much other, fame. So, when they needed someone on a panel about electronic commerce at Cutter's "Summit" conference at the Boston Harbor Hotel's Wharf Room facility this week, someone controversial, they said, Pete said he knew exactly who to throw into the fray. It was fun, too. There, in front of a room full of senior IT managers from big companies and Famous Computer Guys, sitting on a panel on Internet Commerce, was one of Fidelity's Famous Computer Guys himself, now running their web technology department. And Pete. And Fidelity's retail web-marketing guy, and me. Fidelity has 900 billion dollars under management. 60% of their customer interaction now comes from the web. The ganglia twitch. Dropping that $100 billion 1997 internet transaction number, and saying that it was three orders of magnitude over the estimate didn't faze these guys. They had seen it happen. In addition, all of the people with websites I talked to said that they used SSL to interact with their customers. Almost all of them said that they used 128 bit encryption. The Mssrs. Fidelity faintly crowed about the fact. Digital Commerce is Financial Cryptography, so what else is new? Then, of course, I threw the whole geodesic economy, digital bearer settlement rant at them, right down to the picomoney as processor food, micromoney mitochondria bit. And, of course, they all stood up and threw their dinner rolls at me. It was great. That's because I'd been throwing my own dinner rolls, and I'd been been hinting what I was going to say all week. They even encourage you to heckle the speakers back with a liberal sprinkling of wireless mikes around the room. So every once in a while, I'd pop off with comments like intellectual property control was impossible, that watermarking only told you who the code was stolen from not who stole it. Or, why not have cash auctions for programming deliverables instead of top-down project management, Or, emergent processes for software were always going to beat "controlled" processes, Or, passing programmer certification laws in the wake of whatever Y2K thing happened would be impossible to enforce in a world of those same anonymous cash settled markets for programming talent. I even pointed them to the forum-hackers list as proof. One of my favorite gybes while I was up on the podium to the Fidelity marketing guy -- who's a nice guy but who's also fighting like crazy right now to drag Fidelity up the "quality service differentiation" ladder because Fido can't play least-cost-producer anymore in an eTrade world -- was my claim that eventually most so-called "branded" products would be reduced to graded fungible commodities, and that the more dependant a business was on information technology, the faster it would happen to them. Orthogonality is always more fun than the alternative. And you get lots of free dinner rolls. And, of course, after the digital commerce panel and lunch, Ed Yourdon wrapped it all up with his scary Y2K rant, followed by an appropriately scary bunch of panelists telling us just how scary all theis Y2K stuff really was, that Ed had gotten himself on down to Taos, complete with his own water supply, and that denial was when you lied to yourself and believed it. Or something. All of which I now believe more of, just because all these grey-haired programming aristocrats were nodding sagely about this prospect of impending doom for us all. Frankly, most of the people who've yammered at *me* about Y2K were either loons who hoped it would All Fall Down Someday Soon, or people like Vinnie, who think it's a good idea, if not fun, to know what to do if it ever does all fall down, but that praying for it wasn't going to make it so. I'd like to think I'm one of the latter. The other problem is, I've seen the end of the world coming before. Even predicted it myself on occasion. Haven't been able to reduce it to practice, yet, though. That's the reason Gibbon's in my .sig these days. So, let's get back to Digicash and the Wright Brothers. After hanging out with a whole bunch of top-down monolithic-system gurus and Y2K folks yesterday, it seems plausible. And, I'm certain there are lots of people out there who know lots about both and who hope that Y2K will be the Chixalub event that will burn off all the database-driven book-entry dinosaur systems and clear the way for a digital bearer mammalian explosion. Frankly, I think we're looking at a brushfire, if anything. The lawn will grow back, but the house won't burn, even if the water does go out for a bit. That's my story, and I'm sticking to it. Remembering, of course, the above bit about denial. But, suppose we *are* talking about the financial equivalent of that great 1970's 30-second short film epic, "Bambi vs. Godzilla", where Bambi is squashed by a giant green foot (oops, I gave away the plot), and the whole financial system goes away for a few days. Or a month. Is there any way to step in with digital bearer settlement as a robust alternative to book-entry funds transfer? Remember the great bank strike in Ireland, where everyone just passed around nth-party endorsed checks like they were money until it was all over? Could we do something like that? Would David Chaum and company let us do that without suing someone for infringement? Could they stop us, if the courts are full of Y2K liability cases? Would the internet still be up? Could we pay our ISPs with digital bearer certificates to keep them up? How about Iridium and Teledesic, which are supposed to be up by then? Once again, ganglia twitch. However, it might be fun to game the idea a bit, just to scare the neighbors. You know, pay ya all back when the banks come up? Well, maybe not. Ed says that the banks, and particularly Wall Street, are the most prepared of any of us. That makes sense. The half life of financial software these days is measured in months. For instance, one of NeXT's biggest markets was in the financial sectors, especially trading rooms, where any prototype which worked was immediately production code. They liked NeXT, despite all its other interesting charistics, because you could do exactly that, and faster than any other development environment. Of course, if anyone's a poster child for "sell Cadillacs, drive a Chevy, sell Chevies, drive a Cadillac", it's Steve Jobs. Of course, he sold NeXTs and got Apples, however that turns out... Still, it might be worth thinking about, trying to route around the book-entry financial settlement system as a pre-disaster exercise. Wright Brothers versus Chixalub, and all that. No, I don't wanna see the movie... Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ ---------------------------------------------------------------------- Where people, networks and money come together: Consult Hyperion http://www.hyperion.co.uk/ info at hyperion.co.uk ---------------------------------------------------------------------- Full-Strength Cryptographic Solutions for Worldwide Electronic Commerce http://www.c2.net/ stronghold at c2.net ---------------------------------------------------------------------- Like e$? Help pay for it! For e$/e$pam sponsorship or donations, ---------------------------------------------------------------------- --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From tm at algebra.com Fri May 1 12:38:51 1998 From: tm at algebra.com (TruthMonger) Date: Fri, 1 May 1998 12:38:51 -0700 (PDT) Subject: Epilogue 7.3 - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <354A24B5.79FD@algebra.com> Epilogue 7.3 Rev. 2.7-SPACE ALIENS HIDE MY DRUGS!!! ___________________________________________________ I'm in an apologetic mood this morning, so I would like to take this opportunity to tell those who I have offended in the past, and those who I may offend in the future by my boorish behavior which reflects a total lack of both character and proper upbringing... Well, I'd like to tell them all to "FUCK OFF AND DIE!" Nothing personal, gang, but as some famous guy once said, "He who excuses, accuses." ~ Some famous guy... I really should apologize for being too fucking lazy to grab a pitchfork and go through my filing system to properly attribute the quote above...but I won't. You see, I have no social skills. None. Nada. Null. I should also apologize for never having made an effort to acquire proper social skills...but I won't. In a society in which Finger Pointing (TM) is endemic among those who harbor a secret desire to live in a world epitomized by the movie, 'The Running Man', it borders on self-abuse to add to the mountains of accusations that society already heaps upon one for even the smallest of deviations from a 'norm' which is widely held up to be 'common sense' / 'the way things are' / 'obvious to any decent, God Fearing [Your nationality or religion here] individual'. Being a Deviant From The NormChomsky School of Social UnSchooling ('Norm' is unlikely to lay awake at night waiting for the phone to ring, in order to receive my apology for fucking up his name), I have long recognized that those who consider themselves to be 'God fearing Americans' are, in actuality, often 'Dog fearing Americans' whose beliefs and actions are the result, not of a fear of 'Holy God' roasting their sorry, morally sinning ass, but rather, the result of the fear of the 'Unholy Dog', who is at the end of the leash being held by the Enforcers of Law and Order, Family Values, Cryptography Export Regulations and the Eleventh Commandment (EveryThingNotPermittedIsForbidden). It's a predatory universe, and the human animal is the chief predator. (A fact that would be readily confirmed by Ms. PARKER of TV's latest biosemiotic hint of man's future evolution, 'Prey'.) 'World's Scariest Police Chases' is nothing more than a pilot program for a variety of 'Running Man Electronic Realities' which are only waiting for proper technological development and implementation before John and Jane Savage will be able to tune their Infrared Digital Brain Implant in the proper channel where they can hear the scream of the tires and feel the wetness of the blood as a car full of teenagers slams into a concrete wall while trying to flee the deadly hunting hounds who are trained to both instill and track the scent of fear in their prey. What is a human life worth? Apparently, it is worth less than the cost of a minor traffic ticket, whether it is the life of the person who failed to signal their turn (even though there was no moving traffic anywhere in sight), or the life of some unfortunate child who crossed the street at an inopportune time, on their way home to their birthday party. Of course, to be fair, we must keep in mind that the person fleeing the minor traffic offense may be a pedophile, and if the death of an innocent child saves the life of just one innocent child...uuhhh...never mind... Don't hold your breath waiting for 'World's Scariest Police Chases Resulting In The Deaths Of Innocent Bystanders.' (Can you say "Watch me and I'll bleed you 'cause you eat the shit I feed you...And when somebody's mother gets machine gunned in the street, we'll send some Joker with a Brownie, so you'll see it all, complete...?" Sure you can...) The price of a human life is just as cheap in America as it is in what are held to be 'less civilized' areas of the world, but the advertising experts and spin-doctors in charge of 'Manufacturing Consent' in the American people for submissive subjugation to Heavily Armed Thugs have had the advantage of decades of experience in exercising Control Over Access To Information and thus shape the jigs upon which our Consent To Agree To 'The Way Things Are' is Manufactured at any given point in time. The danger that Unregulated Access To Information presents to the current structure of government, business and society, is that it allows any member of the human race to participate in the Manufacturing of Consent as to what is acceptable and what is unacceptable in the areas of our life which are shared with various layers of the Social Onion. For instance, this very missive might be seen as an attempt by the Author to Manufacture Consent for any individuals who feel their life is threatened by the dangerous driving of law enforcement personnel to 'pop a cap' in their ignorant brains as they drive by, if the threat they pose to one's safety can be removed with little likelyhood of endangering others. Remember, 'If it saves the life of a single child...' The size, shape, function, model number and serial number of Consent depends largely on where, how and by whom it is Manufactured. How the fuck did WeTheSheeple manage to allow ourselves to be manipulated into giving our Consent for Janet Reno to slaughter a spiritual community of men, women and children who died a horrible, screaming, fiery death for holding unconventional religious views? How the fuck did WeTheSheeple manage to sit up straight in our chairs and quit fidgeting, while giving our Consent for the mainstream media to feed us Law and Order pamphlets handed out by the same Department of Justice criminal monsters who slaughtered our fellow citizens? How the fuck do WeTheSheeple manage to watch dozens of police cars endangering the public with their dangerous driving in order to prevent a single vehicle from endangering the public and manage to give our Consent for them turning traffic rules into excuses for violating the Constitutional rights of the citizens and using deadly force against anyone who attempts to avoid violation of their civil rights and affronts to their human dignity? Vin ThePolishKike, who I revere for the sanity and wisdom which he brings to his Mountain Media News releases (even though I'm too lazy to look up how to spell his unAmerican name, and can't resist taking a few cheap, racist shots at him just to attempt to suitably repay him for his contributions to our Biosemiotic Evolution by helping to ensure that he will 'Never Forget'), has not been remiss in exercising his Dog-given right to participate in the Manufacturing of Consent, by expessing the view (which I am about to badly misquote), "We have reached the point where it is morally right to shoot the bastards, but it is not yet feasible to do so." "Who will help me to Manufacture Consent to Nuke DC?" said the little Red May. "Who will help me Manufacture Consent to engage the bastards in a continuous rEvolutionary battle where our targets are chosen, as much as possible, rather than being just random victims of misguided rage?" said the little White Weber. "Who will help me Manufacture Consent to avoid endangering innocent children by refusing to drive dangerously in order to escape the armed thugs, and instead seizing every safe opportunity to resist their oppression by stealth and craftiness, if possible, but by violence and death, if necessary?" said the little Black ArmyOfDogMongrel. As a member of the Congress of WeThePeople who have as much right to Manufacture Consent as do the members of the corrupt Congress of WeTheSheepShearers, I am casting my vote upon the waters of opinion in favor of restoring the right of WeThePeople to individually and collectively institute the Death Penalty for Oppressors. I am adding my voice to those of others with the wisdom and courage to do their part in Manufacturing Consent for their fellow citizens to stop and shake the hand of the individual who took the time and trouble to 'pop a cap' in the brains of the dangerous armed thugs endangering the populace with their stupidity and carelessness in matching the insanity of those they claim to be protecting us from. The next time you have an opportunity to watch 'The Running Man', make a point of noticing that the 'contestants' haven't been brainwashed into meekly submitting to whatever form of armed violence is directed toward them for their real or imagined crimes. And make a point of noticing who your heart, mind and soul are rooting for... Then ask yourself if you want to live a life where you meekly submit to all manner of affronts to your rights and human dignity, while numbing yourself to 'the way things are In Reality' by opiating your psyche with Digital Emmisions from the Puppet Masters which are designed to use Virtual Reality to compensate for the thoughts and emotions you are required to suppress and deny in your Physical, Emotional and Mental Daily Realities. Thelma and Louise had the right idea...they just should have waited until there was a cherry-top in front of them... From tm at algebra.com Fri May 1 12:38:56 1998 From: tm at algebra.com (TruthMonger) Date: Fri, 1 May 1998 12:38:56 -0700 (PDT) Subject: Epilogue 8.2 - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <354A2515.4A0@algebra.com> Epilogue 8.2, Rev. 1.8 - SPACE ALIENS HIDE MY DRUGS !!! _______________________________________________________ "Lord knows when the cold wind blows, it will turn your head around." ~ James Taylor Adversity tends to break down the smooth functioning of our comfortably programmed beliefs via forcing a change in our ordinary habits of perception in regard to the world around us. This is true whether the adversity or perceived threat is real or imagined. When some aspect of our survival, including the survival of our comfortably programmed mental, emotional and physical states, is threatened, we tend to become aware of things which were previously invisible or vaguely opaque elements of our environment, or to see things that were already encompassed by the range of our usual perceptive viewpoint in an entirely different way. One might compare a kick in the ass to a software program interrupt that boots one out of the preprogrammed loop that they follow as a matter of routine, and throws them into a reactive EITHER/OR 'fight or flight' routine. Or, if they happen to be wired and programmed to be able to function using higher level logic and languages than are necessitated by mere survival, they might branch to a series of nested conditional loops which, like Tai Chi, enables them to act in whatever manner is most fitting given the original goal of their program and taking into consideration the nature of the error message that was imparted to their backside by an unexpected boot process. "In the beginning was the Word, and the Word was RTFM!" Three days after I betrayed my Toshiba Tecra laptop for thirty cans of Silver Bullet, enabling the Roman BorderGuards to take it away to be crucified upon the Cross of Free Speech, I rolled back the stone at the door of the cave where the body of my Opus SPARCard 2 lay and dragged it out into the light of day where, seeing its own shadow, it predicted that there would be three more weeks of Snow Crash. Computer Gods work in mysterious ways, especially when I am drunk, which probably explains why THEY came to me in a double-vision and I once again heard the inner voice which had been silenced by years of medication and therapy. The voice said, "OPUS is not dead, but merely sleepeth." After paying alms to the Used PC Priests and offering a 386 IBM-PC up for sacrifice to the UNIX rising from the ashes, I instituted a GNU World Order among the Byteizens living in the Land of PROM, and my SPARCard 2 came to life, feeding off of the flesh of the DOS interface which the Computer God, OPUS, had destined to serve at the feet of the Eunuchs Masters. "I shall deliver you up out of Redmond, past the Gates of the Pharoh, and I shall be your Get, and you shall be my Pipe-l." Since the resurrection of my SPARCard 2, every day begins with a miracle of life, as the Spirit of the Father of Eunuchs, the Sun OS, and the "Holy Shit! Great Caesar's Ghost...it works!" is breathed into the NULL PROM registers by the laying of hands on the keyboard, sending shivers down the spines of Daemons, Zombies and Orphan Zombies. � I've got a KILL command, and I'm not afraid to use it... Of course, the Holy Roman Empire is not about to fold up its tent and cancel its plans to build the Fourth Reich on the Tomb of the UnStoned Soldier of the Army of Dog just because an unrepentant WinLuser has temporarily escaped their sentence of Death of Free Speech by hiding in the Holy Shit! Temple, underneath the KILLts of the Circle of Eunuchs. Desert Storm was just a NWO practice run to fine tune the Patriot missles in preparation for the return of Jesus in a Stealth Bomber, "like a thief in the night." St. John the Divine Lay Preacher mistook the sounds of incoming Scud missles and outgoing Patriot missles for the blaring of trumpets. When the Army of God descends out of heaven, they'd better be wearing Kevlar... "Every time I start getting ahead in the rat race, they bring in faster rats." ~ A Slow Rat A few years ago, Dudley DoWrong took a serious run at my liberty of movement by charging me with a couple of traffic offenses and trying to yank my driver's license. After two years of dragging a pack of Rabid Wombats Cleverly Disguised As Witnesses into court (accompanied by a Mountie assigned to keep an eye and a gun turned in the direction of the MadDogInPossession defendant), it finally came down to blows, and I wiped the floors of the Halls of Justice with the tight ass of the federal Queen's Bench counsellor appointed to prosecute me. (He had a stick up his ass, so it was a lot like using a regular mop.) I have had quite a few people come to me over the years for help with keeping the long dick of the law from being hidden from the sun in their own backyard. There seems to be some kind of perception among the lower stratocasters of the local community that I am some kind of killer legal-eagle genius who is able to eat legal-rats that are larger than his head. Although I enjoy occassionally basking in the warm glow of the approval of Squeaky From's peers, the fact of the matter is, I am actually more of a legal-buzzard--working out of a carrion bag in between flights of fancy during which I look down on the struggling wayfarers wandering in circles, lost in a wasteland of rules and legal proceedures which turn out to be merely shimmering mirages appearing to be an Oasis of Truth and Justice until the poor, parched pricks get close enough to see that their mind and eyes were once again fooled by illusions created by their delusions--and, rather than being a Great Bird of Prey who eats the RatLawyers alive, I am merely a Vulture who picks at the carcasses of the dead and dying former Champions of Justice who sold their souls to the Mobsters Cleverly Disguised As Politicians. Of course, the mail-order, money-back-guarantee 'Be Your Own Legal-Beagle Kit' (send $19.95 + $5.00 S&H to: Baby Dog Enterprises, Box 281, Bienfait, Saskatchewan SOC OMO) I use to snatch Justice from the Jaws of Legal Sharks is meant for use only in trolling for the big fish in small ponds and small fish in big ponds, and is not designed for use by serious FisherKings trolling for Killer KingFish in the home of the SwampThing, where Legal Dinosaurs still roam at large, crushing underfoot anything and anyone that gets in their way. When the omnipresent, nefarious They (TM) call out the National Guard to descend upon your sorry ass, and They (TM) turn to the Desert Rat to sniff through your garbage and find something dirty and smelly enough to delight a hand-picked jury of God Fearing Decent People's Peers, then it's time to put in a call to Larry Joe Dowling, a West Texas Rat Wrangler, and the aptly-named Bob Looney, one of LBJ's former Legally Drunk Beagles. Larry Joe is one of the few lawyers whose standards have remained high enough that he will work in return for really great pussy, and his good Texas breeding ensures that he will be discreet in screwing your old-lady, so as not to cause you any undue embarassment for your lack of sufficient capital to retain a legal representative capable of keeping a straight face when words like Truth and Justice accidentally escape from the lips of the judge and prosecutor. Besides, if They (TM) want you badly enough to make it worth your attorney's while to sell you down the river, then you damn-straight better better team up with an experienced Rounder who has the decency to pay the bar-bill at the end of your tax-deductible, late-night legal conferences. (And whose partner-in-(government)crime(fighting) helps to keep your spirits (pardon the pun) up by raising his glass, in toast to the Blind Broad, and announcing, loud enough to be heard over the din of the surrounding Last Call Warriors, "If Jack Daniel's be with us, then who can be against us?" I use a simple rule-of-thumb to guage the level of the blindside attack on my sorry butt that is being secretly prepared deep within the bowels of the Rat's Nest in Can You *Say* That Word On The Internet(?), Saskatchwan. The more shit-disturbing that the BigTeeth Enforcer Rats let you get away with without uttering even the slightest of squeaks in your direction, then the further ahead they are setting your own personal DoomsDay Clock during their illegal, surrepticious entries into your home while you are down at the CoalDust Saloon. When you can run around Southern Saskatchewan distributing 'WANTED DEAD OR ALIVE' posters putting a price on the head of the thieving scum who stole your computer and not hear a peep-squeak out of them, then your DoomsDay Clock is already set to one minute after midnight, and you're drinking on borrowed time. (Which means that I'd better get my butt down to the CoalDust Saloon so that I'll be there when the barmaid opens the door, and she won't freak out and run down main street screaming 'The sky is falling...The sky is falling!" like she did the last time I didn't arrive until 33 seconds after opening time.) Smoke 'em if you got 'em... From tm at algebra.com Fri May 1 12:39:16 1998 From: tm at algebra.com (TruthMonger) Date: Fri, 1 May 1998 12:39:16 -0700 (PDT) Subject: Constitution For Sale Message-ID: <354A256F.4030@algebra.com> CONSTITUTION FOR SALE _____________________ 1776 Constitution for sale. Inherited from original owner. Hasn't been used for years, but can be easily restored to its original condition by extermination of the rats which have taken up residence under the hood and the removal of useless accessories which were added by a long series of unethical mechanics who saw the prospect of making more money if it continually drifted to the right or the left than if the integrity of its original design was retained. Truly must be seen to be appreciated. Must be appreciated to be truly seen. From tm at algebra.com Fri May 1 12:39:20 1998 From: tm at algebra.com (TruthMonger) Date: Fri, 1 May 1998 12:39:20 -0700 (PDT) Subject: Crime Sale! Message-ID: <354A25BD.A09@algebra.com> CHEVY CHASE FORD & 'CRAZY BOTMA' MERCURY DEALERSHIPS ANNOUNCE A GIGANTIC BLOWOUT CRIME SALE !!! _______________________________ DUE TO A CURRENT OVERSTOCK OF CRIMINALS AND THE NEW MAKES OF CRIME BEING PRODUCED IN OUR DC FACTORY EVERY DAY, CHEVY CHASE AND 'CRAZY BOTMA' ARE ABLE TO OFFER YOU *UNBELIEVABLE* *DEALS* ON A WIDE VARIETY OF BOTH NEW AND OLDER CRIMES. THIS MAKES IT AN OPPORTUNE TIME FOR *YOU* TO GET INTO WHATEVER TYPE OF CRIME YOU'VE DREAMED ABOUT FOR YEARS, BUT THOUGHT YOU COULD NEVER AFFORD TO PAY FOR. WE'RE MOVING OLDER MODEL CRIMINALS OUT THE DOOR EVERY DAY, AND EVEN SENDING FELONY CRIMINALS OUT THE DOOR AT AN EVER INCREASING RATE, YET WE *STILL* CAN'T KEEP UP WITH THE DEMAND OF OUR DC FACTORY TO FIND CUSTOMERS FOR THE NEW CRIMES BEING CREATED EVERY DAY BY THEIR SOCIAL ENGINEERS. WE'RE SO DESPERATE THAT WE'RE WILLING TO PLEAD WITH YOU TO ACCEPT THE BARGAINS WE ARE CURRENTLY ABLE TO OFFER. NOT ONLY ARE WE ABLE TO GUARANTEE THAT WE CAN FIT YOU INTO ANY OF A VARIETY OF THE WIDE SPECTRUM OF CRIMINAL CATEGORIES CURRENTLY AVAILABLE BUT WE CAN OFFER YOU A DEAL THAT WILL HAVE YOU BACK OUT THE DOOR IN RECORD TIME. WHAT'S MORE, DUE TO THE CURRENTLY HIGH RECALL RATE WE ARE EXPERIENCING AS A RESULT OF SENDING UNSAFE CRIMINALS OUT THE DOOR, WE CAN PROMISE TO GIVE YOU AN EVEN BETTER DEAL ON A NEW CRIME IN THE FUTURE, EVEN IF YOU HAVEN'T FINISHED PAYING FOR YOUR ORIGINAL CRIME. ONCE WE HAVE FIT YOU INTO A THIRD FELONY CRIME, YOU WILL AUTOMATICALLY BECOME A LIFETIME CUSTOMER AND ELIGIBLE TO MOVE FROM OUR 'EASY PAYMENT' PLAN TO OUR 'LIFETIME PAYMENT' PLAN WHERE WE *INSIST* THAT YOU TAKE *FOREVER* TO PAY FOR YOUR CRIME. WITH THE EVER INCREASING ABILITY OF OUR DC FACTORY TO PRODUCE NEW CRIMES AT AN ASTOUNDING RATE, IT HAS NEVER BEEN EASIER TO FIT INTO OUR CUSTOMER PROFILE. "IF THE CUSTOMER DOESN'T FIT THE CRIME, WE'LL MAKE THE CRIME FIT THE CUSTOMER." THAT'S A PROMISE! From declan at well.com Fri May 1 13:05:51 1998 From: declan at well.com (Declan McCullagh) Date: Fri, 1 May 1998 13:05:51 -0700 (PDT) Subject: Reno reports "suspicion" in industry crypto-negotiations In-Reply-To: <199805011541.RAA23552@basement.replay.com> Message-ID: At 13:39 -0400 5/1/98, John Young wrote: >Weren't some of these stalking drafts nearly liberated recently? >Or were they only floated for trusted eyes only? They were floated for TEO: ACP, Hill staffers, and allied groups like CDT (Alan Davidson from CDT, after a Cato forum yesterday, defended much of the ACP crypto bill when I asked him about it). I got a leaked copy. I promised to send around a summary and haven't yet. Too much time on Y2K and Microsoft. I'll get to it this weekend. -Declan From cel4538 at ritvax.isc.rit.edu Fri May 1 13:05:53 1998 From: cel4538 at ritvax.isc.rit.edu (Chris Loftus) Date: Fri, 1 May 1998 13:05:53 -0700 (PDT) Subject: How do I get off this list?? Message-ID: <3.0.32.19980501160520.006cd8d0@vmspop.isc.rit.edu> There is too mach crap. how do I get off? From billp at nmol.com Fri May 1 13:54:27 1998 From: billp at nmol.com (bill payne) Date: Fri, 1 May 1998 13:54:27 -0700 (PDT) Subject: Ruling in Payne & Morales v NSA's Minihan Message-ID: <354A351C.20B8@nmol.com> Friday 5/1/98 2:15 PM John Young Nice to talk to you a few minutes ago. Even in person! Judge Santiago Campos ruled in Payne and Morales v NSA Minihan. http://jya.com/whpfiles.htm http://www.aci.net/kalliste/speccoll.htm Morales opted to meet and open the ruling even though it is a week end. Usually, I NEVER open a lawyer letter on near a weekend or a vacation. But we do file lawsuits on Friday. That way we get to blast THEM [Great Satan supporters] on the Infobahn before the court has a chance to seal the complaint. Mail Boxes Etc. charges only $.04 per page special copy charge on Fridays too V $.07 on other days. We, unlike DOE, are mindful of containing litigation costs. The ruling is 56 pages long! Morales read me only the first and last pages. 1 We DID NOT LOSE 2 NSA did not win 3 We are not headed for jail I mailed a priority mail copy to you. Without Internet NYA, J Orlin Grabbe, and some really neat journalists the outcome would have far different, I conjecture. Have a good weekend everyone [http://www.wpiran.org/]. We are! We GOT TO GET THIS HORRIBLE MESS SETTLED! Cowabunga, Yahoo, allahu akbar, etc. bill and art From yq91sa9Up at aol.com Fri May 1 14:58:19 1998 From: yq91sa9Up at aol.com (yq91sa9Up at aol.com) Date: Fri, 1 May 1998 14:58:19 -0700 (PDT) Subject: Master Wealth Builder...... Message-ID: If You Qualify, You Could Net Yourself Well Over $150,000 By The End Of 1998... Guaranteed! Greetings: My name is Marty. I would like to ask you to please take two minutes of you time to read the following. If you don't like what you see then please trash this mail and accept my apologies for this disturbance. I promise you I will not send you another. I am writing to introduce you to a strong, wealth building home based business that is NOT a Multilevel Marketing venture or some get "rich quick scheme"... a business that is more profitable than any network marketing, direct sales, franchise or investment opportunity in existence today. Who Will Be Allowed To Work With Me? I am looking for a limited group of serious minded entrepreneurs that have been looking for a solid business opportunity. I'm not looking for a huge response. I only want to work with people I feel have a "burning desire" to be successful. Can you visualize yourself earning $30,000 + net per month within the next year, if provided with the right opportunity to do so? Are you willing to commit to doing whatever it would take to be successful in this business once you completely understand it? How To Find Out If You Qualify To find out more, call toll free for more details: 1-800-600-0343 ext.#1399. This is a recorded message that is available 24 hours a day. It is NOT a telemarketer. I am selecting individuals on a first come, first serve basis. If you are seriously interested...REPLY NOW! If you don't really feel you've got the right stuff to be successful, then please don't bother to respond. I only want to work with the motivated people who seriously want to make insane amounts of money! If I have reached you in error, please send mail with REMOVE in the subject heading and you will be immediately removed from subsequent mailings. Prosperous Regards, P.S. Once again, this is NOT MLM. Serious inquiries only please! You will work 100% from your phone. Age, appearance, skills, location, and transportation are NOT important! Only desire and commitment are important! 1-800-600-0343 ext.#1399 DAY OR NIGHT From whgiii at invweb.net Fri May 1 15:41:42 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Fri, 1 May 1998 15:41:42 -0700 (PDT) Subject: How do I get off this list?? In-Reply-To: <3.0.32.19980501160520.006cd8d0@vmspop.isc.rit.edu> Message-ID: <199805012241.SAA26940@users.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <3.0.32.19980501160520.006cd8d0 at vmspop.isc.rit.edu>, on 05/01/98 at 04:05 PM, Chris Loftus said: >There is too mach crap. how do I get off? Sorry you have failed the requisite IQ test for obtaining the unsubscription information. You are now doomed here forever!!! Welcome the Purgatory, Hell is on the way. - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html - --------------------------------------------------------------- Tag-O-Matic: How do you make Windows faster? Throw it harder! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNUpQhI9Co1n+aLhhAQGmFgP8D1kzv4i2mPV/cD6o+V70hoftPDGIwAof pP6qbuaPcw6Hc9NYcXNiY9s3EjuHviE2rwF5Vw3+a/swZxOeTIUUg5Fcf2VTvh0R KR7WUJ+bqxp5no5ribCsl3ADGSVCNv9mwa2GX3269qf1D3hijabRzv3L0aRNVYNp G6isqgJDuTM= =Zo9G -----END PGP SIGNATURE----- From tcmay at got.net Fri May 1 18:13:45 1998 From: tcmay at got.net (Tim May) Date: Fri, 1 May 1998 18:13:45 -0700 (PDT) Subject: Constitution For Sale In-Reply-To: <354A256F.4030@algebra.com> Message-ID: At 12:41 PM -0700 5/1/98, TruthMonger wrote: >CONSTITUTION FOR SALE >_____________________ > >1776 Constitution for sale. Inherited from original owner. >Hasn't been used for years, but can be easily restored to >its original condition by extermination of the rats which >have taken up residence under the hood and the removal of >useless accessories which were added by a long series of >unethical mechanics who saw the prospect of making more >money if it continually drifted to the right or the left >than if the integrity of its original design was retained. >Truly must be seen to be appreciated. >Must be appreciated to be truly seen. Wow! I haven't seen a Real Copy, ever! I was once a high school field trip to the National Archives, circa 1968, but our teachers told us the Constitution was now classified as a subversive document. It had been on the Index since 1933. Maybe the extermination of the rats under the hood will be accomplished as a side effect of the Y2K problem. We ought to urge our fellow sheeple to have _short trials_ for the millions of rats we need to exterminate. After all, they can't exactly appeal to the Supreme Court if the Supremes preceded them to the gallows, can they? --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From rah at shipwright.com Sat May 2 05:47:57 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sat, 2 May 1998 05:47:57 -0700 (PDT) Subject: db$: The Wright Brothers vs. Chixalub Message-ID: Just to fan the flames of Y2K hysteria ever higher... ;-). Cheers, Bob Hettinga --- begin forwarded text X-Sender: rah at pop.sneaker.net (Unverified) Mime-Version: 1.0 Date: Thu, 30 Apr 1998 17:50:18 -0400 To: e$@vmeng.com From: Robert Hettinga Subject: db$: The Wright Brothers vs. Chixalub Sender: Precedence: Bulk List-Subscribe: --- begin forwarded text X-Sender: rah at pop.sneaker.net (Unverified) Mime-Version: 1.0 Date: Thu, 30 Apr 1998 15:26:30 -0400 To: Digital Bearer Settlement List From: Robert Hettinga Subject: db$: The Wright Brothers vs. Chixalub Sender: Precedence: Bulk List-Subscribe: X-Web-Archive: http://www.philodox.com/dbs-archive/ You might notice that the tag on this one says "db$". That's to differentiate it from my "e$" rants, which might be more general than ones like this one, which is on digital bearer settlement. I think there is lots of talk about electronic commerce and e$ these days from whole bunches of people, and, as a consequence, my interest in it has focused more onto the issue of digital bearer settlement. You'll probably be seeing more db$ tags than e$ tags on my rants going forward. All of which brings me to some obversations I've been making in public about blind signatures lately, and the excellent time I had at Ed Yeardon's Cutter Consortium "Summit" conference the past few days. Let's start with yet another aviation analogy about Digicash, shall we? :-). Remember, I like to do that. Once I compared privacy to flight, and said that, like flight, lots of people had died getting strong cryptography to work, and that privacy itself was an inherent good. The thing which actually got people to use the technology, however, was its commercial value. It wasn't the joy of flight or slipping the surly bounds of earth at Kitty Hawk that got people into the air, it was coach fare to Dayton. It was digital commerce, and thus financial cryptography, which created the most privacy. Digital Commerce is financial cryptography, financial cryptography is strong cryptography, and all that. Then there's my analogy of book-entry settlement as Boyle's law (partial pressure of gasses?) and strong crypto, particularly digital bearer settlement, as Bernoulli's law, the law describing aerodynamic lift. Essentially you can think of cryptography and bearer settlement as wings, and book entries as, well, bags of gas. :-). Thinking this way, with commerce on the internet as flight, First Virtual becomes a tethered baloon. Encrypting your First Virtual transaction makes it an aerodynamic barrage balloon. Encrypting a credit card in an SSL web-form is flying around on a Zeppelin. And, David Chaum becomes the Wright Brothers for inventing the airplane. I used to say "Or maybe Otto Lillenthal" under my breath to get a laugh, but now, I know exactly why David Chaum is the Wright Brothers. That's because Digicash *is* The Wright Flying Machine Company, or whatever the Wright's subsequent enterprise was called. It seems to me that Digicash's strategy with the blind signature is a dead ringer for the Wright Brothers' control of the airplane patent. Here's why: 1. In the beginning, nobody believed that the Wright brothers could fly, and they had to take the airplane to Paris and demonstrate it there before anyone in the US thought it was true. Digicash did the same thing. Actually, the NSA created a positively hostile environment here in the USA for cryptography, financial or otherwise, and that forced David Chaum to go to the Netherlands, where there was a more positive reception for his work. 2. Then, nobody could think about what you could do with airplanes, and the Wrights foundered for a bit.. Same thing with Chaum, Digicash, and the blind signature patent. The commercial internet didn't exist yet in 1986, and blind signatures were conceived as useful only in smartcards, which were just being experimented with. Digicash was going to be used in physical electronic wallets, and maybe in transponders at the gates of toll roads. The CAFE project was an example of this meat-space ecash strategy. It wasn't that Chaum didn't think about the internet. Far from it. He invented digital mixes, after all, which became the basis for anonymous remailers, onion routers, CROWDS, and the like. He just didn't look at blind signatures from the financial operations point of view and see digital bearer settlement, that's all. He was thinking privacy, and not financial operations, just like the Wrights were thinking flight, and not high-speed transportation. 3. The entire time they held the patent, the Wrights only really wanted to sell airplanes to governments, because they wanted to sell to a few large stable customers instead of small entities who would probably go out of business. Digicash, to this day, tries to sell to big institutions. Their now mostly internet-driven digital cash stategy is to create the financial equivalent of Alfred Nobel's dynamite cartel, where one bank in each country gets an ecash license, hopefully the largest bank possible. Mark Twain in the US was a proof of concept, if not an act of desperation on Digicash's part, but it did lead to exclusive (I bet) country-wide licences with Nomura, Deutchebank, the Swedish Post office, and others. There was talk at FC98 that Digicash received $1 million a month from Deutchebank just for the *option* on a Germany-wide license. I think they've now exercised that option. Frankly, I find this geographic, paint-by-the-nation-state approach quaint in a world of ubiquitous geodesic internetworks, but there it is, and it effectively prevents other people from doing anything innovative with blind signatures in the meantime. Monopolies on information technologies kind of work that way. Dogs and mangers come to mind, and not for the first time. 4. The Wrights, when they thought about the transportation business at all, thought about it in terms of "rides" instead of "trips". Digicash isn't really looking at the applications of their technology to anything except its original designed purpose, that is, cash. There are some leaks around the edges, of course. Nomura seems to be looking at blind signature digital bearer settlement as a real-time gross-settlement technology, with some kind of private, kiretsu-cash idea. Digicash people used to give you a shocked "how did you know that already" look when you talked to them about the painfully obvious potential use of blind signatures in the capital markets. However, I'm certain that Digicash thinks that capital market use of blind signature digital bearer settlement is a pipedream and that they'd better focus on the main chance, which is ecash. Preferrably electronic wallet-based ecash issued by a major bank. In competition with book-entry settlement, in book-entry settlement's own turf. Go figure. 5. Finally, the only innovation in the American aircraft market in the age of the Wright patent came from that famous airplane "infringer", Curtis, who didn't give a damn about patents and built airplanes anyway. Much better airplanes, in fact, which the Wrights eventually took him to court for, forcing Curtis to merge with the Wrights. Fortunately, European evolution in aviation continued apace, giving us the aviation equivalent of the Pre-Cambrian explosion, culminating in the names we all remember from World War I like Sopwith, Spad, Dornier, and, of course, Fokker. The problem is that there's no Curtis to infringe on the blind signature patent, because you can't hook up to the financial system from the internet -- land yur plane in other words -- without clear rights to use it. The banks where you move money on and off the net from would get sued. Unless they're in places like South Africa, where software patents don't matter, or Russia, where they're probably uninforceable. Places which have their own problems, not the least of which is poor internet access, poor financial network connectivity (something like Cirrus on the back end of a trustee/custodian would be, um, NYCE :-)), and, not least, poor impulse control by the local force merchants, monopolistic or otherwise. Tax havens don't even count. The very definition of a tax haven is someplace with a bandwidth and regulatory gravity well to keep it safe from any kind of market efficiency. A return to some kind of "Europe" for that hoped-for explosion of blind signature evolution could still be happening on the internet anyway. Certainly, with smart and tenacious people like Ian Goldberg designing HINDE and Ryan Lackey bashing on a reference version of it, one could certainly try to argue this, but there's no money doing this stuff right now (unless you count first-class upgrades to Anguilla or free nights in the InterIsland), much less something like the First World War to forge that innovation into a robust replacement for the book-entry economy. Which, thinking thinking of robustness, brings me to what I've been doing the last few days. Pete Loshin, former editor at Byte, former writer of various excellent how-to books on networking and one of the first surveys of internet commerce (and one of the founding members of the Digital Commerce Society of Boston, I might add, :-)), is now editor of Cutter Publications' "Corporate Internet Strategies" newsletter, which used to be edited by Ed Yourdon, of American Programmer, Y2K, and much other, fame. So, when they needed someone on a panel about electronic commerce at Cutter's "Summit" conference at the Boston Harbor Hotel's Wharf Room facility this week, someone controversial, they said, Pete said he knew exactly who to throw into the fray. It was fun, too. There, in front of a room full of senior IT managers from big companies and Famous Computer Guys, sitting on a panel on Internet Commerce, was one of Fidelity's Famous Computer Guys himself, now running their web technology department. And Pete. And Fidelity's retail web-marketing guy, and me. Fidelity has 900 billion dollars under management. 60% of their customer interaction now comes from the web. The ganglia twitch. Dropping that $100 billion 1997 internet transaction number, and saying that it was three orders of magnitude over the estimate didn't faze these guys. They had seen it happen. In addition, all of the people with websites I talked to said that they used SSL to interact with their customers. Almost all of them said that they used 128 bit encryption. The Mssrs. Fidelity faintly crowed about the fact. Digital Commerce is Financial Cryptography, so what else is new? Then, of course, I threw the whole geodesic economy, digital bearer settlement rant at them, right down to the picomoney as processor food, micromoney mitochondria bit. And, of course, they all stood up and threw their dinner rolls at me. It was great. That's because I'd been throwing my own dinner rolls, and I'd been been hinting what I was going to say all week. They even encourage you to heckle the speakers back with a liberal sprinkling of wireless mikes around the room. So every once in a while, I'd pop off with comments like intellectual property control was impossible, that watermarking only told you who the code was stolen from not who stole it. Or, why not have cash auctions for programming deliverables instead of top-down project management, Or, emergent processes for software were always going to beat "controlled" processes, Or, passing programmer certification laws in the wake of whatever Y2K thing happened would be impossible to enforce in a world of those same anonymous cash settled markets for programming talent. I even pointed them to the forum-hackers list as proof. One of my favorite gybes while I was up on the podium to the Fidelity marketing guy -- who's a nice guy but who's also fighting like crazy right now to drag Fidelity up the "quality service differentiation" ladder because Fido can't play least-cost-producer anymore in an eTrade world -- was my claim that eventually most so-called "branded" products would be reduced to graded fungible commodities, and that the more dependant a business was on information technology, the faster it would happen to them. Orthogonality is always more fun than the alternative. And you get lots of free dinner rolls. And, of course, after the digital commerce panel and lunch, Ed Yourdon wrapped it all up with his scary Y2K rant, followed by an appropriately scary bunch of panelists telling us just how scary all theis Y2K stuff really was, that Ed had gotten himself on down to Taos, complete with his own water supply, and that denial was when you lied to yourself and believed it. Or something. All of which I now believe more of, just because all these grey-haired programming aristocrats were nodding sagely about this prospect of impending doom for us all. Frankly, most of the people who've yammered at *me* about Y2K were either loons who hoped it would All Fall Down Someday Soon, or people like Vinnie, who think it's a good idea, if not fun, to know what to do if it ever does all fall down, but that praying for it wasn't going to make it so. I'd like to think I'm one of the latter. The other problem is, I've seen the end of the world coming before. Even predicted it myself on occasion. Haven't been able to reduce it to practice, yet, though. That's the reason Gibbon's in my .sig these days. So, let's get back to Digicash and the Wright Brothers. After hanging out with a whole bunch of top-down monolithic-system gurus and Y2K folks yesterday, it seems plausible. And, I'm certain there are lots of people out there who know lots about both and who hope that Y2K will be the Chixalub event that will burn off all the database-driven book-entry dinosaur systems and clear the way for a digital bearer mammalian explosion. Frankly, I think we're looking at a brushfire, if anything. The lawn will grow back, but the house won't burn, even if the water does go out for a bit. That's my story, and I'm sticking to it. Remembering, of course, the above bit about denial. But, suppose we *are* talking about the financial equivalent of that great 1970's 30-second short film epic, "Bambi vs. Godzilla", where Bambi is squashed by a giant green foot (oops, I gave away the plot), and the whole financial system goes away for a few days. Or a month. Is there any way to step in with digital bearer settlement as a robust alternative to book-entry funds transfer? Remember the great bank strike in Ireland, where everyone just passed around nth-party endorsed checks like they were money until it was all over? Could we do something like that? Would David Chaum and company let us do that without suing someone for infringement? Could they stop us, if the courts are full of Y2K liability cases? Would the internet still be up? Could we pay our ISPs with digital bearer certificates to keep them up? How about Iridium and Teledesic, which are supposed to be up by then? Once again, ganglia twitch. However, it might be fun to game the idea a bit, just to scare the neighbors. You know, pay ya all back when the banks come up? Well, maybe not. Ed says that the banks, and particularly Wall Street, are the most prepared of any of us. That makes sense. The half life of financial software these days is measured in months. For instance, one of NeXT's biggest markets was in the financial sectors, especially trading rooms, where any prototype which worked was immediately production code. They liked NeXT, despite all its other interesting charistics, because you could do exactly that, and faster than any other development environment. Of course, if anyone's a poster child for "sell Cadillacs, drive a Chevy, sell Chevies, drive a Cadillac", it's Steve Jobs. Of course, he sold NeXTs and got Apples, however that turns out... Still, it might be worth thinking about, trying to route around the book-entry financial settlement system as a pre-disaster exercise. Wright Brothers versus Chixalub, and all that. No, I don't wanna see the movie... Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ ---------------------------------------------------------------------- Where people, networks and money come together: Consult Hyperion http://www.hyperion.co.uk/ info at hyperion.co.uk ---------------------------------------------------------------------- Full-Strength Cryptographic Solutions for Worldwide Electronic Commerce http://www.c2.net/ stronghold at c2.net ---------------------------------------------------------------------- Like e$? Help pay for it! For e$/e$pam sponsorship or donations, ---------------------------------------------------------------------- --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From arse69 at webtv.net Sun May 3 04:05:33 1998 From: arse69 at webtv.net (fine asses) Date: Sun, 3 May 1998 04:05:33 -0700 (PDT) Subject: hello Message-ID: <199805031105.EAA05339@mailtod-161.iap.bryant.webtv.net> :: Request-Remailing-To: arse69 at webtv.net test From moneytime at aol.com Sun May 3 05:43:06 1998 From: moneytime at aol.com (moneytime at aol.com) Date: Sun, 3 May 1998 05:43:06 -0700 (PDT) Subject: Make Money Working From Home Message-ID: <2145871454578> ========================================================== This is a one time mailing and you will not be sent this message again, we apologize for any inconveinance that this message has caused You =========================================================== DON'T DELAY, START WORKING NOW!! SET YOUR OWN HOURS, STAY HOME, NO TRAFFIC, WORK AS MUCH OR AS LITTLE AS YOU DESIRE, MORE FREE TIME, BECOME FINANCIALLY INDEPENDENT WELCOME! NEED A JOB? WANT TO MAKE $1,500-$4,000 MONTHLY, WORKING PART OR FULL TIME FROM THE COMFORT OF YOUR HOME? ClickHere Over 200 companies that will provide you with home employment are listed on this website. The website is divided into many different categories, such as: Computer Opportunities Toys Assembly Decorations Assembly Sewing Jewelry Assembly Crafts Assembly Stuffing Envelopes And Many More Here are some examples of available opportunities: "You can make between $400-$500 weekly, stuffing sales envelopes for our company. Make $0.15 for every envelope you stuff for our company. We will furnish all the supplies. No experience necessary." "Assemble beautiful beaded bracelets for fun and profit. You will be paid from $7.25 to $9.75 for every order that meets company's standards. One order should only take you 15 minutes to assemble. All materials and instructions are supplied. No experience is necessary. "Make beautiful hand-assembled glass beaded earrings at home. There are three elegant and creative designs to choose from. Basic assembly skills are required. No experience is necessary. You will be paid $250.00 for each unit of 25 pairs of earrings made according to the instructions provided. Shipping costs for each unit are reimbursed." "Make $180.26 per week assembling small appliance covers. No experience is necessary. All materials are provided. It is easy and fun to make. Work as little or as much as you desire. Get paid $100.00 for each set of 20 Towel holders. Submit only three sets per week. They are easy to assemble. No experience is necessary." We are legitimate company providing real home employment opportunities thus we putting 100% guarantee on our service. Using home workers greatly reduces each company's operating expenses and helps them to reach many more customers then they possibly could by themselves. They usually pay a certain amount per item or lot assembled. After shipping your assembled products to the company, they send you a check paying you for your labor! No selling is required and you can work as much or as little as you wish. The list of companies will be updated every month, thus you will have all information renewed and the list of new companies will be added. WELL WHAT ARE YOU WAITING FOR? Please visit us at ClickHere And Start Working Now!!! From cioqoaha30 at sprynet.com Sun May 3 07:24:14 1998 From: cioqoaha30 at sprynet.com (:-]) Date: Sun, 3 May 1998 07:24:14 -0700 (PDT) Subject: ALERT - Internet Fraud and Spying Message-ID: <199805034331SAA25713@post.westex.net> ARE YOU BEING INVESTIGATED ? Learn the Internet tools that are used to investigate you, your friends, neighbors, enemies, Employees or anyone else! My huge report "SNOOPING THE INTERNET" of Internet sites will give you... * Thousands of Internet locations to look up people, credit, Social security, current or past employment, Driving records, medical information, addresses, phone numbers, Maps to city locations... Every day the media (television, radio, and newspapers) are full of stories about PERSONAL INFORMATION being used, traded, and sold over the Internet... usually without your permission or knowledge. With my report I show you HOW IT'S DONE!!! It's amazing.. Locate a debtor that is hiding, or get help in finding hidden assets. * Find that old romantic interest. * Find e-mail, telephone or address information on just about anyone! Unlisted phone numbers can often be found through some of these sites!! Perhaps you're working on a family "tree" or history. The Internet turns what once was years of work into hours of DISCOVERY & INFORMATION. Check birth, death, adoption or social security records. MILITARY Check service records of Army, Navy, Air Force or Marine Corps. Find out who's been telling the truth and who's been lying. Perhaps you can uncover the next lying politician!!! FELLOW EMPLOYEES; * Find out if your fellow employee was jailed on sex charges, or has other "skeletons" in the closet!! PERFORM BACKGROUND CHECKS; Check credit, driving or criminal records, Verify income or educational claims, Find out Military history and discipline, previous political affiliations, etc. YOUR KID'S FRIENDS; Find out the background of your children's friends & dates. WHAT'S THE LAW? STOP GUESSING!! * Look up laws, direct from law libraries around the world. Is that new business plan legal?? NEW JOB? NEW TOWN? NEW LIFE? Employment ads from around the world can be found on the Internet. Get a new job and disappear! The Internet can tell you just about ANYTHING, if you know WHERE to look. BONUS REPORT!!!! Check your credit report and use the Internet to force credit bureaus to remove derogatory information. My special BONUS REPORT included as part of the "SNOOPING THE INTERNET" collection reveals all sorts of credit tricks, legal and for "information purposes only" some of the ILLEGAL tricks. Research YOURSELF first! What you find will scare you. If you believe that the information that is compiled on you should be as easily available to you as it is to those who compile it, then. . . You want to order the SNOOPING THE INTERNET report. This huge report is WHERE YOU START! Once you locate these FREE private, college and government web sites, you'll find even MORE links to information search engines! YOU CAN FIND OUT ANYTHING ABOUT ANYBODY ANY TIME using the Internet!!!! SEVERAL WAYS TO ORDER !!! 1) WE TAKE: AMERICAN EXPRESS OR VISA <> MASTERCARD TYPE OF CARD AMX / VISA / MC??_______________ EXPIRATION DATE ___________________________ NAME ON CREDIT CARD________________________ CREDIT CARD #________________________________ BILLING ADDRESS ____________________________ CITY_________________________________________ STATE________________ZIP_____________________ PHONE INCLUDE AREA CODE___________________ WE WILL BILL 39.95 to your account SHIPPING COST OF 3.00 FIRST CLASS MAIL SHIPPING COST OF 15.00 24 HOUR EXPRESS MAIL SALES TAX (2.90) added to CA residents >>> Send $39.95 ($42.85 in CA) cash, check or money order to: >>> CASINO CHICO >>> Background Investigations Division >>> 311 Nord Ave. >>> P.O. Box 4331 >>> Chico, CA 95927-4331 2) Send the same above requested credit card information to above address. 3) Fax the same above credit card information to 530-895- 8470 4) Call phone # 530-876-4285. This is a 24 hour phone number to place a CREDIT CARD order. 5) FAX A COPY of your signed check to 530-895-8470. This is an EXCELLENT way to order without a credit card! I will RUSH back to you SAME DAY my "SNOOPING THE INTERNET" report! Log on to the Internet and in moments you will fully understand... What information is available -- and exact Internet site to get there! 2nd BONUS!!!! Along with the report we will send a 3 1/2" disk with sites already "HOT LINKED". No need to type in those addresses. Simply click on the URL address and "PRESTO" you are at the web site!!! Personal ads, logs of personal e-mail, mention of individuals anywhere on the Internet are "yours for the taking" with this report. Lists of resources to find even more information (private Investigation companies, etc..) Order surveillance equipment (if legal in your state) Send anonymous e-mail Research companies Research technology Locate military records FIND INFORMATION ON CRIMINALS Find Wanted fugitives - perhaps even a close associate! ABSOLUTE SATISFACTION GUARANTEED: Your satisfaction is 100% guaranteed, just return the material for a full refund within 30 days if you aren't 100% satisfied. This offer is from a private company. Casino Chico / R Jon Scott Hall publications is not associated with or endorsed by, AOL, MSN, or any other Internet service provider. Copyright 1997 All Rights Reserved R Jon Scott Hall Publications. From tnelson222 at mci2000.com Sun May 3 22:29:05 1998 From: tnelson222 at mci2000.com (tnelson222 at mci2000.com) Date: Sun, 3 May 1998 22:29:05 -0700 (PDT) Subject: Earn $100 every time OUR phone rings.... Message-ID: <199805040528.WAA22430@cygint.cygnus.com> ALL YOU DO IS ADVERTISE OUR 800 NUMBER! THAT'S ALL!! $100 goes to you for every sale that we close! We need you to make our phone ring...... I am not talking about MLM! Does the idea of making at least $1,500 per week beginning your 2nd week of doing business excite you? How about never having to sell a thing to your customer to make money? I MADE OVER $1,000 MY FIRST WEEK! MY SECOND WEEK, I MADE OVER $1,800.... Does this excite you? It certainly excites me considering I only put in 4 hours or less per week to generate this kind of revenue. If you are an average person like myself who has always desired to be in business for themselves and absolutely doesn't like selling or having to talk to people to make a living, then this is for you. Every aspect of selling or talking to someone is done completely by the company. I DO NOT TOUCH THE TELEPHONE AND NEITHER WOULD YOU! First, Our Promise To You: 1) NO Selling! 2) NO Talking or Personal Contact with others, on the phone or in person! 3) NO Mandatory mailing of postcards, products or information to prospects! 4) NO Prospecting or Cold Calling of any kind! ALL OF THIS IS DONE BY THE COMPANY!!! WHAT THIS BUSINESS WILL DO FOR YOU: * Handles all your calls, closes your sales, and sends you WEEKLY commission checks! * It pays you a $100 commission (that's over 50% of the total sale) for EVERY sale. CHECKS put $$$ in your pocket in less than your first week or two... Quick commission earnings build and maintain motivation. ALL YOU DO IS ADVERTISE the toll-free number and your ID number. * You can get STARTED TODAY. Just advertise the business toll-free number with your ID # and let this business CLOSE YOUR SALES every day... We do all the work and YOU GET PAID FOR IT! * You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds, Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails with a 1/10 of a percent (0.1%) sales rate at $100 per sale nets $10,000... not too bad. There is nothing else out there that will provide you with an immediate income beginning THIS WEEK with minimal effort. Before you call, I want you to think about the quality of the live operators handling your call. I am convinced you will not find a better team of closers for your own personal sales. You will clearly understand what I am talking about once you call. PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!! 1-800-811-2141 You will be asked for ID #50030 when you call. (Live operators are available from 8 AM-10 PM CST Monday through Saturday and will be able to answer any questions you may have.) Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949 or 888-731-3457 (all toll free). From gnu at toad.com Sun May 3 23:21:11 1998 From: gnu at toad.com (John Gilmore) Date: Sun, 3 May 1998 23:21:11 -0700 (PDT) Subject: Bills in Congress containing "encrypt"... Message-ID: <199805040621.XAA20536@toad.com> I found a few interesting ones. S. 1023 Making appropriations for the Treasury Department, the United States Postal Service, the Executive Office of the President, and certain Independent Agencies... $3,000,000 shall be available to the Financial Crimes Enforcement Network, including $2,000,000 for the money laundering threat initiative and $1,000,000 for the Secure Outreach/Encrypted Transmission Program; $7,800,000 for automated license plate readers, [The above bill seems to have evolved into the following, which was passed by the House and Senate and awaits the President's signature.] H.R.2378 Making appropriations for the Treasury Department, the United States Postal Service, the Executive Office of the President, and certain Independent Agencies, for the fiscal year ending September 30, 1998, $1,000,000 shall be available to the Financial Crimes Enforcement Network for the Secure Outreach/Encrypted Transmission Program; ...to the United States Secret Service, including ... $1,460,000 to provide technical assistance and to assess the effectiveness of new technology intended to combat identity-based crimes, From stewarts at ix.netcom.com Sun May 3 23:50:43 1998 From: stewarts at ix.netcom.com (Bill Stewart) Date: Sun, 3 May 1998 23:50:43 -0700 (PDT) Subject: Why does the Navy research onion routing? In-Reply-To: <3.0.5.32.19980429090405.0079b940@otc.net> Message-ID: <3.0.5.32.19980503230738.009147c0@popd.ix.netcom.com> At 09:04 AM 4/29/98 -0700, David Honig wrote: >Why does the Navy research onion routing? > >Only reason I can think of is so that .mil can >study other sites anonymously, or communicate >amongst themselves using anonymous-routing-tech >to avoid traffic analysis. > >The other practical possibility is that they're happy >to have smart CS people and will fund whatever they >want to do, just to keep them. There is some of the latter involved, but the military does have times they'd like to check out web pages without traffic analysis, just as they'd like to be order lots of pizza without folks figuring out that they're up to something. This includes several cases - using the public or civilian-government internet, and also using their own intranets which may be less than totally secure. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From schear at lvcm.com Sun May 3 11:39:35 1998 From: schear at lvcm.com (Steve Schear) Date: Mon, 4 May 1998 02:39:35 +0800 Subject: The Usual Suspects (National sales tax) In-Reply-To: <199805030855.KAA18049@basement.replay.com> Message-ID: >From my perspective, one of the most important fallouts from a replacement of the graduated tax with a national sales tax is the removal of much of the current rationale for FinCEN and citizen identification (i.e., SSN). Certainly, it should no longer be required for establishing a non-credit financial institution account, purchasing a money order/cashier's check or wiring money. In fact, you shouldn't need SSN for employment, except that unless you supplied some number (even if psueduanon) you'd forego accruing benefits. The use of SSN for the ID runs the gammut in local, state and federal programs, but is most often justified for purposes of taxation. Now, I'm not naive enough to believe that any of these gov't agencies or private corps are going to willing give up citizen unit IDs, but it will be interesting to see their new rationales for the continued use of SSN (or its replacement) for ID. --Steve --Steve --------------------------------------------------------------------- reply to schear - at - lvcm - dot - com --- PGP mail preferred, see http://www.pgp.com and http://web.mit.edu/network/pgp.html RSA fingerprint: FE90 1A95 9DEA 8D61 812E CCA9 A44A FBA9 RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D --------------------------------------------------------------------- From billp at nmol.com Mon May 4 07:01:06 1998 From: billp at nmol.com (bill payne) Date: Mon, 4 May 1998 07:01:06 -0700 (PDT) Subject: Periods of sequences Message-ID: <354DC8CA.5D34@nmol.com> Monday 5/4/98 7:22 AM chambers, Your statement The advantages are a lack of mathematical structure which might provide an entry for the cryptanalyst, and a huge choice of possibilities; the disadvantages are that there are no guarantees on anything, and as is well known there is a risk of getting a very short period. made at http://www.jya.com/a5-hack.htm#wgc stuck me as profound. Reason is that NSA cryptomathematician Scott Judy once told me that I did not really understand the principles NSA uses for its crypto algorithm. Judy proceeded to explain to me that NSA bases its crypto algorithm on complication, not mathematics. Judy apparently did not realize that some years previous NSA employee Brian Snow showed us about all of NSA's KG schematics. And their field failure records! Masanori Fushimi in Random number generation with the recursion x[t] = x[x-3q]+ x[t-3q],Journal of Applied Mathematics 31 (1990) 105-118 implements a gfsr with period 2^521 - l. http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=0 Fushimi's generator is sold by Visual Numerics. Fushimi's implementation is very well tested. And worked SO WELL that Visual Numerics numerical analyst Richard Hanson had TO BREAK IT! Reason was that the gfsr produces true zeros. This caused simulation programs to crash from division by zero. None of the linear congruential generators produced zeros so the problem did not arise until the gfsr was used. Hanson ORed in a low-order 1 to fix the problem Masanori wrote, Lewis and Payne [16] introduced an apparely different type of generator, the generalized feed back shift register (GFSR), by which numbers are formed by phase-shifted elements along a M-sequence based on a primitive trinomial 1 + z^q + z^p. Lewis was one of my former ms and phd students. http://www.friction-free-economy.com/ Cycle lengths of sequences is a fascinating topic. Let me point you guys to a delightful article on the distribution of terminal digits of transcendental numbers. The Mountains of pi by Richard Preston, v68 The New Yorker, March 2, 1992 p 36(21). This is a story about Russian-born mathematicians Gregory and David Chudnowsky. While the story is fun to read, I think that the Chudnowsky's were wasting their time. I think that terminal digits of transcendental numbers have been proved to be uniformly distributed. Sobolewski, J. S., and W. H. Payne, Pseudonoise with Arbitrary Amplitude Distribution: Part I: Theory, IEEE Transactions On Computers, 21 (1972): 337-345. Sobolewski, J. S., and W. H. Payne, Pseudonoise with Arbitrary Amplitude Distribution: Park II: Hardware Implementation, IEEE Transactions on Computers, 21 (1972): 346-352. Sobolewski is another of my former phd students. Hopefully you guys will read judge Santiago Campos' 56 page MEMORANDUM OPINION AND ORDER on the Payne and Morales lawsuit on jya.com within several days. I made a copy and gave it to Sobolewski on Sunday afternoon. I want Sobolewski's opinion on what Morales and I should do. Soblewski lives about two miles from us. Sobloweski is an administrator [vp of computing at university of new mexico] and knows how administrators think. Let's hope this UNFORTUNATE mess involving shift register sequences gets settled. But let's not forget our sense of humors despite the about .5 million dead Iranians. Hopefully the system will take care of the guys that did that did the Iranians. Masanori wrote, The GFSR sequence as well as the Tausworthe sequence can be constructed using any M-sequence whether the characteristic polynomial is trinomial or not;... Jim Durham, my seismic data authenticator project leader, retired from Sandia. Durham gave me a number of tech reports upon his retirement. One was authored by Robert TITSWORTHE of jpl. TITSWORTHE changed his name! Later guys From chatski at gl.umbc.edu Mon May 4 08:57:44 1998 From: chatski at gl.umbc.edu (chatski carl) Date: Mon, 4 May 1998 08:57:44 -0700 (PDT) Subject: db$: The Wright Brothers vs. Chixalub In-Reply-To: Message-ID: I would like to make 2 short friendly ammendments On Sat, 2 May 1998, Robert Hettinga wrote: > .... that privacy itself was an inherent good. that privacy itself was an inherent good in a hostile environment. But there is a higher goal. In an evironment of plenitude (rather than scarcity) every act can be purely symbiotic and in no-way parasitic. In such an environment, (which we have technologically but not politically/economically) we can create a political/social system where there are no more fascists or statists. Then I want everyone to know everything about me. > ....financial system goes away for a few days. Or a month. financial system goes away forever!! > ...Is there any way to step in with digital bearer settlement as a >robust alternative to book-entry funds transfer? IMHO the only robust, sustainable solution is to eliminate all forms of such accounting altogether, to decouple production from stored ability to get what you need/want. - Carl From tm at algebra.com Mon May 4 10:53:08 1998 From: tm at algebra.com (TruthMonger) Date: Mon, 4 May 1998 10:53:08 -0700 (PDT) Subject: Epic Log - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <354DFE20.531F@algebra.com> Epic Log Rolling - SPACE ALIENS HIDE MY DRUGS!!! ________________________________________________ Dimitry, cleverly trying to distract me from my plan to.... (Damn! It worked...) wrote: That was your best one yet, my friend. Well done. Do you invent as you type or do you prepare first? Do you dream the ideas in progress or summarize a day of dreaming all at once? After being diagnosed with Tourette Syndrome and ADHD, it took me somewhere between 6-18 months to get around to seeing a doctor in regard to treatment. So I guess you could say that 'plans' and 'preparation' are not my strong point. A year or so ago I unexplicably began to write a work called, 'Soul Chaser.' I had absolutely no idea what it was about or where it was going, and it drove me crazy waiting for each chapter to 'appear' so that I could find out what was going to happen. While 'The True Story of the InterNet' manuscripts are created with a purpose in mind, they tend to form themselves out of a mountain of notes jotted to myself in regard to the types of things that force their way into one's mind while lying sleepless at 4 a.m. An integral part of the manuscripts is the insertion of details or concepts which are sent to me for inclusion by a variety of shadowy characters, some of whom I am somewhat familiar with, and some who remain a total mystery to me. An example would be the references to Mule Shoe, Texas as the location of one of the underground Reptilian Nazi bunkers (along with LizardMoor and Lost Alamo). I added Mule Shoe to the list as a result of a mystery request and have no idea what is being inferred, but a number of CoE initiates have reported that they have observed a great deal of concern among certain government organizations about the possible compromise of some mysterious project, or somesuch. As a matter of fact, a few thanked me profusely for the 'pointer' even though they gave me no indication as to what they have uncovered. Granted I've not seen anything relevant to cryptography yet, but I'm not about to complain. Cryptography = Privacy = Rights = Freedom = Ad Infinitum Once the possibilty of extinction of all life from the face of the earth by Nuclear Technology became a *REALITY*, then the scope of many formerly local/regional/national issues and interests became considerably wider/larger. Now that the possibility of extinction of all privacy from the face of the earth by Digital Technology (Can you say 'ECHELON'? Sure you can...) has become a *REALITY*, the scope of many local/global issues and interests have acquired a level of meaning which goes far beyond the particular sphere in which they currently are being debated/instituted. We have recently seen how local pornography laws in the Deep South can affect� the lives of people living locally in California and globally in CyberSpace. We are currently moving toward the same issues and concepts applying internationally. What about the reporter who is currently facing imprisonment for investigating the Truth in regard to child pornography on the InterNet, instead of accepting at face value the 'handouts' from the Privacy Pirates? Anyone who fails to see implications for freedom, privacy and cryptography needs to spend a little less time watching 'Gilligan's Island'. I may soon be facing the same situation in Canada, with the main difference being that the 'Bienfait Nutly News' doesn't carry the same type of clout as the organizations considered by people wearing suits as members of the 'legitimate press'. When I protected all files that I didn't want to fall into the possession of the Royal (pain in the ass) Canadian (beaver, hee...hee) Mounted (on the citizen's behind) Police (gestapo), I made a point of leaving on my hard drive, among other things, a 'pornography file' which I sent to the CypherPunks list, the WhiteHouse, etc., with the announcement that I was purposely distributing vile, filthy pornography that was an affront to every decent person on the face of the earth. Anyone who took the trouble to break the encrypted file would have found that it was a classic Greek(?) statue of a young boy, with his PENIS exposed for God and everybody to see. I truly believe that my digital transmission of this classic work of art makes me, under current law, a child pornographer, even though the only way for anyone to view it would be to crack the encryption on the file. (Thus far, God has not contacted me to express having a problem with my actions, but I suspect that those who have taken it upon themselves to express the opinions of 'everybody' will soon be in contact.) Thanks for the entertainment. 'Entertainment' is the *Medium*, not the *Message*, of 'The True Story of the InterNet' manuscripts. It is a Medium which has lessened, though not removed, the consequences which go hand-in-hand with the dissemination of Truths which meet the high standards expressed by a line in a movie..."You can't *HANDLE* the Truth!" Jim Bell was taken down a few hours after I had sent him a copy of a TSotI chapter describing 'Assassination Politics', and asking his opinion on certain things. (The *only* time I have ever done this.) I took the Jim Bell events to be a clear message that the rules had changed in regard to the dissemination of the TSXotI manuscripts. I did not regard the chapter as 'entertainment'. (I fully recognize the possibility that I may be wrong or 'overreacting' to the synchronicity of the two events, but, on the other hand, I have the perspective of having observed this type of 'synchronocity' since 1989, and have had my sorry ass 'saved' by my 'unreasonable paranoia' many times since then.) I left home two weeks before gomez was cut loose from a company he had founded, after seventeen years, in order to arrive the day before he, himself, received the 'news'. I received the information regarding his elimination from the CoE equation via a source who still remains a mystery to me after almost a decade of cross-communication. I gave the situation only the briefest of mentions in the TSotI manuscripts, because CoE initiates would have no problem with immediately recognizing the import of the event. I did not consider that chapter to be 'entertainment'. Many initiates of the Circle of Eunuchs have recently 'gone to ground', in order to work unobserved in a manner which they feel they can be most effective. Other CoE initiates have stepped forward to accentuate the policies and actions that they have been involved in more surrupticiously until now, even though it may well expose them to retribution, because they feel that that is how they can be most effective. I have given brief mention to some of the results of the directions some of these CoE initiates have taken in various chapters of the TSotI manuscripts, and I do not consider these chapters 'entertainment'. I recently received information in regard to the intentions of the Beaver Bullys to slap their tails down on my sorry butt, and had the option of heading for sandier pastures (Tucson), or covering my ass as much as possible and saying, "Damn the torpedos, full Speed, Ritalin and Prozac ahead!" I chose to do the latter, and have written a bit about it in the TSotI manuscripts. I *do* consider those chapters to be (my) 'entertainment', because 'picking guitar while Rome burns' is the only dance there is... Maybe I'm crazy (maybe?...hee, hee), but if I had the opportunity to travel back in time and *become* Lee Harvey Oswald, I would do so. Can you imagine actually *knowing* the Truth behind what most of us can only specualate about, even though the events surrounding his role/non-role in the assassination of JFK are of monumental import to our times and the *REAL* history of our globe? I have no idea whether or not the Oppressors who have 'legally stolen' my computers will be foolish enough to attempt to take me down within the boundaries of the current legal system, but I can guarantee that, if they do, myself and others will learn more about what is truly going on in the background of 'currently perceived reality' than Lee Harvey Oswald ever dreamed of knowing. There are 'tricks and traps' embedded in the information that I *ALLOWED* the Oppressors to confiscate that are the result of almost a decade of preparation. Anyone who thinks I am 'blowing smoke' failed to read and understand the portion of 'WebWorld & the Mythical Circle of Eunuchs' which detailed the concept of "Winner's Bluff." "TV IS REAL!" (And so is 'Uncle Bubba'...) Thought For The Day: Which 'side' do you, personally, take in regard to the debate as to whether there is, or is not, a Grand Conspiracy taking place in the BackGround Of Reality? The fact of the matter is, it doesn't really matter. The existence or non-existence of the Grand Conspiracy is of no more importance than the existence or non-existence of the Circle of Eunuchs. Definition of Reality: "If you can put it in the bank, it's Real!" ~ Stuart Wilde (misquote) 'Theory of Black Holes' Versus 'Infield Fly Rule': If some scientific genius proves the invalidity of Einstien's theories, then can we expect the victims of Hiroshima and Nagasaki to spring back to life? If everyone on the face of the earth, except for baseball umpires, agree to invalidate the Infield Fly Rule, does it really matter? Are the 'True Story of the InterNet' manuscripts 'entertainment'? Sure. "His login is PANIC, His password is CRASH, When Time is of Essence, He'll Rise from the Ash" was just a 'lucky guess' as to the true importance of the recently acknowledged problem which is presented by the Millennium Bug. Claire Wolfe's statement that there is an "Angel" hidden deep within the bowels of the IRS computer system was just a 'lucky guess'. The evolutionary march of computer technology along the paths predicted by the CypherPunks over the years has been just a long series of 'lucky guesses' resulting from the random output of keyboards taking direct hits during the CypherPunks' legendary pissing contests. Dimitri Vulis' exposure of John Gilmore as a 'cocksucker' was just a 'lucky guess'. The ASCII Art spams revealing that Timmy C. Mayonnaise is the result of early 'Turd Cloning' experiments was just a 'lucky guess'. The suspicion slowly rising from the back of your mind to flip the switch which turns on the light of realization that the insanity of 'The True Story of the InterNet' manuscripts are purposely opaque misdirections of their true purpose, which is to raise the possibility that Kent Crispin, and even you, yourself, may actually be one of US, instead of one of THEM, is just a 'lucky guess'. Giorgio Ivanovitch Gurdjieff posited that humans cannot 'consciously' do evil. I concurr... Is there a method to my madness, or a madness to my method? Hint: I AM the Biosemiotic Evolutionary Equivalent (TM) of Lee Harvey Fucking Oswald. I AM not just 'predicting' the future, I AM 'creating' the future. The CypherPunks are not just 'predicting' the future, they are 'creating' the future. Louis !B Freeh is !just 'creating' the future, he is desperately attempting to prevent Jane and Joe Netizen from doing the same. NEWS FLASH!!! ------------- The AI/Biometrics experts at LizardMoor, Lost Alamo and Mule Shoe are sucking hind-tit to those who have approached Biosemiotic Evolution from the human side of the equation. Vice-Admiral D'Shauneaux, during our intial confrontation, expressed concern that I was unaware of the importance to humankind that the 'Secret War' taking place in the Background of History be 'won' by those who were working in the best interests of humanity and democracy. My reply to him was that, given the human condition, it was imperative that the Forces of Light never triumph over the Forces of Darkness, for the simple reason that it has always been a truism that 'Power corrupts, and Absolute Power corrupts absolutely'. (Lucifer used to be an Angel!) Would you rather be slain by a Moslem saint or a Christian saint, upholding their perception of 'righteousness'? Is ECHELON an abomination? Yes, if it remains unopposed. I have no doubt that ECHELON has resulted in the negation of a plethora of evils which had the potential to result in a great amount of devastation to both the physical and the spiritual conditions of the human equation. I also have no doubt that ECHELON at some point reached a point of competence and control that allowed those involved in 'protecting' us to get sidetracked into a plethora of issues and directions which refelected personal, in-house political agendas, rather than the interests of Truth, Justice, Democracy, and An Honorable Concept To Be Corrupted Later. When You're Up To Your Ass In Alligators, It's Hard To Remember That Your Original Objective Was To Drain The Swamp: True... But when you're up to your ass in EunuchIzens, your 'ass is grass' if you don't get back to your 'original objective'. The nonsensical paranoid diatribes warning against the dire threat posed by Gomez and the Dark Allies in the TSotI manuscripts are not 'entertainment', any more than the C2Net Conspiracy Theory that was presented to those with 'ears to hear' during the legendary CypherPunks Moderation Experiment / Censorship Crisis. Assuming that Sameer's lips are not wrapped around Uncle Sam's cock, C2Net reflects the epitome of CypherPunks goals to promote the spread of strong cryptography around the globe in order to provide access for the citizens to secure private communications. Nonetheless. the involvement of a C2Net employee in the attempt to 'damage' the CPUNX list made one of US (TM) a greater threat to CypherPunk ideals than the actions or intentions of THEM (TM). I have absolutely no problem with Mr. & Ms. ECHELON doing whatever they honestly feel is necessary to protect and defend the globe from what is patently evil, but I have absolutely no interest in them achieving such a privileged, comfortable position in the 'Secret War' that they have enough time on their hands to throw a cold, hard one up the butt of anyone who offends them personally by calling them a 'cocksucker', no matter whether the offender's name ends with an 'i' or a 'y'. Orange Sunshine Is The Best Disinfectant (Judge Cherry Brandy): Tim May was astute enough to recognize that the absence of ignorant, statist morons such as Kent Crispin on the CypherPunks list is a detriment, since the positions he took on various issues were usually the result of careful deliberation, even though he usually had his head up his ass. A forum in which everyone agrees with Chomsky is of no greater benefit to human evolution than a forum where everyone agrees with Freeh. I am astute enough to realize that without the presence of Willam Geiger III on the CypherPunks list, to slap Eric Cordian silly for whining about life 'forcing' him to be a Sheeple, that I would feel like a lone fool for occassionally admitting to being as big an idiot as the Sheeple that I rail against in my self-righteous diatribes. You are astute enough to realize that even without the verifiable presence of Toto in the Authorship of this chapter, given the fact that the manuscripts have always been a shared/distributed project, not to mention the fact that the toto at sk.sympatico.ca account is the Grand Central Station of CyberSpace, it is still incumbent on you to immediately report to the proper authorities my online confession to having murdered a variety of law enforcement agents and buried them in my garden plot in Bienfait. (But, if anybody asks, I was with *you* when JFK was assassinated, OK?) Ten a.m., time for 'River's Edge' on Fox TV. I'll need both hands free, to crack beers and take notes. Smoke 'em if you love 'em... From tm at algebra.com Mon May 4 10:53:13 1998 From: tm at algebra.com (TruthMonger) Date: Mon, 4 May 1998 10:53:13 -0700 (PDT) Subject: Happy Log - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <354E00B9.15F3@algebra.com> Happy Log - SPACE ALIENS HIDE MY DRUGS!!! _________________________________________ Watching 'River's Edge', I remembered why I prefer to remain holed up alone in the BeachBoys' room while Slurping the Dregs with a channel-changer in my hand. It seems that 'River's Edge' wasn't that movie about Paul Newman being a logger--apparently that was 'Sometimes A Great Notion.' Neither was it the John Holmes movie where he plays Johnny Logg, 'Sometimes A Great Motion.' No, it turned out to be the movie that Dennis Hopper made his comeback in, years after it was socially acceptable to openly cheer the social outcasts in 'Easy Rider' or 'Rebel Without A Cause'. Having neither social skills nor self- contol, I cannot refrain from laughing or cheering not just in the 'wrong' places, but also in the 'worst' places... I can relate to Dennis Hopper's character, Feck, when the head murderer in the movie asks him if he's some kind of psycho, since he dances and talks with a life-size sex doll. Feck replies, "I'm not *crazy*, man. I *know* it's a *doll*!" But knowing it doesn't stop him from...caring. I *know* I'm not supposed to hoot, cheer and laugh when Feck tells the 'bad' kid, who murdered his girlfriend, even though he didn't love her, about being justified in blowing the brains out of his own girlfriend, because he 'loved' her, and how he was being hunted and persecuted by a society that didn't understand that his 'apology' was 'sincere', since he really did love her, and about the 'unfairness' of Them still wanting to *punish* him. I *know* that I'm supposed to act horrified at this sick, demented bastard's outlook on life. But knowing it doesn't stop me from...sympathizing. Everyone wants to cheer for the socially acceptable 'UnderDog', but no one wants to cheer for those meeting the current-socially-agreed-upon-profile of the 'MadDog'. NewsWorld did an interview with Jerry Springer in which they asked him how he could possibly justify the outrageous format of his talk show as being of the least bit of 'help' in solving the problems of his guests and society. Springer's reply was basically, "Buy a Clue. I'm the Ringmaster of a Circus." When Springer was asked about his 'descent' from being a respectable member of the mainstream news media, to being the uncontested Joker & Fool of daytime TV, he 'busted' the news media as being a bunch of shylocks who provide a modicum of real news, surrounded by death and disaster in the lives of people we don't know, and sticking microphones in the faces of people who have been 'caught' dipping their dick in the wrong bowl and gleefully screaming 'Gotcha!'. The Masses drive the Media, Entertainment drives the Masses, and the Media drives Entertainment. Because we no longer gather in the public square by the tens of thousands, being whipped into a mass frenzy by the emotive diatribes of the Fuhrer, we believe that we are 'different' from the Germans who wore their BrownShirts in public gatherings, rather than putting them on daily in the privacy of our home, before screaming along in righteous judgement with the studio audience of the 'Jerry Springer Show', or cheering the black-clad ninja warriors on 'Cops' as they kick in the doors of monstrous scum guilty of Felony Dark-Complexion and Felony Inability To Afford A Good Lawyer. After deluging us with a flood of pud-pulling entertainment cleverly disguised as news-coverage of Joey Buttafucko's love life and plans to murder his wife, the smart-asses at NewsWorld tease us with the question, "What was the name of Joey Buttafucko's wife?" Huh? Who the fuck cares? She's just some fucking bit-player victim who gets a couple minutes of air-time in the midst of the massive coverage of the actions, psyche and motivations of the 'main protagonist' in an ongoing 'news' saga designed to increase popcorn and soft-drink sales. The news media is well aware that 'the show is over' the minute they ask the question that enquiring slimes *really* want to know, which is, "What did it *feel* like when you were sucking the life force out of another human being?" (And the follow-up question, "Do you have any pictures?") Daytime Primetime Talk Shows fall all over one another to schedule the guy who got his dick cut off with garden shears. His 'fifteen minutes' gets stretched to the max, along with a guarantee of future reruns. Let some woman get her pussy ripped out by a psycho, and it is given quick, short coverage, during which the news persons look at their shuffling feet, because a woman's private parts are 'dirty' and she was probably wearing a skirt that was too short. If a woman wants to make the big bucks on the talk-show circuit, she needs to get her face slashed with a razor, since women are supposed to look pretty, but not supposed to like sex. (In Moslem countries, however, it is bad taste to give a large amount of coverage to a woman whose face is slashed with a razor, because the slut was probably wearing a veil that was too short.) Canada had a Real Life (TM) rendition of 'River's Edge' take place in Flin Flon, Manitoba (?), where a bunch of teenagers kept silent about the murder of one of their friends by another of their friends, for six months (?) or so, but it didn't have Dennis Hopper in it, so there were no reruns, making the details a little too fuzzy to really remember. Life doesn't *imitate* TV, Life *is* TV, but not as well funded and produced. If you don't recognize this as being the truth, it's because "You can't *HANDLE* the truth!" You gotta have a system... People instictively understand this, which is why I am able to support myself with email spams titled, "How To Make Big $$$ Sitting At Home, Licking Your Own Dick." Unsolicited Commercial Email and Political Parties run on basically the same underlying concept, which is that Horatio Alger can tell us any lies he wants, and put his dick anywhere he pleases, as long as shit still runs downhill and payday is still on Friday. Name the last two bills passed by Congress. Name the last two women Slick Willie dipped his dick in. News...give me a break... Am I supposed to feel 'guilty' about being some sick, sorry, demented psycho weirdo for fixating on and relating to the 'wrong' imaginary characters and 'wrong' emotive issues that are involved in a TV movie? According to my calculations, I still have over four hundred unused Reality Avoidance Credits that I have earned by not giving a fat rat's ass where Slick Willy's dick has been for the last few years of news coverage regarding the size, shape, smell and feel of Little Willie. My failure to become obsessional in regard to the travel schedule of the President's dick is likely to work against me if I find myself in the position of having to defend my position as an EditWhore and ReportWhore for the Bienfait Nutly News, when I find myself facing charges for the public dissemination of a graphic image of a classic Greek statue of a young boy whose petite, well-formed, beautiful, sexy young penis... Where was I...? Sorry... I'm actually homophobic, but I got caught up in the arguments for the graphic being viewed as 'obscene' that a prosecutor would be able to make if his personal experience in the sick, twisted molestation of his own child and those of others gave him a firm understanding of the danger that is presented by Pornography Cleverly Disguised As Art. If somebody wants to compose a Bienfait Nutly News report about the President's dick, I would be more than happy to publish it and get my share of the billion-dollar giveaway of Digital WaveSpace. Beer break...molest 'em if you got 'em (tied up)... From tm at algebra.com Mon May 4 11:52:11 1998 From: tm at algebra.com (TruthMonger) Date: Mon, 4 May 1998 11:52:11 -0700 (PDT) Subject: The Brain: phones home all your URLs? In-Reply-To: <354DF3DC.8F9E8ACB@best.com> Message-ID: <354E0978.69B9@algebra.com> gm wrote: > I recently installed a copy of The Brain - a nifty UI shell. But my > Temporary Internet Files folder filled up with entries of the form: > "http://// > In other words each of my web accesses was 'phoned' in to the mother > brain server, which invoked some back-end .DLL with my URL access as an > argument. Scenario #1: You're a CypherPunk who is dedicated to the creation and dissemination of programs which enhance privacy and security in InterNet software implementations. You want to create a secure program for a particular use, but you are very busy with other projects and it would take about $30,000 to farm it out to someone else... Scenario #2:You are a Corporate Marketeer and you are dedicated to gathering all of the end-user data possible to make the most efficient use of your company's resources. You see the possibilities for creating the same program that the CypherPunk is considering and you have a rather large budget... Scenario #3:You are Head Honcho in the SeeAllKnowAll Department of the Oppressors, and you are dedicated to keeping track of such things as which hand Joe & Jane Citizen wipe their ass with. You the possibilities of the program the CypherPunk is considering, you see the potential of 'adding to' the program needed by the Marketeer, and you happen to have a mountain of resources at your fingertips and close connections with the company the Marketeer is working for... Bottom Line: Britain, more comfortable with the marriage of Government, Corporate and Individual interests in a Socialist/Fascist mix, are openly seeking to merge the Government and Corporate interests in security, etc., in the interests of the Citizen, of course. In the U.S. this is not happening. It is only a coincidence that all goverment and corporate offices share the same building and resources and this fact is only kept 'secret' in the interests of National Security, and to fight terrorists, pedophiles, drug czars, and people who wipe their ass with the 'wrong' hand. Toto From tm at algebra.com Mon May 4 12:31:25 1998 From: tm at algebra.com (TruthMonger) Date: Mon, 4 May 1998 12:31:25 -0700 (PDT) Subject: Toto 2 - Tim May 0 Message-ID: <354E178C.3738@algebra.com> Vancouver, British Columbia: Criminalization of Insanity: Turn a mental hospital with 6,000 patients into a mental hospital with 500 patients. Criminalization of Poverty: Make panhandling a crime, subject to a $2,000.00 fine. [I won! I won!!!] Toto From swire.1 at osu.edu Mon May 4 13:04:18 1998 From: swire.1 at osu.edu (Peter Swire) Date: Mon, 4 May 1998 13:04:18 -0700 (PDT) Subject: A new Swiss banking novel Message-ID: <3.0.5.32.19980504160422.00fc66e0@pop.service.ohio-state.edu> Greetings: This weekend I finished reading a novel that talks about many of the issues of interest to this group. It's Christopher Reich, "Numbered Account," Delacorte Press. The author was a real Swiss banker for a few years. Now he writes a pretty darn good suspense novel featuring how numbered Swiss bank accounts work. In the cryptography debates, the FBI makes a big deal about how anonymous bank accounts can be used by drug smugglers, money launderers, international arms merchants, and anti-Western terrorists. They're all here in the novel. So are the U.S. government agents -- a bit bumbling, thoroughly obnoxious and self-righteous, but also genuinely concerned about stopping truly bad people. Reich also talks a bit about a new crypto system the bank develops for handling secret transactions. I think the book works pretty well as a story. It also gives human faces to the issues of bank secrecy, money laundering, and anonymous accounts. If we are to find ways to have anonymity in cyberspace, we will have to confront the bad things that anonymity can bring. I'd be interested to hear anyone else's reactions to the book. More generally, what do you say to well-intentioned people when they say the following -- won't anonymous accounts contribute, at least a bit, to more drug smuggling, arms smuggling, and international terrorism? [Please, no flames. I am writing an academic article this summer on money laundering and financial privacy. Money laundering laws hold the potential to choke off cryptography and financial privacy generally. How can supporters of privacy best answer back to the calls for stricter regulation?] Peter Swire Prof. Peter Swire Ohio State University College of Law (614) 292-2547 http://www.osu.edu/units/law/swire.htm (includes draft book on European Privacy Directive and Internet Privacy Page) From caj at math.niu.edu Mon May 4 13:04:56 1998 From: caj at math.niu.edu (Xcott Craver) Date: Mon, 4 May 1998 13:04:56 -0700 (PDT) Subject: Bad, bad, bill In-Reply-To: <19980501153418.25294.qmail@hotmail.com> Message-ID: On Fri, 1 May 1998, Corvus Corvax wrote: > "WASHINGTON - The Senate Judiciary Committee on Thursday adopted the > Digital Millennium Copyright Act, which takes a new step toward > protecting creative content in cyberspace by outlawing the equipment > used to commit a copyright infringement, not just the act or intent of > illegally copying material. > ... Yah. This same was mentioned on a digital watermarking forum I read. A great deal of my own research centers around attacking & finding weaknesses in such schemes, and as it's science I am obliged to write code to prove my hunches. This bill may make me a criminal! This struck a nerve at the time, because the fella who mentioned the bill was (a) an employee of a watermarking company and (b) mad as Hell at the rest of us for developing watermark attack software. If that law was on the books (and the guy was the CEO or such) at the time, I have no doubt a few of us would be in big legal trouble. Now, I should disclaim that that particular company is much more understanding than that one guy. I met a bunch of their employees (as did a couple other attack-makers) at a conference, and they were quite clueful about the importance of watermark robustness research. However, countless other watermarking startups exist. Many have the whole business bet on a potentially breakable scheme. Further, watermarking involves people from non-crypto disciplines, such as image processing, where folks are more likely to make security mistakes and less likely to appreciate the need for an adversarial research mode. This spell DANGER, boys and girls. Some company consisting of few people, lots of venture capital, little experience and lots of tunnel vision is IMHO likely to resort to this law when researchers find a big hole in their breadwinning technology. I should add that watermark attack tools like unZign and StirMark are now used as benchmarks by developers of new schemes. It's only been, what, half a year since StirMark was created? A gaggle of watermarking papers already cite it, and include it in a standard volley of tests. These are not evil warez from Hell here. -Xcott ==- Xcott Craver -- Caj at niu.edu -- http://www.math.niu.edu/~caj/ -== "Also note that elecronagnetic theory proves that if you microwave a bar of Ivory soap it turns into a REAL MARSHMALLOW THAT YOU CAN EAT." -James "Kibo" Parry From sunder at brainlink.com Mon May 4 15:41:07 1998 From: sunder at brainlink.com (Sunder) Date: Mon, 4 May 1998 15:41:07 -0700 (PDT) Subject: Blizzard Gets Sued For Snooping On Gamers Message-ID: <354E42A8.6C422A1A@brainlink.com> ---------- Forwarded message ---------- Date: Sun, 3 May 1998 14:29:23 -0400 From: Salvatore Denaro To: 'Ray Arachelian' Subject: send to list? They might find this interesting --- Blizzard Gets Sued For Snooping On Gamers --- Game developer Blizzard Entertainment is being sued for unlawful business practices, stemming from the revelation that the company's hot-selling new StarCraft snoops through players' hard drives and e-mails information to the company over the Internet. http://www.techweb.com/news/story/TWB19980430S0015 From caj at math.niu.edu Mon May 4 16:11:50 1998 From: caj at math.niu.edu (Xcott Craver) Date: Mon, 4 May 1998 16:11:50 -0700 (PDT) Subject: A new Swiss banking novel In-Reply-To: <3.0.5.32.19980504160422.00fc66e0@pop.service.ohio-state.edu> Message-ID: On Mon, 4 May 1998, Peter Swire wrote: > Greetings: > > I'd be interested to hear anyone else's reactions to the book. More > generally, what do you say to well-intentioned people when they say the > following -- won't anonymous accounts contribute, at least a bit, to more > drug smuggling, arms smuggling, and international terrorism? You say, "Yes. Yes they could. And so could cars." > [Please, no flames. I am writing an academic article this summer on > money laundering and financial privacy. Money laundering laws hold the > potential to choke off cryptography and financial privacy generally. > How can supporters of privacy best answer back to the calls for > stricter regulation?] I dunno. I guess the best way to answer those calls in the public arena is to let people know that crypto is useful stuff that everyone will need as transactions move online. The shady argument that crypto & anonymity can facilitate crime is merely an attempt to associate the two, to give the public the impression that this crypto stuff is up there with assault weapons and C4, something which can and should be controlled, while not really affect law-abiding citizens. I advise crypto proponents to halt any analogy-making to firearms, for this reason. Nothing against guns, of course; but to gain acceptance crypto cannot be dropped in the same conceptual bin as guns. -Xcott ==- Xcott Craver -- Caj at niu.edu -- http://www.math.niu.edu/~caj/ -== "This is a different thing: it's spontaneous and it's called 'wit.'" -The Black Adder From pornstar at thepentagon.com Mon May 4 17:04:25 1998 From: pornstar at thepentagon.com (©ÇhÆ£k®¾¿) Date: Mon, 4 May 1998 17:04:25 -0700 (PDT) Subject: L I S T ! ! ! ! ! In-Reply-To: <354E178C.3738@algebra.com> Message-ID: <354E4919.A8B7B58B@thepentagon.com> GET ME OFF THIS LIST!!!!!!!!!!!!!!! TruthMonger wrote: > Thanks for using NetForward! > http://www.netforward.com > v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v > > Vancouver, British Columbia: > > Criminalization of Insanity: Turn a mental hospital with 6,000 patients > into a mental hospital with 500 patients. > > Criminalization of Poverty: Make panhandling a crime, subject to a > $2,000.00 fine. > > [I won! I won!!!] > > Toto From caj at math.niu.edu Mon May 4 17:43:23 1998 From: caj at math.niu.edu (Xcott Craver) Date: Mon, 4 May 1998 17:43:23 -0700 (PDT) Subject: Holy QPRNF... Message-ID: <199805050043.TAA22628@baker.math.niu.edu> http://biz.yahoo.com/prnews/980504/ca_live_pi_1.html Summary: Digimarc and Live Picture, Inc., team up to offer watermarking services. || ``Until very recently, the creative community was extremely skeptical of || licensing and marketing their work over the Web, which they viewed as an || absolute free-for-all,'' said Doug Dawirs, director of online services at || The Workbook. ``Now these same people and companies are jumping in with || both feet.'' I hope no content creators mistakenly think that this is electronic content protection (possibly, one can say an aid to detect _unintentional_ illicit use, but not intentional theft), or else there will be a free-for-all of a legal kind a little further down the road. I also wonder about the proposed batch processing option, embedding the same watermark into multiple images. I can see a number of security problems here, especially if Live Picture can not (likely) keep track of all the images marked by them. =Xcott From edsmith at IntNet.net Mon May 4 18:13:08 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Mon, 4 May 1998 18:13:08 -0700 (PDT) Subject: A new Swiss banking novel In-Reply-To: <3.0.5.32.19980504160422.00fc66e0@pop.service.ohio-state.edu> Message-ID: <3.0.2.32.19980504210938.008639a0@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 04:04 PM 5/4/98 -0400, you wrote: >Greetings: > > This weekend I finished reading a novel that talks about many of the >issues of interest to this group. It's Christopher Reich, "Numbered >Account," Delacorte Press. The author was a real Swiss banker for a few >years. Now he writes a pretty darn good suspense novel featuring how >numbered Swiss bank accounts work. In the cryptography debates, the FBI >makes a big deal about how anonymous bank accounts can be used by drug >smugglers, money launderers, international arms merchants, and anti- Western >terrorists. They're all here in the novel. So are the U.S. government >agents -- a bit bumbling, thoroughly obnoxious and self-righteous, but also >genuinely concerned about stopping truly bad people. Reich also talks a >bit about a new crypto system the bank develops for handling secret >transactions. > Excuse me for asking, but what's so bad about "drug smugglers, money launderers, international arms merchants, and anti-Western terrorists." Edwin E. Smith -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNU5m0UmNf6b56PAtEQJ9+wCfRNVsy7MEcbeQ7H5UZswN4aUqP6AAnipg QbOt7mM01LbEyIqOwG2DE83l =+S8l -----END PGP SIGNATURE----- When freedom is outlawed.......Only outlaws will be free! If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz. Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at: http://www.self-gov.org/quiz.html IS AIDS A GOVERNMENT/DRUG COMPANY HOAX? http://www.virusmyth.com/aids/index.htm From edsmith at IntNet.net Mon May 4 18:25:34 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Mon, 4 May 1998 18:25:34 -0700 (PDT) Subject: A new Swiss banking novel In-Reply-To: <3.0.5.32.19980504160422.00fc66e0@pop.service.ohio-state.edu> Message-ID: <3.0.2.32.19980504211950.0086c620@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 06:11 PM 5/4/98 -0500, you wrote: > I advise crypto proponents to halt any analogy-making to >firearms, for this reason. Nothing against guns, of course; but to gain >acceptance crypto cannot be dropped in the same conceptual bin as guns. > > -Xcott I agree completely. While I support the right to own guns (and nukes) by anyone, guns can be used both ofensively and defensevely while crypto can only be used defensevely. That is unless you put PGP on a stack of diskettes, glue them together and whack somebody with them. Edwin -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNU5pNUmNf6b56PAtEQLOFQCgvJ2MpcZ6or2bFKdoXc4NRyPn70IAni/X WOf+RzpEgwuIXGEVoHi9DKSa =b+pp -----END PGP SIGNATURE----- When freedom is outlawed.......Only outlaws will be free! If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz. Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at: http://www.self-gov.org/quiz.html IS AIDS A GOVERNMENT/DRUG COMPANY HOAX? http://www.virusmyth.com/aids/index.htm From mgraffam at mhv.net Mon May 4 18:38:58 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Mon, 4 May 1998 18:38:58 -0700 (PDT) Subject: A new Swiss banking novel In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Mon, 4 May 1998, Xcott Craver wrote: > I advise crypto proponents to halt any analogy-making to > firearms, for this reason. Nothing against guns, of course; but to gain > acceptance crypto cannot be dropped in the same conceptual bin as guns. And spin the same propoganda wheel as the Man? Not me. I don't see crypto gaining acceptance among the masses out of fear. Look.. saying "Bad guys can use crypto to not get caught, and they can use guns to kill people, so lets outlaw crypto and guns." Isn't an argument based on reason so much as it is fear. "Bad guys" strike fear into the hearts of people, and they will do anything to protect themselves, including shooting themselves in the foot. For every bad point that can be found for private ownership of firearms a postive one can be found. The same goes for crypto. Guns can protect us from criminals. Criminals can use guns to kill us. Crypto can protect us from criminals. Criminals can use crypto to protect themselves. The list can go on and on, and in the end it all will boil down to freedom on the one hand, and some sick, distorted view of safety on the other. Fear is more persuasive than rationality. The people will gravitate to the side that suits them. Freedom is a damn scary sight, so safety is embraced. If you want to save crypto (and guns too, btw) talk about freedom and privacy first and crypto second. It probably won't work though.. just like talking about freedom and the right to self-defense didn't work with firearms. As for me.. I don't give a damn how many laws are passed and what sort of punishments are put into the books: I'll use crypto, get M^S mod N tatooed on my forehead, and still say whatever I like. And if "they" want to talk over my position with me in Room 101, they can take the issue up with the .45 that I'm not supposed to have. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "Let your life be a counter-friction to stop the machine." Henry David Thoreau "Civil Disobedience" -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQCVAwUBNU5rxwKEiLNUxnAfAQGQ0wP/TD3tVmCDwthBnZE1nDaWDY2xzAPNfiMy HyjyjfxNqYsmIsGpjpaqAWHC+e2qcfaYvPzpMqc0kNmIrFGHd5tA888aVnPbXSw1 0mBIVyITguplGQBLj9YiJk3TFYgU55rmOI3bGHkt/ytoH8CxBMHCOWEkUFR+C489 6GAj62wOO50= =c7Pc -----END PGP SIGNATURE----- From caj at math.niu.edu Mon May 4 19:33:39 1998 From: caj at math.niu.edu (Xcott Craver) Date: Mon, 4 May 1998 19:33:39 -0700 (PDT) Subject: A new Swiss banking novel In-Reply-To: Message-ID: On Mon, 4 May 1998 mgraffam at mhv.net wrote: > On Mon, 4 May 1998, Xcott Craver wrote: > > I advise crypto proponents to halt any analogy-making to > > firearms, for this reason. Nothing against guns, of course; but to gain > > acceptance crypto cannot be dropped in the same conceptual bin as guns. > > And spin the same propoganda wheel as the Man? Not me. I don't see crypto > gaining acceptance among the masses out of fear. I don't think it's spinning the same propaganda wheel. In fact, if anything, you're probably giving in to "the Man" by letting this view of crypto persist. That is, IMHO; since IMHO the feds are trying to push this view of crypto. The implicit connection between crypto and weapons is what will allow the feds to cater to that fear to get it banned. Further, as many people simply don't own guns, many are easily detached from gun-related issues. A large part of the CA smoking ban was due to this same detachment: a large non-smoking majority really doesn't give a damn about smokers' rights, because they don't see it hurting them. The TRVTH is that crypto will be used by just about anyone who does anything over an electronic link. People will need it for friendly day-to-day transactions. A crypto ban will be harder to push if people see crypto in this way: less like a gun, more like a car or a beeper; maybe useful to criminals but useful in everyday affairs to law-abiding people too---nay, NECESSARY--and a silly thing to ban. If you stick with the line that "crypto, like a gun, can be used by good guys as well as bad guys," you'll give across the opposite impression. Rather than seeing crypto as something they want and will use a lot, many people will see crypto as something they probably won't even have in their house, something whose actual use is something to be avoided. I mean, you could probably get steak knives banned in today's climate by defending them like that. -Xcott From tcmay at got.net Mon May 4 19:43:29 1998 From: tcmay at got.net (Tim May) Date: Mon, 4 May 1998 19:43:29 -0700 (PDT) Subject: A new Swiss banking novel In-Reply-To: Message-ID: At 6:19 PM -0700 5/4/98, Edwin E. Smith wrote: >I agree completely. While I support the right to own guns (and nukes) >by anyone, guns can be used both ofensively and defensevely while >crypto can only be used defensevely. > >That is unless you put PGP on a stack of diskettes, glue them >together and whack somebody with them. Sorry, but this is nonsense. Crypto can and has been used just like any other weapon. The freedom fighters in Burma who use PGP to communicate securely and to plan bombings against their oppressors...how can this be said to be "only defensive"? I've said this many times, so I won't spend more time here. All "defensive" weapons have "offensive" uses. Even shields, even armor, even crypto. To think otherwise is to show no awareness of history. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From jya at pipeline.com Mon May 4 20:12:23 1998 From: jya at pipeline.com (John Young) Date: Mon, 4 May 1998 20:12:23 -0700 (PDT) Subject: NSA Ordered to Tell Secrets Message-ID: <199805050312.XAA10343@camel7.mindspring.com> In an April 30 Memorandum Opinion and Order Senior US District of New Mexico Judge Santiago Campos has ordered the National Security Agency to produce in camera evidence that it can refuse to respond to allegations of NSA intercepts of Libyan and Iranian encrypted messages in the 1980s. http://jya.com/whp043098.htm (102K) This order was issued in repsonse to cryptographer Bill Payne's FOIA request for the information as part of his wrongful termination suit against NSA and Sandia National Laboratory. In the 56-page order Judge Campos reviews the principal actions in the suit, and to buttress the order for NSA to tell him what it knows about the intercepts invokes recent FOIA regulations which more stringently require intelligence agencies to substantiate the use of the "Glomar response" in refusing to affirm or deny the existence of information on the grounds that to do so would harm national security. He states that case law requires more diligent review in the case of "Glomarization," so he is obligated to make a review in this instance. He states that based on what NSA has heretofore provided the court, withholding of information on these intercepts does not appear justified. Campos has reviewed public documents on allegations of the Swiss firm Crypto AG's "spiking" of its cryptographic equipment (with direction by NSA for backdoors) then selling it to Libya and Iran, Crypto AG's employee Hans Buehler's story of the work, Reagan's statement on the intercepts, and other reports, and finds that while the stories are not authoritative of the USG position, they do warrant his detailed review of NSA's Glomar response. Campos says, paraphrased, "if NSA continues to have the right it claims in this case to determine what is secret and what is not, then it can declare anything secret and thereby undercut the very purpose of the FOIA. That is not acceptable." It's an impressive summary of the legal conflict between the public's right to know and governmental secrecy. And may help ease access information on NSA global surveillance operations. Or, if Campos decides in NSA's favor, may shut the door more securely. From edsmith at IntNet.net Mon May 4 20:29:45 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Mon, 4 May 1998 20:29:45 -0700 (PDT) Subject: A new Swiss banking novel In-Reply-To: <3.0.2.32.19980504211950.0086c620@mailhost.IntNet.net> Message-ID: <3.0.2.32.19980504232748.00864230@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 07:43 PM 5/4/98 -0700, you wrote: >At 6:19 PM -0700 5/4/98, Edwin E. Smith wrote: > >>I agree completely. While I support the right to own guns (and nukes) >>by anyone, guns can be used both ofensively and defensevely while >>crypto can only be used defensevely. >> >>That is unless you put PGP on a stack of diskettes, glue them >>together and whack somebody with them. > >Sorry, but this is nonsense. > >Crypto can and has been used just like any other weapon. The freedom >fighters in Burma who use PGP to communicate securely and to plan bombings >against their oppressors...how can this be said to be "only defensive"? > >I've said this many times, so I won't spend more time here. All "defensive" >weapons have "offensive" uses. Even shields, even armor, even crypto. > >To think otherwise is to show no awareness of history. > > >--Tim May > > >"The tree of liberty must be watered periodically with the blood of >tyrants...." >---------:---------:---------:---------:---------:---------:--------- :---- >Timothy C. May | Crypto Anarchy: encryption, digital money, >ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero >W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, >Licensed Ontologist | black markets, collapse of governments. > > > > I suppose that you would consider a forearm raised against a baton to be offensive also! Edwin -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNU6HM0mNf6b56PAtEQIINQCg3y9wKdWphewWDNYcQuU6wsB6UpEAniKm qlII24wLRe3GswRe1o3d27kL =FK0r -----END PGP SIGNATURE----- When freedom is outlawed.......Only outlaws will be free! If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz. Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at: http://www.self-gov.org/quiz.html IS AIDS A GOVERNMENT/DRUG COMPANY HOAX? http://www.virusmyth.com/aids/index.htm From funraiser090 at usa.net Mon May 4 20:40:34 1998 From: funraiser090 at usa.net (funraiser090 at usa.net) Date: Mon, 4 May 1998 20:40:34 -0700 (PDT) Subject: Want a new way to get attention? Message-ID: <199805050340.UAA06898@cygint.cygnus.com> FOR IMMEDIATE RELEASE... NEW COPYRIGHTED U.S. MILLION DOLLAR BILLS CREATE SMILES! Walk into any store and hand them a crisp new... <><><><><> U.S. MILLION DOLLAR BILL <><><><><> and you can be sure to get ATTENTION and smiles! You may even get a date, but you probably won't get any change! These million dollar bills are... LOVED BY EVERYONE !!!! They are fun to give or receive. After all, who wouldn't like a million dollars? **** BUSINESSES and COMPANIES use them to promote their business by saying "Thanks A Million!" Others just like the feel of a wad of million dollar bills in their pockets! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ MILLION DOLLAR BILLS are great conversation openers! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Copyrighted and genuine looking U.S. Million Dollar Bills are an I-N-E-X-P-E-N-S-I-V-E yet unique novelty item that is EXTREMELY WELL DESIGNED! Your total and FULL !!!!!!!! SATISFACTION IS 100% GUARANTEED !!!!!!!!! The bills are a FUN and very profitable item for..... $$$$$$ FUND RAISERS and CHARITIES to raise money $$$$$$$ The bills sell VERY WELL at $1 each and are available in large quantities for less than .45 cents each!!!!!!!! ********** O-R-D-E-R Y-O-U-R-S N-O-W ******** FUN pack... 12 of the million dollar bills only $14.95 ECONO pack.. 20 of the million dollar bills only $19.95 JUMBO pack.. 60 of the million dollar bills only $44.95 DELUXE pack. 150 of the million dollar bills only $89.95 WHOLESALE pack..500 of million dollar bills only $199.95 Your SATISFACTION is GUARANTEED! If not FULLY satisfied return all bills in original mint condition and get.... ############ Money Back no questions asked! ############ Orders can be accepted by cash, check, money orders, VISA, MASTERCARD or AMERICAN EXPRESS via postal mail ONLY to: MJH P.O. Box 14909 San Luis Obispo, CA 93406-4909 Name ___________________________________________________ Shipping Address _______________________________________ City_________________________ ST ____ Zip ______________ Payment method: ___ VISA ___ MC ___ American Exp. ___ Cash ___ Check ___ Money Order Credit Card Number: ____________________________________ Expiration date: ______________ Order Amount: __________ Signature: _____________________________________________ Ordering packet: ___ Fun $14.95 ___ Econo $19.95 ___ Jumbo $44.95 ___ Deluxe $89.95 ___ Wholesale $199.95 All orders INCLUDE SHIPPING and HANDLING !!!!! From mgraffam at mhv.net Mon May 4 20:55:31 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Mon, 4 May 1998 20:55:31 -0700 (PDT) Subject: A new Swiss banking novel In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Mon, 4 May 1998, Xcott Craver wrote: > I don't think it's spinning the same propaganda wheel. In > fact, if anything, you're probably giving in to "the Man" by > letting this view of crypto persist. That is, IMHO; since > IMHO the feds are trying to push this view of crypto. I understand this view, but I don't see the worth in whitewashing things for the public. We've been fed enough BS already.. defending crypto with ready-made arguments that sound good and don't conjure up images of firearms is no different to me than spinning a long tale about Iraqi terrorists and drug dealers that conjure up fear to support the ban on weapons. I'd rather speak the truth, so far as I understand it, and let it conjure up what it may. > The implicit connection between crypto and weapons is what > will allow the feds to cater to that fear to get it banned. I understand this. They've got us good. Those that would ban crypto would have the public believe that we are all a bunch of crazy, paranoid math/computer geeks and that the FBI, NSA and their ilk can protect the public from harm (and us?). That fear will always get fed upon. That fear will be used to twist things all out of shape until they seem to be a negative image of what is really there. This happens all the time. If we are going to combat this stuff, it is going to have to be by fighting that fear, and not throwing around horse-shit arguments like big business and the government do. If we are going to ease the fear of _guns_, then responsible adults need to start (or further) gun clubs. Larger clubs need to take part in civic events to show the people by their actions that they aren't a bunch of lunatics who shoot at everything that moves. Such clubs need to work with civilian watch organizations and the police to train citizens to respect firearms and to help get illegal weapons off the streets. Cypherpunks need to write code. We need to show people that strong crypto isn't just some obscure technology used to lock away kiddie porn and transmit super-spy doomsday messages. We need to get good, user friendly, applications to do document signing, watermarking, email encryption, bulk file encryption, and countless other tasks. These applications have to be usable; they have to integrate in with the user's desktop and ordinary applications (MS Word, Photoshop, etc) as well as possible. I think that we all know that the uses and benefits of strong crypto far outweigh the drawbacks. The uses are there, today. If we could plug strong crypto into the desktop; if the "Kick-ass-military-grade crypto ON" button were a click away from "Save as.." and if all that were sitting on John Q. User's naked Cindy Crawford desktop picture, then it would become as friendly to them as any other feature MS Word, and soon enough the very statement "Bad guys use crypto" begins to sound dumb because the fear isn't there anymore. Fundamentally fear is irrational. The best arguments in the world won't speak to an irrational person. You have to ease those fears with actions. Again.. cypherpunks write code. > The TRVTH is that crypto will be used by just about anyone > who does anything over an electronic link. People will > need it for friendly day-to-day transactions. Absolutably. I just don't think that they will get this by talking about how crypto can be used in friendly day-to-day transactions. > A crypto ban will be harder to push if people see crypto in this way: > less like a gun, more like a car or a beeper; maybe useful to > criminals but useful in everyday affairs to law-abiding people > too---nay, NECESSARY--and a silly thing to ban. Cheers! :) > If you stick with the line that "crypto, like a gun, can > be used by good guys as well as bad guys," you'll give > across the opposite impression. But it can. Just like a beeper or a car can. Just like any sort of technology can. This is the truth, and I'm not in the business of lying. When John Q. America tells me that drug dealers use guns, I'll agree and point to the police officers (damn.. not real good example, but you get the idea :) When they quiver in their boots because of IDEA or CAST and tell me that bad guy Y uses crypto to hide his world domination plans, I'll agree, and then I'll point to the U.S. defense messaging system. > I mean, you could probably get steak knives banned in today's > climate by defending them like that. I'm sure you are right.. but defending them like that is the _truth_ any technology _can_ be used for good or evil.. we have to stop the people, not the technology. Even though your method may work a little more efficiently, it tries to cover over the truth; to hide it. I can't do that. Covering up the truth is a step away from denying it.. an easy step to make going down, but it is one hell of a hard climb coming back up. I'll take my chances with C, and maybe some Perl if I'm lucky. If things really get hairy, I can always resort to the tatoo and the .45 Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "Let your life be a counter-friction to stop the machine." Henry David Thoreau "Civil Disobedience" -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQCVAwUBNU6LygKEiLNUxnAfAQEiXwQAos6MRfoG1zPXfEvcPD5Qp4P/oXImd1IG Rf4nphQpsla6aqLl4mh618CJ2iOb4wXV+f0JWcge4GQKVULxC3LeqhtJp25uToMc rAzUg7LrjIkKaB0j8sWmE+7zGuvX7fzDxT+k3UkXFArwS5ZRrGTW0Ec1h8fkA8Ic Ccft2AXDk+I= =LjLm -----END PGP SIGNATURE----- From special at teacup.wbvs.com Mon May 4 22:03:53 1998 From: special at teacup.wbvs.com (special at teacup.wbvs.com) Date: Mon, 4 May 1998 22:03:53 -0700 (PDT) Subject: RON JEREMY UNPLUGGED!!! Message-ID: <199805021349.GAA23554@TEACUP.WBVS.COM> NOTICE...MINORS ARE STRICTLY PROHIBITED!!!! Get a FREE autographed photo of Adult icon RON JEREMY when you order any video from the premiere adult video web site on the net. And...with our try before you buy guarantee, you can see over 1,000 hardcore video previews on line. As an added bonus, buy any two videos and get your choice of a FREE video and the RON JEREMY photograph. No other Web site can make you this offer. http://208.233.66.150 Offer is for a limited time, so order before May 5, 1998, or you will miss out on this grea t deal. For the best sexual reference library, visit www.kinkysexacts.com. /////////////////////////////////////////////////////////////////////////////// If you wish to be removed from future mailings, please reply with the subject "Remove" and this software will automatically block you from our future mailings. //////////////////////////////////////////////////////////////////////////////// From anonymous at netassist.se Mon May 4 22:41:03 1998 From: anonymous at netassist.se (Anonymous) Date: Mon, 4 May 1998 22:41:03 -0700 (PDT) Subject: corvette.bxa.doc.gov In-Reply-To: Message-ID: <93e305df326c177e9c0b2bb0ed69b147@kapten.zoom.nu> mgraffam at mhv.net writes: > Ahh well.. from your log entries, it seems as if corvette isn't > necessarily just running a bot. It looks as if humans might be running > around too. I prefer the bot, personally.. An AltaVista search for the name yields a number of www logfiles (including MIL sites) that go back until 1996. FOIA, anyone? From caj at math.niu.edu Mon May 4 23:48:14 1998 From: caj at math.niu.edu (Xcott Craver) Date: Mon, 4 May 1998 23:48:14 -0700 (PDT) Subject: Explaining crypto to people (was Re: A new Swiss banking novel) In-Reply-To: Message-ID: On Mon, 4 May 1998 mgraffam at mhv.net wrote: > On Mon, 4 May 1998, Xcott Craver wrote: > > I understand this view, but I don't see the worth in whitewashing things > for the public. We've been fed enough BS already.. defending crypto > with ready-made arguments that sound good and don't conjure up images > of firearms is no different to me than spinning a long tale about > Iraqi terrorists and drug dealers that conjure up fear to support the > ban on weapons. I'm not advocating "ready-made" arguments. Rather, I'm suggesting that we get rid of an *analogy*. An analogy isn't the truth. In this case, it's a way to frame the truth for non-technical people. Dropping an analogy is subtracting BS, not adding it. Now, I'm not saying analogies are evil, but the analogy to firearms is a *bad* one, and it stands to give people the misconception that crypto is many things that it is not (not to mention including ). If you want to analogize crypto to something, analogize it to something crypto is more like. > > The implicit connection between crypto and weapons is what > > will allow the feds to cater to that fear to get it banned. > > I understand this. They've got us good. Those that would ban crypto > would have the public believe that we are all a bunch of crazy, paranoid > math/computer geeks Well, after all, once we perfect the neural interface, we _will_ all become munitions. > If we are going to combat this stuff, it is going to have to be by > fighting that fear, and not throwing around horse-shit arguments like > big business and the government do. You can't fight fear unless you remove some misconceptions. The association with firearms (which is in turn associated by the gov't to baaad things) is only going to cause misconceptions in the public arena. > If we are going to ease the fear of _guns_, then responsible adults need > to start (or further) gun clubs. This is, IMHO, the wrong way to remove the fear caused by the crypto-firearm analogy. The right way is to drop the analogy, because it's flawed. I agree that people should be less afraid of guns, but you just don't have TIME to cure that, if you can at all. > I think that we all know that the uses and benefits of strong crypto > far outweigh the drawbacks. The uses are there, today. If we could plug > strong crypto into the desktop; if the "Kick-ass-military-grade crypto ON" > button were a click away from "Save as.." and if all that were sitting > on John Q. User's naked Cindy Crawford desktop picture, then it would > become as friendly to them as any other feature MS Word, and soon enough > the very statement "Bad guys use crypto" begins to sound dumb because > the fear isn't there anymore. ..As will the phrase, "cryptography is like a gun...." Joe User won't see authentication as "like a gun" any more than his telephone is "like a gun." > > If you stick with the line that "crypto, like a gun, can > > be used by good guys as well as bad guys," you'll give > > across the opposite impression. > > But it can. Just like a beeper or a car can. Just like any sort of > technology can. This is the truth, and I'm not in the business of > lying. ?!!?!!! The phase, "now, bad guys can use this to kill you just like a gun, but responsible law-abiding citizens can use it too" is true for ALL solid objects larger than a breadbox. You do NOT say this, however, when selling someone a halogen lamp or a Tickle-me-Elmo doll, or introducing them to anything new that they should have at home. This doesn't make you a liar. It is chillingly naive to defend an argument on the grounds that when dissected logically it is a true statement. Do you approve of the government repeatedly warning people that "crypto can be used by terrorists!" It is, after all, a true statement! How about the next time you walk through airport security you say, "I could have concealed explosives in my pants." True statement, and you're not in the business of lying. Would you consider yourself less honest for not saying it? See, whatever the truth value of the statement, the end result is the suggestion of a lie. > I'm sure you are right.. but defending them like that is the _truth_ > any technology _can_ be used for good or evil.. we have to stop the > people, not the technology. Even though your method may work a little > more efficiently, it tries to cover over the truth; to hide it. Dropping a flawed analogy isn't covering the truth. Rather, keeping the analogy distorts the truth. It scares and alienates people and makes them think cryptography is this weird stuff they'll never personally use which is less like a PIN number on steroids and more like plastique. And this is the last thing we need. > Michael J. Graffam (mgraffam at mhv.net) -Xcott From mgraffam at mhv.net Tue May 5 01:00:14 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Tue, 5 May 1998 01:00:14 -0700 (PDT) Subject: Explaining crypto to people (was Re: A new Swiss banking novel) In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Tue, 5 May 1998, Xcott Craver wrote: > I'm not advocating "ready-made" arguments. Rather, I'm > suggesting that we get rid of an *analogy*. An analogy isn't > the truth. Agreed. The analogy is not the truth, however, it is true firearms, beepers, cars and another other technology can be used for good or evil. To treat crypto differently than these other technologies merely because we have an interest in it is less than desirable. What I advocate is to present the view that the technology in all forms be advanced, and where appropriate disclosed. Undisclosed BS crypto algorithms have hurt us for to long. Bad design in the telephone system has done the same. I advocate full disclosure and advancement. When those who are scared of these things try to leverage fear against it by saying that undesirable can/will use it, I will not deny this, because it is true. Having said that, I don't really think it is necessary to go around saying "Crypto is like a bomb" either. Crypto _can_ be used as a defensive or an offensive weapon, however the same technology can be used for authentication and digital cash and loads of other neat stuff. I'll preach about all of them, especially those that I personally have an interest in.. authentication, digital cash and secure email. > If you want to analogize crypto to something, analogize > it to something crypto is more like. There is a reason that militaries have long used spears and crypto. I do not mean this statement to conjure fear, but it is true that crypt can be used as a weapon; it is, after all classified as a munition, and for good reason when looking for the government's POV. Certain analogies are useful in certain instances. When useful to make the analogy to firearms, it _can_ be an excellent one.. so can a lock. Last time I checked though, padlocks aren't a hot topic for debate as to their being banned. Crypto, in certain aspects, is. > ..As will the phrase, "cryptography is like a gun...." Joe User > won't see authentication as "like a gun" any more than his telephone > is "like a gun." Right. But I don't trust words to get it done. Most people will believe what they are told. And I can't scream as loud as the machine. > The phase, "now, bad guys can use this to kill you just like > a gun, but responsible law-abiding citizens can use it too" > is true for ALL solid objects larger than a breadbox. Exactly. Which is _precisely_ the reason why outlawing things on the basis that criminals can use them is insane. > You > do NOT say this, however, when selling someone a halogen lamp > or a Tickle-me-Elmo doll, or introducing them to anything > new that they should have at home. This doesn't make you a > liar. No, I dont offer it up because it is irrelevent.. as you say, the same is true for a breadbox. But if asked point-blank if some technology can be used for crime Y, I'll admit it if it is true, and then I'll show the foolishness of this line of thought.. and I'd make that point that if we take this line of thought to its conclusion we must get rid of everything larger than a breadbox. And, after all that, if we are talking about controversial technologies, individual freedoms and the like, I may just bring up firearms because it is a technology that is in the same boat as crypto. A munition that is getting a whole lot of attention. > It is chillingly naive to defend an argument on the grounds > that when dissected logically it is a true statement. Are you suggesting that I should defend and argument, when looked at logically is false? > Do you approve of the government repeatedly warning people that > "crypto can be used by terrorists!" It is, after all, a true > statement! Yes, it is a true statement.. and so is "crypto can be used by nice old grandma's to exchange email with the grandkids in NY." Do I approve of the gov't saying X? Only if they also say it's compliment (which is equally true) else they are misrepresenting what is true by being biased. One can take many true statements and present them in a way to make things seem to be what they are not. > Dropping a flawed analogy isn't covering the truth. Rather, > keeping the analogy distorts the truth. See, I don't think that the analogy to weaponry is all that far off. The exact same software that could let me sign my documents or order neat stuff over the web can use the exact same algorithms for transmitting designs for bombs. Lets face it. Weaponry _is_ a double-edged sword.. so is crypto. If we say that we want to bring every criminal to justice in the most efficient way with no regard to anything else, then we should get rid of crypto.. its as simple as that.. thats pretty obvious. However, it is also true that weaponry has a good side.. it can protect us against those criminals that we don't bring to justice. Crypto has even bigger advantages.. it is _the_ technology that can fuel completely new ways of commerce and communication.. and it can protect us from the bad guys too.. and, statistically, a whole helluvalot better than guns can at that. I don't think that we should make crypto out to be different from guns in that they are completely different, because there are a lot of similarities .. how they have been used historically, some of the pros and cons, etc. This is a very real concern. Let me ask you. If you were held hostage, which would you rather have your captor's exchange of information encrypted with, IDEA or an aristocrat? What would you rather have the criminals run around with, guns or clubs? The answers are simple, if all we value is our safety.. but this is what I have tried to convey.. for both of these technologies, crypto and weaponry.. the reasons for having them around far surpass our concerns for safety from bad guys. I think that weaponry and crypto are related. They both have direct military uses, and they both have direct civilian uses. Both are controversial. I think that the analogy between them can be a good one, in some circumstances. Right now, I think that crypto is in a position similar to where firearms were (minus the hostile environment) during times of exploration in days past. It stands as a technology that is capable of serving us in a variety of powerful ways during a time where its application is vitally important. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "Let your life be a counter-friction to stop the machine." Henry David Thoreau "Civil Disobedience" -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQCVAwUBNU7FIgKEiLNUxnAfAQGKQAP9FKyuQeQol3iWzmKt/DvpfVa0q5wmniyK +8G2+RREtnuCvDF2G13Ik09qMk/+0Ylv5c8IEmPk42p7G19im6W6uu1iGheO1RPn 096mfALKLGVkbXina6d8TsvjQvlhJ++ls+4eKSYOHhppptdsrcC+xqHwB+DqxMNH SOJeEPkKZho= =0ylt -----END PGP SIGNATURE----- From ichudov at algebra.com Tue May 5 02:12:22 1998 From: ichudov at algebra.com (Igor Chudov @ home) Date: Tue, 5 May 1998 02:12:22 -0700 (PDT) Subject: Why are you bouncing my mail to Cypherpunks? In-Reply-To: <3.0.5.32.19980505014354.00913b60@popd.ix.netcom.com> Message-ID: <199805050908.EAA02726@manifold.algebra.com> The antispam assholes suddenly blocked domain ix.netcom.com. (an amazing thing to do, all in all, and shows how far away from reality can people be carried out by religion) It turned out that sendmail at our mail relay site was ckecking their "blackhole DNS database". I deleted all the rules that refer to them and now things seem to be OK. I am sorry for your troubles, Bill. Thanks for letting me know. igor Bill Stewart wrote: > > Hi, Igor - this bounced. Is it because I sent it as > stewarts at ix.netcom.com > instead of > bill.stewart at pobox.com > (which is how I subscribe, through cyberpass), or is RBL blocking > Netcom again, or is something else wrong? > > Thanks; Bill > > > >Return-Path: <> > >Received: from dfw-ix13.ix.netcom.com (dfw-ix13.ix.netcom.com [206.214.98.13]) > > by ixmail7.ix.netcom.com (8.8.7-s-4/8.8.7/(NETCOM v1.01)) with ESMTP id KAA03312; > > for ; Mon, 4 May 1998 10:15:35 -0700 (PDT) > >Received: from localhost (localhost) > > by dfw-ix13.ix.netcom.com (8.8.4/8.8.4) with internal > > id MAA15308; Mon, 4 May 1998 12:15:32 -0500 (CDT) > >Date: Mon, 4 May 1998 12:15:32 -0500 (CDT) > >From: Mail Delivery Subsystem > >Message-Id: <199805041715.MAA15308 at dfw-ix13.ix.netcom.com> > >To: > >Subject: Returned mail: Service unavailable > >Auto-Submitted: auto-generated (failure) > > > >The original message was received at Mon, 4 May 1998 12:14:52 -0500 (CDT) > >from smap at localhost > > > > ----- The following addresses had permanent fatal errors ----- > > > > > > ----- Transcript of session follows ----- > >... while talking to mail.algebra.com.: > >>>> MAIL From: SIZE=1102 > ><<< 521 ... #blocked.contact postmaster > >554 ... Service unavailable > > > > ----- Original message follows ----- > > > >Return-Path: > >Received: (from smap at localhost) > > by dfw-ix13.ix.netcom.com (8.8.4/8.8.4) > > id MAA15254 for ; Mon, 4 May 1998 12:14:52 -0500 (CDT) > >Received: from pax-ca6-17.ix.netcom.com(199.35.217.209) by dfw-ix13.ix.netcom.com via smap (V1.3) > > id rma015185; Mon May 4 12:14:15 1998 > >Message-Id: <3.0.5.32.19980504100635.008f7950 at popd.ix.netcom.com> > >X-Sender: stewarts at popd.ix.netcom.com > >X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32) > >Date: Mon, 04 May 1998 10:06:35 -0700 > >To: cypherpunks at algebra.com > >From: Bill Stewart > >Subject: Forward: --India's INSAT hacked > >Mime-Version: 1.0 > >Content-Type: text/plain; charset="us-ascii" > > > >>From Computer Underground Digest > >------------------------------ > > > >Date: Tue, 28 Apr 1998 11:06:30 -0700 > >From: Jeremy Lassen > >Subject: File 9--India's INSAT hacked > > > >Space Age Publishing's India correspondent B. R. Rao reports that > >"hackers" have succeeded in stealing transponder time on board > >India's domestic communications satellite, INSAT. The Network > >Ops. Control Center(NOCC)of India's Dept. of Telecommunications > >is "...in the process of identifying the culprits". > > > >The director of NOCC confirms that a reward has been offered to > >anyone who can provide information that helps identify the > >culprits. Reports indicate the NOCC is aware that "...anybody in > >possession of the technical details of INSAT and its frequency > >ranges can at regular intervals tap into its transponders and > >transmit data free across the globe." > > > >I know this is rather vague, but I hadn't read about this > >anywhere else, and thought that the CUD's readers might find it > >interesting. Anybody need some transponders time? :) > > > > > > > > > Thanks! > Bill > Bill Stewart, bill.stewart at pobox.com > PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 > > > > Thanks! > Bill > Bill Stewart, bill.stewart at pobox.com > PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 > - Igor. From billp at nmol.com Tue May 5 07:12:55 1998 From: billp at nmol.com (bill payne) Date: Tue, 5 May 1998 07:12:55 -0700 (PDT) Subject: Payne-Morales vs. NSA: Memorandum Opinion and Order Message-ID: <354F1D2B.375A@nmol.com> Tuesday 5/5/98 7:17 AM Lawyers and MCs Morales and I met on Monday to discuss strategy for response to Payne-Morales vs. NSA: Memorandum Opinion and Order which is cross-linked at http://www.aci.net/kalliste/ from http://www.jya.com/whp043098.htm We will, of course, file Rule 52. Findings by the Court; Judgment on Partial Findings (a) Effect. In all actions tried upon the facts without a jury or with an advisory jury, the court shall find the facts specially and state separately its conclusions of law thereon, and judgment shall be entered pursuant to Rule 58; and in granting or refusing interlocutory injunctions the court shall similarly set forth the findings of fact and conclusions of law which constitute the grounds of its action. Requests for findings are not necessary for purposes of review. Findings of fact, whether based on oral or documentary evidence, shall not be set aside unless clearly erroneous, and due regard shall be given to the opportunity of the trial court to judge of the credibility of the witnesses. The findings of a master, to the extent that the court adopts them, shall be considered as the findings of the court. It will be sufficient if the findings of fact and conclusions of law are stated orally and recorded in open court following the close of the evidence or appear in an opinion or memorandum of decision filed by the court. Findings of fact and conclusions of law are unnecessary on decisions of motions under Rules 12 or 56 or any other motion except as provided in subdivision (c) of this rule. (b) Amendment. On a party's motion filed no later than 10 days after entry of judgment, the court may amend its findings--or make additional findings--and may amend the judgment accordingly. The motion may accompany a motion for a new trial under Rule 59. When findings of fact are made in actions tried without a jury, the sufficiency of the evidence supporting the findings may be later questioned whether or not in the district court the party raising the question objected to the findings, moved to amend them, or moved for partial findings. motion. Lawyers, we suspect that the possibility that Campos wrote the 56 page document is remote. Reason is that informants within the federal court system have told us that the government lawyers write the opinion and order, then gives them to the judge to sign. Morales and noticed in previous cases that material not presented to judges were appearing in the judges� documents. So when we study the document we will be looking for 1 material cited by Campos which Campos did not or should not have in his possession 2 introduction of legal citations not presented to the court by either plaintiffs or defendant. A judge is supposed to judge, not help either side. 3 felony violations of the False Statement Act. We learned from an Hispanic lawyer that government lawyers give false citations of case law to a judge to have the judge agree and dismiss the plaintiff's case. Morales and I still have been unable to obtain docket sheets from the Tenth circuit for cases No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia. We both won but crooked federal judges gave the win to Sandia. Morales and my main purpose in filing the NSA genocide and deficient crypto algorithm lawsuit was to expose corruption in the US federal court system. A side purpose an international public service to expose technical details of NSA�s bungled spy stingS so that congress can take some action to remedy damage done by US �intelligence� agencies. Albuquerque Journal 4/21/98 page A6 reports what happened. U.S. Aided Communist Foe Pol Pot Richard Reeves LOS ANGELES - ... Even after he fell from national power, we helped supply and protect Pol Pot because the Khmer Rouge was tying down large number of occupying North Vietnamese troops. These are some of the names of the evil who were or still are paid friends: o Saddam Hussein, paid for making war on Iran. o Gulbuddin Hekmatry, who made his name throwing acid in the faces of female students in Kabul who dared to wear western dress, paid for making was against communists in Afghanistan. o The Taliban, the religious warriors we helped train to fight communists who are beating or killing those same women right now in Afghanistan. o Manuel Noriega, the soldier-thug we encouraged to overthrow elections in Panama because we did not like the results. o Mobuto Sese Seko, one Joseph Mobutu, our man in Zaire. o Jonas Savimbi, in constant war in Angola The list goes on. It has for a long time and will, even if communism is dead as a national security threat of the United States. In may of these cases our interest involved resources - oil, usually, ... Settlement should be made QUICKLY Before something possibly VERY UNFORTUNATE happens. Also, I needed legal delivery practice prior to filing a Privacy Act and defamation lawsuit. Let's all hope for settlement. Later bill From jf_avon at citenet.net Tue May 5 07:21:27 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Tue, 5 May 1998 07:21:27 -0700 (PDT) Subject: Explaining crypto to people (was Re: A new Swiss banking novel) Message-ID: <199805051426.KAA25168@cti06.citenet.net> On Tue, 5 May 1998 01:48:02 -0500 (CDT), Xcott Craver wrote: > Now, I'm not saying analogies are evil, but the analogy > to firearms is a *bad* one, and it stands to give people > the misconception that crypto is many things that it is > not (not to mention including ). I agree on you opinion of the use of analogies, at large. The stigma is real (as in "happening") but it is nevertheless a load of bull since it is the result of the population misconceptions, of being brainwasher by the apostles of political correctness. The quintessential aspects of guns in a free society is that they are Liberty's teeths. Crypto is also the same, only after the teeths have been bashed in... I argued this over the Canadian Firearms Digest list. Ciao jfa Jean-Francois Avon, Pierrefonds(Montreal) QC Canada JFA Technologies, R&D physicists & engineers Instrumentation & control, LabView programming. PGP keys: http://w3.citenet.net/users/jf_avon and: http://bs.mit.edu:8001/pks-toplev.html PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C From jf_avon at citenet.net Tue May 5 07:24:27 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Tue, 5 May 1998 07:24:27 -0700 (PDT) Subject: Explaining crypto to people (was Re: A new Swiss banking novel) Message-ID: <199805051430.KAA25240@cti06.citenet.net> >> ..As will the phrase, "cryptography is like a gun...." Joe User >> won't see authentication as "like a gun" any more than his telephone >> is "like a gun." It is part of the cultural folklore to believe that "The pen is mightier than the sword" Ciao jfa Jean-Francois Avon, Pierrefonds(Montreal) QC Canada JFA Technologies, R&D physicists & engineers Instrumentation & control, LabView programming. PGP keys: http://w3.citenet.net/users/jf_avon and: http://bs.mit.edu:8001/pks-toplev.html PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C From whgiii at invweb.net Tue May 5 08:49:18 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Tue, 5 May 1998 08:49:18 -0700 (PDT) Subject: Why are you bouncing my mail to Cypherpunks? In-Reply-To: <199805050908.EAA02726@manifold.algebra.com> Message-ID: <199805051548.LAA03287@users.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <199805050908.EAA02726 at manifold.algebra.com>, on 05/05/98 at 04:08 AM, ichudov at algebra.com (Igor Chudov @ home) said: >The antispam assholes suddenly blocked domain ix.netcom.com. >(an amazing thing to do, all in all, and shows how far away from reality >can people be carried out by religion) >It turned out that sendmail at our mail relay site was ckecking their >"blackhole DNS database". >I deleted all the rules that refer to them and now things seem to be OK. >I am sorry for your troubles, Bill. Thanks for letting me know. Well in all fairness I filter out netcom.com messages (I do have an exception for Bill). With the exception of Bill's posts netcom is right up there with aol, compuserve, and a few others where if it's not spam it's some crap from the clue-impaired. - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html - --------------------------------------------------------------- Tag-O-Matic: "Do your parents *know* you are Ramones?" - Ms. Togar -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNU81wY9Co1n+aLhhAQEz9wP8CJhDiQ4wWkta6NrZbmZs35MkcLBJRo2j yHBiuJ7lhkTPNRs7RXOJQvD1e789D9tr0vmoWijY1TgZ8PfvwOFpL4cvRc3y3zRB v0I0RDg4KIy+KrTejzo6BDK6CrdxQkr/kPyOeQAs12p90c/Nj1kk7uMc+Z5AVZiz sE7WVterZe0= =OG6c -----END PGP SIGNATURE----- From listmaster at extensis.com Tue May 5 12:25:05 1998 From: listmaster at extensis.com (listmaster at extensis.com) Date: Tue, 5 May 1998 12:25:05 -0700 (PDT) Subject: Get Edgy with Extensis PhotoFrame Message-ID: Introducing Extensis PhotoFrame for Adobe Photoshop Users http://products.extensis.com/PhotoFrame/ Remember when building a creative image edge was a headache? Those days are over. Extensis has just released PhotoFrame 1.0, a versatile Photoshop plug-in that enables designers to develop customized, professional- quality image frames and border effects for any image - right in Photoshop - in a fraction of the time it used to take. Volumes 1 and 2 include a collection of hand painted and digitally created, professionally-designed borders. Start by viewing the keyword-searchable PhotoFrame collection from within the image browser catalog. Once selected, simply drag the thumbnail into PhotoFrame and start using it! >From there, customize is the word. Simply and quickly adjust opacity, blur and color while the real-time preview shows the changes as you make them. You can rotate, flip, invert - or use a combination of up to 3 separate frames to achieve the desired effect. With multiple redo/undo, you can go back and forth as much as needed before applying the final effect. When finished, save your customized effect for future use. With the speed and versatility of Extensis PhotoFrame, you've got the Creative Edge. ----------------------------------------- To order on-line visit: http://products.extensis.com/PhotoFrame/ To order by phone: 1-800-796-9798 Volume 1 (painted edge effects) or Volume 2 (digital edge effects) are available for $129.95 each. For even greater savings, both volumes are available as a specially priced bundle for $199.95. Save $60.00! PhotoFrame is compatible with both Mac and Windows. ----------------------------------------- PS. We have made every effort to ensure this message is being sent only to people who have expressed interest in Extensis products. If we have sent this to you in error, please accept our apologies and reply with remove in the subject line for automatic exclusion from future communications. From corvuscorvax at hotmail.com Tue May 5 12:25:35 1998 From: corvuscorvax at hotmail.com (Corvus Corvax) Date: Tue, 5 May 1998 12:25:35 -0700 (PDT) Subject: The Borg Arrive Message-ID: <19980505192502.20297.qmail@hotmail.com> Eric Cordian writes: > Beware the Borg. Coming soon to a neighborhood store near you. I was recently asked to produce a drivers license in order to exchange a pair of long johns, paid for in cash. I asked why. "Store policy" was the reply. I asked why it was store policy, and the cashier responded with a hostile stare and exchanged the underwear for me. Along the same lines, try refusing to give your zip code when asked at a register. Evidently some stores now simply cannot process a transaction without it. It's good for a laugh if you're bored. Borged? 571830573294323629934765012348436263285853260687657402192238 Corvus Corvax 324908584730535672342307543875016719214012473014020239437239 ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From tm at algebra.com Tue May 5 13:01:37 1998 From: tm at algebra.com (TruthMonger) Date: Tue, 5 May 1998 13:01:37 -0700 (PDT) Subject: First, they came for the morons... / Re: Blizzard Gets Sued For Snooping On Gamers In-Reply-To: <354E42A8.6C422A1A@brainlink.com> Message-ID: <354F70C6.4182@algebra.com> Sunder wrote: > ---------- Forwarded message ---------- > From: Salvatore Denaro > --- Blizzard Gets Sued For Snooping On Gamers --- > Game developer Blizzard Entertainment is being sued for unlawful > business practices, stemming from the revelation that the company's > hot-selling new StarCraft snoops through players' hard drives and > e-mails information to the company over the Internet. > > http://www.techweb.com/news/story/TWB19980430S0015 But Blizzard defends the trap door, saying it was meant to determine if certain players unable to log onto the company's multiplayer gaming site, Battle.Net, were using pirated software. And I've got a trap door into all Government computers to determine if they have pirated copies of my letters to mom. Nothing wrong with that, eh? Besides Driscoll, most players interviewed by TechWeb said they were not bothered by Blizzard's actions. "The only people who were affected by this were the morons who stole the game," said Jesse Giles, in Houston. "As soon as you steal the game, you're committing an illegal act." "First, they came for the morons who stole the game, and I was a moron with a legal copy, so I didn't speak up..." Nick Fox, of Waukesha, Wisc., agreed, saying credit card companies hold large amounts of personal information without legal liability. "I believe there are more major invasions of privacy than them finding out our real names, and everyone should chill," he said. And if Dad is already bungholing you,then it's no big deal if Uncle Bob takes sloppy seconds, eh? Blizzard implies that they are only sticking it in 'a little bit, but it seems to make sense that, once they have it in, they might want to 'wiggle it around' a bit, to find out if the user has pirated copies of their other software. And when they get together for drinks with their buddies at other corporations, I imagine they share information so they can keep track of who the real whores are. Next thing you know, they're carpooling to gangbang the users, to save on corporate gas. No doubt advancing technology will allow them to build a 'profile' of software thieves, enabling them to kick in the doors of poor niggers and cheap Jews and take them to special camps where they can be 'reeducated'. And Nick and Jesse Moron will explain to us how only people who fit the Piracy Profile have reason to worry, and that the SoftWare internment camps are much nicer than the Credit internment camps. The 'upside' of Blizzard's snooping is that if the user has their credit card information on the computer, then Blizzard can send and charge them for future updates automatically, saving the user from having to waste time deciding whether or not they want it. I'm beginning to think that AOL is the disease, and DC is only a symptom. TruthMongrel From ichudov at algebra.com Tue May 5 15:40:31 1998 From: ichudov at algebra.com (Igor Chudov @ home) Date: Tue, 5 May 1998 15:40:31 -0700 (PDT) Subject: Why are you bouncing my mail to Cypherpunks? In-Reply-To: <199805051548.LAA03287@users.invweb.net> Message-ID: <199805052238.RAA08070@manifold.algebra.com> William H. Geiger III wrote: > at 04:08 AM, ichudov at algebra.com (Igor Chudov @ home) said: > >The antispam assholes suddenly blocked domain ix.netcom.com. > > >(an amazing thing to do, all in all, and shows how far away from reality > >can people be carried out by religion) > > >It turned out that sendmail at our mail relay site was ckecking their > >"blackhole DNS database". > > >I deleted all the rules that refer to them and now things seem to be OK. > > >I am sorry for your troubles, Bill. Thanks for letting me know. > > Well in all fairness I filter out netcom.com messages (I do have an > exception for Bill). With the exception of Bill's posts netcom is right up > there with aol, compuserve, and a few others where if it's not spam it's > some crap from the clue-impaired. _You_ can do it. _Cypherpuks at algebra.com_ cannot do it. - Igor. From caj at math.niu.edu Tue May 5 16:28:53 1998 From: caj at math.niu.edu (Xcott Craver) Date: Tue, 5 May 1998 16:28:53 -0700 (PDT) Subject: Explaining crypto to people (was Re: A new Swiss banking novel) In-Reply-To: Message-ID: On Tue, 5 May 1998 mgraffam at mhv.net wrote: > Having said that, I don't really think it is necessary to go around > saying "Crypto is like a bomb" either. Crypto _can_ be used as a defensive > or an offensive weapon, however the same technology can be used for > authentication and digital cash and loads of other neat stuff. I'll > preach about all of them, especially those that I personally have an > interest in.. authentication, digital cash and secure email. Which is my point. Crypto can be seen as a weapon, just like it can be seen as a very strong safe. The public doesn't have a very strong conception of what this crypto stuff _is_, and so they're going to suck a lot more than you intended out of whatever analogy you pick. If you say "bomb," they'll think "bomb." And this generates misconceptions. > Certain analogies are useful in certain instances. When useful to > make the analogy to firearms, it _can_ be an excellent one.. so can > a lock. > > Last time I checked though, padlocks aren't a hot topic for debate as > to their being banned. Crypto, in certain aspects, is. Again, my point. Padlocks and safes are *not* under the gun, so to speak. People will not see crypto regulation as silly if they keep getting fed bomb and gun analogies. They'd think it was damned silly if they got padlock and safe analogies. Remember, many people are still fuzzy about just what this stuff is that the govt. is trying to regulate. I mean, when's the last time you saw someone defending their choice of buying a padlock? Or saying that, "look, a padlock _can_ be used by criminals, but I'm a responsible adult." Nobody thinks of evil terrorists when they see a padlock on the store shelf, and that's the way it should be with crypto. > > It is chillingly naive to defend an argument on the grounds > > that when dissected logically it is a true statement. > > Are you suggesting that I should defend and argument, when looked at > logically is false? Not at all. Nobody's suggesting that anyone lie. Rather: > One can take many true statements and present them in a way to > make things seem to be what they are not. ...and one can do this by accident as well. I believe that telling people crypto is "like a gun" is exactly this. And this is why I feel the firearm analogies should be dropped when explaining crypto to people. > > Dropping a flawed analogy isn't covering the truth. Rather, > > keeping the analogy distorts the truth. > > See, I don't think that the analogy to weaponry is all that far off. > The exact same software that could let me sign my documents or > order neat stuff over the web can use the exact same algorithms > for transmitting designs for bombs. Then envelopes are weapons. Stamps are weapons. Fax machines are weapons. Now, I know, you're thinking, "yes, technically, they are." But remember, again, that we're talking about explaining the concept of crypto to people who are pretty much new to it. They have no idea how literal your analogy is. The phrase, "the pen is mightier than the sword" would have a wholly different effect on people if they had no idea what a "pen" was. .,-::::: :::. ....:::::: @niu.edu -- http://www.math.niu.edu/~caj/ ,;;;'````' ;;`;; ;;;;;;;;;```` [[[ ,[[ '[[, ''` `[[. "I'd like a large order of FiboNachos." $$$ c$$$cc$$$c ,,, `$$ "Okay sir, that'll cost as much as a `88bo,__,o, 888 888,888boood88 small order and a medium order combined." "YUMMMMMP"YMM ""` "MMMMMMMM" _____________________________________________ From jf_avon at citenet.net Tue May 5 20:59:49 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Tue, 5 May 1998 20:59:49 -0700 (PDT) Subject: Explaining crypto to people (was Re: A new Swiss banking novel) Message-ID: <199805060405.AAA10956@cti06.citenet.net> On Tue, 5 May 1998 18:28:46 -0500 (CDT), Xcott Craver wrote: >Again, my point. Padlocks and safes are *not* under the gun, > so to speak. People will not see crypto regulation as silly > if they keep getting fed bomb and gun analogies. They'd think > it was damned silly if they got padlock and safe analogies. The analogy of crypto = padlock lack something. A padlock can *always* pried open. A court order can always be issued to open it. So Joe Enforcment will be on it's way with it's crowbars, liquid N2, saws and/or torches and do his duty. It will be no loss of time to him. Strong encryption is different. No matter what Joe Enforcment try, the crypto lock won't give away (well, at least, this is what we assume here). Working on it means just one thing: absolute waste of ressources. AFA Joe Enforcement is concerned, a gun has some of the same potentiality: try to force it and you also risk an absolute waste of ressources. From a human standpoint, it might look different, but if you make abstraction of human life (like most dictators do), some of the effects are similar. Ciao jfa Jean-Francois Avon, Pierrefonds (Montreal), Canada Unregistered Firearms in the hands of honest citizens: Liberty's Teeth Strong Cryptographic tools in the hands of honest citizens: Liberty's Voice PGP keys: http://bs.mit.edu:8001/pks-toplev.html PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C From anonymous at netassist.se Tue May 5 22:45:26 1998 From: anonymous at netassist.se (Anonymous) Date: Tue, 5 May 1998 22:45:26 -0700 (PDT) Subject: New restrictions on distributing the SFL Message-ID: <4c7c7aa1394e1e7a898bb6d6b0097a0a@kapten.zoom.nu> >Date: Tue, 05 May 1998 17:24:25 -0700 >To: imc-sfl at imc.org >From: Paul Hoffman / IMC >Subject: New restrictions on distributing the SFL I'm sorry to announce that the source code for the SFL has been removed from the official site. It has been moved to a new site, that appears to be export-controlled. You need a password to get the software from that site, and the passwords are handed out by the US Department of Defense. I'm personally embarssed that the government of my country enforces such silly laws. I understand that many other countries have similar laws, but that doesn't make me feel any better. I had hoped that the SFL would be the beginning of sensibility on the part of the US government with respect to cryptography distribution; I still have that hope for the future. There are many people on this mailing list who are outside the US, and this change in distribution may prevent you from getting the SFL. If other Web sites appear that contain unofficial versions of the SFL and do not restrict who can download from them, I will be happy to list those on the IMC SFL page at . I would also like to list links to cryptography packages that work with the SFL at our site. --Paul Hoffman, Director --Internet Mail Consortium From billp at nmol.com Tue May 5 13:17:16 1998 From: billp at nmol.com (bill payne) Date: Wed, 6 May 1998 04:17:16 +0800 Subject: SHIFT REGISTER technology Message-ID: <199805051757.KAA23788@modmult.starium.com> Friday 4/24/98 7:33 AM John Young J Orlin Grabbe John Gilmore The stuff on linear and non-linear shift register sequences which is now appearing on jya.com is the �military-grade� crypto technology. Semionoff and http://www.jya.com/crack-a5.htm contains material similar to what I saw Brian Snow present in schematics of NSA KG units. The statement by david.loos at eudoramail.com The A5 algorithm uses a three level, non-linear feedback shift register arrangement, designed to be sufficiently complex to resist attack. points to the technology used for military-grade crypto. The reason NSA regarded the R register, seen at http://jya.com/whpfiles.htm, feedback function classified was that it contained a non-linear feedback function. I was ORDERED to build UNCLASSIFIED hardware. This is why I stuck the R register feedback function in a fast ram. This similarity between the structure of the nonlinear feedback function in the CAVE algorithm seen at http://www.semionoff.com/cellular/hacking/phreaking/ to the feedback function published in my SAND report : A11 A1 A5 AND A1 0= A9 0= AND XOR A6 A10 XOR XOR ; reveals �military-strength� technology. SHIFT REGISTERS. Words �shift registers� also caused the Great American Spy Sting bust. http://caq.com/CAQ/caq63/caq63madsen.html The Cold War is over. And the crypto cat is now about fully out of the bag. Let�s hope for settlement so that we can all go on to more constructive tasks. Later bill From billp at nmol.com Wed May 6 07:07:09 1998 From: billp at nmol.com (bill payne) Date: Wed, 6 May 1998 07:07:09 -0700 (PDT) Subject: simplicity & found docket sheet Message-ID: <35506D8B.6428@nmol.com> Wednesday 5/6/98 7:29 AM J Orlin Grabbe Your new single-column format, I feel, has advantages over the old three-column format. http://www.aci.net/kalliste/ 1 Not as much scrolling as was required to read the three-column format. 2 When I copies material out of columns 2 or 3 to save in a file [orlin.txt, of course], I had to use the Auto-format in Word to collapse the leading blanks. I am studying, by thinking, about how John Young has organized his information and the simplicity of what Young has done. http://www.jya.com/index.htm Simplicity exudes brilliance. And also, I am guessing, is key to outstanding architectural designs. I have some ideas about a 80c32, MASM, and Visual Basic Internet forum I am mulling-over in my mind. I am completing an 80c32 project. Then I need to revise my book. http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 Publicity of this mess on Internet has helped book sales. Today I am working on 1 COMES NOW plaintiffs Payne and Morales [Plaintiffs] to exercise their rights under the Federal Rules of Civil Procedure, Rule 52. Findings by the Court; Judgment on Partial Findings (b) Amendment. On a party's motion filed no later than 10 days after entry of judgment, the court may amend its findings--or make additional findings--and may amend the judgment accordingly. The motion may accompany a motion for a new trial under Rule 59. When findings of fact are made in actions tried without a jury, the sufficiency of the evidence supporting the findings may be later questioned whether or not in the district court the party raising the question objected to the findings, moved to amend them, or moved for partial findings. And I see this morning at http://www.jya.com/whp-10usca.htm that John Young found the docket sheet on my case on Internet which Tenth Circuit court clerks Fisher and Hoecker refused to send me. USCA: Payne v. Sandia National Lab Docket May 5, 1998 I think I see WRITTEN EVIDENCE, now published on Internet, that court clerks and federal judges have committed Title 18 felony violations of law. Morales and I are not above filing criminal complaint affidavits when we possess WRITTEN EVIDENCE of guilt. We all must remember the sage words of defendant Harvey Brewster, If it is not written-down, then it didn't happen. Sandia/EEOC, fortunately for me, left a WRITTEN TRAIL of evidence of wrongdoing. This mess should be settled http://www.jya.com/whp043098.htm so that we can all move on to more constructive projects. Before it gets WORSE. Perhaps megatons worse? Allahu akbar bill From lordsmen at iquest.net Wed May 6 11:26:48 1998 From: lordsmen at iquest.net (Bruises that won't heal) Date: Wed, 6 May 1998 11:26:48 -0700 (PDT) Subject: My Philosophy on Life (Please direct all feedback to my email, not to the group) Message-ID: <199805061826.LAA08914@toad.com> NOTE: This is probably one of the most unstructured and free-flowing papers that I have ever written. Take it with a grain of salt and two advils. In the world we live today, it is safest to be either at the top or insane. In a story I read last semester out of my ultra-thick Literature textbook, this was first introduced to me. One of the leading characters, an educated man, felt the "sorrow of sanity." It's true that in this world, we all want meaningful lives. Not only do we want to be successful, but we need to be happy. The real question of life lies in what brings us happiness. So, as you read this, keep the goal of happiness in mind. First of all, I'd like to talk about my influences throughout my life. Television was a large part of my life in the early years, which I am sad to say has shaped a very minute amount of my mind. The television, or our "Vast Wasteland," is a horrible medium that has too much to say about so much. In my eyes, television has failed to serve the "public's interest, convenience, and necessity." It has too much of a handle on the world today, and people blindly accept most/all of what they see. You may tell yourself that you are not one of those who conform to the views of the television, but even witty shows such as South Park and insanely stupid shows like Beavis and Butthead shaped our lives. We used to laugh when Butthead would slap Beavis, and we'd get excited when Beavis would yell "Fire! Fire!" A statement which was later proven to be a cause for a young child to light a fatal fire in his own house. As we grow older, our minds begin to become more autonomous and move away from such ignorance and mindless influence, but the way that we are brought up as children will always be a big influence on our lives. And since those funny Roadrunner and Coyote cartoons were there and influenced us as children, a very small part carries over. A happy childhood or a sad childhood shapes what we can become as adolescent youth. Most of us undergo something sad and traumatic as children. Mine came around the age of 14 when my sister and father use to argue constantly. Hatred affects us, even when it isn't directly between us and someone else. Anyway, this traumatic experience, which also lasts longer with some, is a major cause for our disbelief and our lack of immediate trust in everything. It causes us to think twice about everything, and it causes us to worry. We are burned by everybody throughout our lives. Remember the first time that our parents tricked us into something and how angry we were because we were misled? Remember when you came home to find your pet, who was one of your best friends, gone forever and never to be seen again? Maybe you came home to find that a really close relative of yours died and somehow you felt betrayed by either God, or the doctors, or somehow you felt responsible. Maybe you still blame yourself for your parent's divorce. Either way, these are the major climaxes of our childhood which also carry over. You see the jerks out in the world, and you see those who easily betray, and sometimes you wonder who first betrayed them, or who manipulated their minds to be so uncompassionate. It's sad that everyone has to learn these things at a young age where we are all so susceptible to misbeliefs and conjectures of the corporate world. But, unfortunately, we learn by mistake and that is human nature. This leads me into the thoughts of how human nature can kill a spirit. We all like to be liked, and we all need to be loved by somebody. A heavy heart appears where love is less spent. And the nature of hate (which I believe is not human nature but more a learned emotion) can kill a spirit. And the feeling of being disliked, betrayed, hell, even when we hate someone, that all can kill us. But this doesn't prove how human nature can kill a spirit. I can say this is done because of the way that we naturally react to so many things. For example, we learn to hate because we are first hated or betrayed. People can be so cold to us, and we take all that as a part of us (of course, as children) and we turn it into rage and hate. When a child is molested by an adult, he/she can instantly reject the members of his/her offending sex. They can even lose trust in their parents (especially if the parent is the offender). It's a very sad thing that this is, and it damages so deeply in the soul and heart. What I'd like to discuss now is the cause that many people indulge in. Alcoholism is a terrible disease. I don't say that because I think that drinking is wrong. I believe that irresponsible drinking is wrong. It's true that alcoholics don't begin as heavy drinkers, but I believe that alcoholics form because of drinking due to depression. Those kids who are neglected and don't have so many great friends as children may seek refuge in being drunk or high. The position I take on marijuana versus. alcohol is this. I don't consider anything I can grow in my backyard a drug. And marijuana isn't nearly addictive as alcohol because you can only become psychologically addicted. We've all experienced mental addictions (seeing the Titanic movie twenty some times would probably constitute.) Sex is more addictive than marijuana is (in my opinion.) Anyway, alcohol is like anything else in the ways that it can be used responsibly but is unlike anything else because it can cause people to rape, kill, and do things a sane person would never dream of. So, people, I urge you to drink responsibly. Don't drink out of ruins of depression, because it will not delay problems or solve them. That is the problem with the world today. We don't solve problems. We just fix them. Anyway, as Michael Stipe says in Everybody Hurts "Don't throw your hands/hang on/take comfort in your friends." My second major concern is pornography. This is some major bull shit. It's corporate people who, as the government allows them to, take advantage of people's human urges to cheat on their wives or whatnot. Sure, you may believe that I am taking things way to far. It's only a naked chick on a page. But when you find someone special and you want to have sex with her, she's only the next step up from a bottle of lotion and a couple of magazines. Porn-freaks begin to see women as objects, argue with spouses and dates for insignificant reasons. Nothing good comes from pornography of any type. I guess it's semi-reasonable if a couple want to use videos together and so, but leave this exploitation alone and I don't think you'll regret it. Realize that so much of the downfall of America is just an expense to the success of someone else's success. Now, my personal feelings on how America works. Government is corrupt. It's goal is to serve the people with their own interests. This is a farce. First of all, America is not a democracy. In a true democracy, each person voices their opinion on every subject. Since we have such a huge number of people living in our country, this is impossible. So we elect representatives who we think will best serve in the government according to our own interests. But this rarely happens. Sure, those stupid bills that would never get passed (i.e.. drop the gun carrying age to 14) never do pass. Those are common sense actions. But real controversial issues (abortion, education, health care, death penalty, etc.) are very hard to set actions on because it affects so many people and the politicians have so many decisions to make. But I cannot say that our government is a failure. They would protect me if Cuba shot missiles at my home state tonight, and they'll give glue my arm back on if it happens to fall off on the way to school tomorrow and I had no way to pay for it. So, we can all argue about what the government is doing, but we must all also be thankful that our government isn't shooting us as we walk down the street. Anyway, the government isn't the problem so much in America today. It's the marketplace. Commercial business has made more laws than the government, and it's the big corporate giants who will decide what is the next biggest fashion. Corporate America is the root of all the trouble I can see in America. Let's go back to my examples above about the stupid junk with pornos and drugs and such. Pornography, I will restate, is worthless and damaging to the United States. Now, let's all ask ourselves where this garbage is piped in from. Corporate America. How could it be, you ask? Simply put, most of the people in the United States of America (which never really seem united) will only do things if it makes them money and or it makes them happy. Now, most of the time, we won't even do things if it makes us happy. We'd all be happy to turn the channel when Barney the Money-Hungry Education Dinosaur comes on, but if the remote is on top of the television, we might just take a few minutes for the show to really get on our nerves before we'll get up to change it. That 15 second walk can kill you, especially if Corporate America has had you up since 5 in the morning. But, hold on, the kids want to watch Barney. Darn it! You've been slaving all day at work to raise enough money for those kids to wear expensive clothes and to buy $30 Barney videos, and now they want to pry into your time alone? No, you yell at the kids to go watch another television or to go outside so you can have some peace and quiet. Geez, what's daddy so angry about? Could it be that he's overworked and stressed, and that he never spends time with us because all of his spare time is wrapped up in getting rest for work the next day? Oh, it's no big worry, because daddy has all day Saturday off to wash the car, plant some flowers, pay the bills, cook dinner for us, call back all those people who have called during the week and to go shopping... all the things he enjoys the most. Maybe this summer, daddy can take a week or two to take us to Dinghy world and spend so much money on us! Then he can come back and work for two months to pay off those pesky credit card companies for the thousands of dollars he spent. And while daddy is at work, those nice guys on television can tell us about all the neat things to buy. Yes, daddy will love the looks on our faces when we open up our happy meals (what ever happened to those cool boxes?) and we get our My Little Pony dolls. But we can't have just one pony! We need the whole set! Let's get them all daddy. A heart that's full up like a landfill. A job that slowly kills you. Bruises that won't heal. You look so tired and happy. Bring down the government. They don't speak for us. I'll take a quiet life. A handshake. Some carbon monoxide. No alarms and no surprises. No alarms and no surprises. Please. Silent. Silent. This is my final fit. My final bellyache. Such a pretty house. Such a pretty garden. "Are they getting on your nerves?" I asked the lady who sat behind the counter. She opened up her purse and laid a twenty dollar bill on the counter, got up and left. The kids shot me with a water pistol and ran out the door. They piled into mommy's car as the lady broke down crying. Her rusted station wagon didn't have a back window, but it had a semi-translucent tarp to keep out the wind and rain. And then she dropped her keys. She wiped the tears from her eyes like lakes from the plains, picked up her keys, and got in the car. Never again will I see that woman, but what she gave me, I wish I could return tenfold. That really didn't happen to me, but it speaks words to me. Some of you may not understand that, but what it is basically is saying is that the guy who spoke to the woman gained something inside from her pain. She was barren and empty, poor. She gave him a 20 dollar thought, and he wished he could give her 200 dollars. It's all Corporate America's fault. Here we could have a woman who went to college, but couldn't accept a job because she couldn't afford to move. So she works days to pay for a tiny apartment, an expensive baby-sitter, and for her three kids to live. Where's the husband? Dead maybe? Maybe he was an alcoholic and she kicked him out (not an uncommon thing). Welcome to Corporate America. In their world, you don't have to bring anything to survive, but they would like it better if you could leave some stuff behind. Otherwise, they'll take it away. Let's talk about this. Creativity can be destroyed from having a job. Yes, crew, by getting a job, your giving in (not completely, but somewhat) to corporate America. You just have to find a paying job that you totally enjoy. If you do that, then you'll never work a day in your life. For me, I'll be a train engineer. I'd really like to be in a successful music band. We'd never sell out to anybody. It'd be great. I used to really, really want to be a bird. I'd want to fly around with a knapsack on. Inside, I'd have a walkman on that continuously played A-ha's Take On Me and R.E.M.'s Losing My Religion. I'd also have about 20 peanut butter and jelly sandwiches. That would be my perfect life. I feel like I've said so much about everything, but I haven't even began to scratch the surface of some hot topics. This is your preface to my thoughts. I'll do addendums as soon as they appear. Addendum I - Microsoft as a Giant Wart I was listening to Rush Limbaugh today, and he was talking about how Microsoft puts this stupid new web browser on every computer no matter what program you install. For example, if you install a word processor it will still install Microsoft Internet Explorer 4.0 (a stupid browser) on your desktop. Well, this is junk. I think that computers are a waste of time, especially in this time and day. They should never have advanced past pocket calculators, and mainly because they are too convenient. Too many people spend nice sunny days sitting in front of the Internet downloading golf images, or pornography, or whatever. Forget that. I think that people should sell their computers and buy a set of golf clubs. Maybe you should take that thousand dollars and get a pet and take a weekend trip. Computers are nothing but a headache. Don't believe me? Test this against so many statistics and experience. Ask that accountant neighbor of yours if he'd rather go for a swim in a pool or figure out some corporate tax return information. Ask that computer programmer how many times he's visited another city on a trip that was only for pleasure. Then, ask the Park Rangers how much they love being outdoors. You're bound to find that most people hate technology in a raw form. The most beautiful things on this earth are found in nature, and not on some computer screen or in some magazine. Anyway, back to Microsoft. Bill Gates is only partly to blame for Microsoft's reputation. Of course, he has a lot of pull in the company since he is CEO and chairman, but realize that Microsoft is a huge company and that he can't possibly oversee every individual aspect of it. Sure, they are accused of unfair trade practices, but a certain percentage of that is acceptable (not every company can please everyone all the time.) But they do an awful lot of bad stuff (I can't give examples here because they are too complex to explain), but a lot of that comes from regional offices, etc. So, Microsoft is a monopoly because they own almost every aspect of computers today. You almost have to use their software in everything you want done professionally. And a lot of computer users will say that they really don't like that. I have two options for you. The first one is, gulp, buy a MacIntosh. The second (which I highly recommend) is to sell your computer and buy a guitar. Addendum II - The Internet as a Tool I'll grant that the Internet is an unboundless tool that almost any company can incorporate. Scientists can use it to collect data over the world, share information, and express ideas. Doctors can use it to find out more about diseases by reading up-to-date information from around the world. But these noteworthy actions rarely occur. Anyone who goes on the Internet would have to agree that it really is a not-so-needed "tool" but more of a world-wide haven for computer geeks. It's mostly full of perverts who'll have cyber-sex (cyber-sex is, by definition, when two people type actions and thoughts to each other while mutually masturbating. Sounds fun, eh?) Every America On-Line user knows what it is like to receive 20 messages per day about free sex sites and porno distribution, or how to get rich quick. Nobody is safe from advertising and spam e-mail on the Internet. In my humble opinion, the Internet has "sold out." It's just like your favorite underground rock group. Sure, you loved them as a local group and when they had their own name. But now they are playing wherever they can get paid the most, etc. It sucks. The Internet used to be an elite association of computer users (geeks and the normal people, too.) But Corporate America, namely Microsoft, has tried to put a footstep on each web page out there. For example, go to a search engine on the Internet (I suggest Yahoo! or excite.com.) They all practically do the same thing, so it doesn't matter. Instantly, you will see some advertisement on that page. Now, in the search field, type in the name of your favorite band. Click search and wait for the responses. Click on any one of several web pages that will surely be devoted to the worship of that band. You will more than likely see a banner for some sponsor (who pays them a dime for each person who clicks on it). See? Your independent down-home web pages have been stamped, logged, and dated for Corporations to see. Check this out. Go to www.microsoft.com. There? Microsoft now has your name, city, state, and e-mail address. Keep this up, and you can expect some e-mail from some company wanting to sell you something really soon. Sure, some web pages don't really want your personal information, but they'd love to sell it to some other company who would. Welcome to the Internet. A place of boredom, dull information, sex, lies, and overweight people who still seem to fit into a size 4. Addendum III - Music as an Influence Music is one of the most extraordinary mediums in the world. It's a unique language that is universal and ancient. I'm sure that some idiot (the first man, and even the modern man) sat on a rock and beat a club on the ground and thought, hey, I should for a band. So now we got four poor musicians who'll do anything for a gig. They're making music that they all love and life is grand. These are good guys. These are the guys that have a heart for something that they love and they won't let the world stand in between them and their dreams. It's the same way with almost all artists. Nobody can really enter the world of art expecting to be a success or a failure. But what every person should know is that they can enter the world of art and be prepared to grow and learn from what happens. I know that some of the simple photographs that I've seen in my life have changed the perspective on things for me. And the songs I hear can most definitely have a major impact on my thoughts and actions. It's simple to see this in everybody. You know how that fast song with lots of energy comes on, and before you know it, you're driving 65 in a 30, "feeling the flow. Working it." It's a great feeling. Something that is irreplaceable (but definitely not not exceedable.) Radiohead, R.E.M., and The Velvet Underground are probably the only bands which I've ever felt really connected to. They all deliver a great message to me, and send that message on wondrous instrumental works of art. R.E.M. gave me the advantage of feeling without experience. Lou Reed's simple minded complexities were great wisdom that I think of daily and is really involved in a lot of "What Goes On." (That's a song title to a Velvet Underground song, by the way.) And lastly, Radiohead has shown me the world about. It conquered my fears and it has really been a guide in the direction of my life. I understand through that music what may lie in the future. It really woke me up to quick thinking that my life can be what I make of it. No one can hold me back from doing what I really want, but some of us aren't quick to realize that we can hold ourselves back if we don't act on our judgments and if we don't get motivated to do what we want. I'd recommend those three CD's to any person in the world. Get all the live Velvet Underground you can and listen to each work like it was an important message coming over the telegraph. Write those words down, read them over and over, then hang them on the walls of your bathroom. Keep a poster of Michael Stipe in your bedroom and stare at it while you listen to R.E.M. And watch the nightly news after you've listened to Radiohead and apply your common sense to a world of chaos. "It's a Man Ray kind of sky. Let me show you what I can do with it." Addendum IV - Calvin and Hobbes This cartoon is so great to me that I just had to mention it here. The humor, wit, and philosophy that Bill Watterson so ingeniously portrays through his cartoon characters is unparalleled in my opinion. Calvin in a six year old boy who knows the perils of elementary school and having parents, and daydreams about dinosaurs in rocket ships. If you've never read any of the work, you're missing out on a life-changing set of books. I used to anxiously await each and every new release of the next book. It's so great. Anyway, back to our characters. Calvin is a witty, scary, typical six year old boy. His awesomeness lies in his incredible knowledge of things he knows nothing about. He picks up a great vocabulary from television and books, but is a terrible student in school. His stuffed tiger, Hobbes, is the wise leader of the two (although Calvin claims to be) and is very smart. The conversations the two have and the experiences they share open different doors in my mind and soul. From downright hilarious strips to sad ones that pull your heart into Calvin's, I'm sure that you won't regret reading anything that Bill Watterson has to put out. I also admire Bill Watterson because he didn't sell out. He fought syndication as long as he could, and quit writing Calvin and Hobbes because of the problems he had with the Corporate monsters who wanted Calvin T-shirts, stickers, figurines, etc. Screw that. Calvin and Hobbes will always have an eternally open field to gambol in inside of my heart. Addendum V - Love Love is a feeling that people feel when they have a special devotion towards someone. I am flawed in the fact that I must always feel loved by a special someone. It's not so bad, I guess, but loneliness is an empty feeling which I hate. A relationship at a young age (the only thing I'm experienced at) can be fulfilling or detrimental to a person's happiness. Some teens grow up all there life on their own and can depend on themselves solely. Others of us need a special friend or girl/boyfriend to help us along the way. I think I'm that latter, but the girlfriend/boyfriend thing isn't like having an extra set of arms. To me, having a relationship with someone else can be either an escape where you can throw your blues into the air and forget about them, or it is a place of comfort where you can get help with your problems. Whatever it is at that certain aspect of time, a very special bridge can build between your heart and that significant other. As a young person, it is necessary that we recognize that life is long and that this relationship most likely isn't one of eternal reward. But, we put our hearts into it strongly and we hope that we never part from that special person. It's easy to get hurt in a relationship, and a lot of times, that pain will carry into other relationships further down the line. Some people choose to take dating lightly, and to make high school relationships just fun little dates. That's fine also. It might be best because it keeps hearts from breaking. But, I must admit that I need to be loved (just like everybody else does.) And I can't keep myself from falling for girls who care, are adorable, and who are fun to be with. The downfall that I've so hardly been hit with is the haunting of ex-dates. I broke up with a girl after 2 years, and let me tell you, sometimes it comes back to haunt me. I can't express this in words, you'll have to experience for yourself. But trust me when I say that you won't stop thinking about him/her just because you broke up. You compare stupid things (and I mean stupid) to what he or she did or was like. And it's so annoying. You'll learn to despise it. Addendum VI - Anti-Technology (and what to do about it) Technology should be feared. Not for what it is, but for what it can become. Trains, planes, and automobiles were only the opening of a new gate that will open to endless technological takeover. In my opinion, we are creating, building, and capitalizing on something that may eventually lead to our downfall. The world in which we have created has resulted in laziness, etc. What's technology? First of all, we need to clearly get in your head what my definition of technology is. Technology is the inventions that do not use a man's energy and convert it, but use energy from the world. Often times, it's wasted energy. Nuclear weapons, toasters, and other machines that we have so great a deal of are a waste of time and money. It's funny that I say these things because I am a big user of technology. I have a TV, a VCR, a telephone, a toaster, a car, a computer, and even a air conditioner. How's that for comfort? Yes, I do contradict myself, but I could survive in a hut with a fireplace just as well. It doesn't matter if I did live in a hut either. It's worthless to set that example without first making clear what I was trying to prove. Maybe if this ever gets published into a nationwide best-seller, I can start an au naturale community out west somewhere. What can I say to do about technology? Succumb. It's all relentless. Besides, rebellion isn't in style this generation. Addendum VII - The Continuing Trilogy of Intelligent Music The intelligence of the music by the Talking Heads and David Byrne is overwhelming. The spoken words of Thom Yorke of Radiohead can rinse your head out. The wonderful emotion stored in Pink Floyd's music is wondrous too. And here is where the trilogy began. Although I don't consider myself any great genius about any of these bands, they all have a link. In the 70's, Pink Floyd was a musical takeover. It started this all. I was considering adding The Velvet Underground and Lou Reed to this, but they don't qualify. They didn't have such a common theme. Pink Floyd created the movie, "The Wall," and it was theirs. In the 1980's, David Byrne and The Talking Heads added a great amount of genius and through music, mesmorized what has become an elite and intelligent bunch of listeners. Byrne's movie, "True Stories," made me realize what this was all leading to. I don't completely understand it myself, and I think it's up to each individual to decide and to keep watching. Radiohead has continued by creating movie with a scary tone because of their view of the world. They have yet to create a movie, but we must remain eager for them to do so. It's a must. This addendum won't make any sense to you unless you see the two movies and listen to quite a bit of the music of each band. And listen to the words are fit them to your view of the world and combine all that muddy water to the dirt that I put in this. How's that for deep, dark waters? Addendum VIII - Photography Photography, I just want to mention, is a wonderful medium where art can be captured. Without it, all of us who can't paint or draw would be artless. There is no such thing as a bad artwork. People who tell you that your artwork is junk have a hole in their spirit or don't understand. Everything in the world can symbolize something else. Just hold onto your artworks. Feeble as such, a cheap blanket from your childhood can bring tears to your eyes, and a 25 year old photo of a high school love can make you appreciate times you've had and make memories wondrous. Taking classes on photography can be great. Learning to master the tools is necessary to fully, completely understand anything. But getting a grade on photos for content is damaging. I don't believe that you can grade anything like that. I respect all photographers because it's more and more becoming a rarely used art medium and it should be just as respected as painting and etc. Emotional outlets and ideas can't be graded, and it is dangerous to manipulate, bias, or fend against that. It's like trying to stop hot water from pouring out of an open faucet. Addendum IX - Great Quotations "They can't tell the difference between working and not working. There's no concept of weekends anymore." - True Stories "The only thing to fear is fearlessness. The bigger the weapons, the greater the fear." - Michael Stipe (Hyena) From bill.stewart at pobox.com Wed May 6 16:16:13 1998 From: bill.stewart at pobox.com (bill.stewart at pobox.com) Date: Wed, 6 May 1998 16:16:13 -0700 (PDT) Subject: No Subject Message-ID: <199805062316.QAA22622@toad.com> From bill.stewart at pobox.com Wed May 6 17:12:19 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 6 May 1998 17:12:19 -0700 (PDT) Subject: ANNOUNCE Bay Area Cypherpunks Meeting - May 9, 12-6pm Message-ID: <3.0.5.32.19980506155016.008dd510@popd.ix.netcom.com> The May Bay Area Cypherpunks Meeting will be Saturday at Temenos, 459 Fulton St. Suite 307, San Francisco. Some planned agenda items include - GSM crack hardware demo - Lucky Green - GSM cryptanalysis details - Ian Goldberg - Anon mailbox servers - Lucky Green - OpenPGP status - hacks in progress The meeting will be at the usual time - mill around at 12, organized part starts at 1, dinner nearby later. 459 Fulton is a few blocks west of Van Ness, probably closest to the Civic Center BART stop. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From gwb at gwb.com.au Wed May 6 22:01:03 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Wed, 6 May 1998 22:01:03 -0700 (PDT) Subject: Pauline Hanson's One Nation May 1998 Newsletter Message-ID: <1.5.4.32.19980507045734.00a25f80@mail.pronet.net.au> Issue 1.9, May 1998 ---------------------------------------------------------------------------- PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the mailing list please say "REMOVE" in the subject line and return this message in the body. ---------------------------------------------------------------------------- Dear One Nation supporter in New South Wales, It is now becoming extremely important that you make your desire to help One Nation in the upcoming Federal election known to your local branch. Your local contact (by email or phone) can be seen at the following URL: http://www.gwb.com.au/onenation/federal/become.htm Please let these key people know how you can help, whether it be by assisting in mail drops or manning polling booths. We need your help! During the last six weeks we have, as a political party, reached many milestones. These milestones, covered on the Internet, include: - One Nation's birthday party at my farm on April 11th See: http://www.gwb.com.au/gwb/news/history/day1.html for coverage and images. - the launch of the One Nation Federal Web site: http://www.gwb.com.au/onenation/federal There have also been a number of press releases on a range of issues. These can be seen at: http://www.gwb.com.au/onenation/press You might not be aware that negotiation on the MAI (multilateral agreement on investment) has been delayed, not stopped. See this URL for my press release on the MAI: http://www.gwb.com.au/onenation/press/010598.html For more information on this secret international treaty, visit: http://www.gwb.com.au/mai.html Finally, we need your financial assistance. We are not going to get the big business million dollar donations like the major parties. We depend on YOU to help us to promote the image and policies of this party at the upcoming Federal election. Please assist if and where you can. There is an on-line donation form at: http://www.gwb.com.au/pledge.html Regards, Pauline Hanson From StanSqncrs at aol.com Wed May 6 22:26:07 1998 From: StanSqncrs at aol.com (StanSqncrs) Date: Wed, 6 May 1998 22:26:07 -0700 (PDT) Subject: Spam Message-ID: Hi cyphers, I'm back. A certain 'nobody' invited me! ;-) Apparently only as far back as 1993, the definition of the word "spam" from the on-line jargon file was this (according to the New Hackers Dictionary) - spam [from the MUD community] vt. To crash a program by over-running a fixed- size buffer with excessively large input data. See also Buffer Overflow, Overrun Screw, Smash the Stack. Obviously that definition has changed since then. I've seen it go from that to repetitive commercial advertising, and I've seen it used to brand someone as an outcast of a list for future removal simply because a small minority didn't like what that person had said (so it was being used at that time to mean 'objectional material'). And in all the times I've seen the word fly, there has never been anykind of volume that would come close to overblowing the forum's mechanical capabilities. So, I'm curious as to who/what dictated the meaning of that to change so drasticly. Write me in private if it's off-subject (and yes, you can write me anonomously if you don't want a response. :-) ) Also, new address for my website - Stan, Stan and the Sequencers http://members.aol.com/StanSqncrs/ From toto at sk.sympatico.ca Thu May 7 01:18:29 1998 From: toto at sk.sympatico.ca (Toto) Date: Thu, 7 May 1998 01:18:29 -0700 (PDT) Subject: Dog Log - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <35516EC7.3EAF@sk.sympatico.ca> Dog Log - SPACE ALIENS HIDE MY DRUGS!!! _______________________________________ From: "William H. Geiger III" To: Eric Otot Cc: cypherpunks at cyberpass.net Subject: Re: The Borg Arrive -----BEGIN PGP SIGNED MESSAGE----- Eric Otot said: >So I have the choice of going somewhere inconvenient to >shop, shopping at Rite Aid and paying full MSRP for every >single item, which hardly any store sells stuff for, or >getting the incentivized mandatory/voluntary barcoded card, >and letting the Borg link me with everything I buy, down >to each and every sheet of toilet paper I use to >wipe my butt with. > >Beware the Borg. Coming soon to a neighborhood store near >you. > >P.S. I went with the card. So lets get this straight: You don't like a companies efforts to gather marketing statistics on its customers but due to your own *sloth* you not only continue to shop there but you also fill out the forms for them to track every purchase that you make! I am sorry but as hard as I try I can not generate the least bit of sympathy for you. Sheeple are sheeple because they act in the manner that you just outlined in your message. Bitch, whine and moan that the store tracks what brand of toilet paper they buy but if in exchange for $0.10 off 4 rolls and they will give up their entire life story. Sheep get sheered because they don't know any better, sheeple get sheered because they deserve it. ------------------------------------------------------------ William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html ------------------------------------------------------------ Tag-O-Matic: I use OS/2 2.0 and I don't care who knows! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 ZZZCharset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNUp/Ko9Co1n+aLhhAQHRpwP+OVypg6sRgZMAqW6NmaTexoqoRt4z3zxK lhQ6HGvmDMxIGqdS5vPPHw+kZPjtJbkxAWamoi6EtOccbv/3otl2bjuFPNBNMYD+ p7nMAhdZDk1zsgiiUhSzp3ZcREcFIy8Ybnu6u4xYf/wgueg26cW+JE8A5iyeJMOz 6dHT6oBT2IE= =u1mU -----END PGP SIGNATURE----- God bless WillyG III! Eric Otot wrote a reply to WGII's caustic post which gave a perfectly reasonable account of his preference for picking which 'battles' were worth his while to engage in, and which would be merely pissing in the wind of the masses rushing by to save their dime for the GreyHound restroom. I chose to omit EricO's reply and spell-correct WGIII's, in order to preserve the point made by his post, without lessening the post's effect by letting it be obvious that WG3 is an uneducated, redneck, barefoot hillbilly who has no 'manors'... I did so for the simple reason that Eric Otot's perfectly reasonable erudition of his postion on the imposition of identity-tracking techonlogy, although being a perfectly valid justification of the need for concentration of resources, is a position that millions or billions of perfectly reasonable people are capable of reasoning for themselves. Fuck 'reasonable'... Eric Cordian, a much wiser and more perceptive member of the CypherPunks list than Eric Otot, though less easily amused, elucidates one of the many reasons why it may be unreasonable to remain reasonable in one's reasoning in regard to what one must take under consideration when deciding the imortance, or lack thereof, of refusing to submit to the increasing intrusion of technology into our lives in return for what are often marginal benefits. From: Eric Cordian Subject: Re: The Borg Arrive To: cypherpunks at cyberpass.net Steve Schear writes: > Many of the large grocers in my area have also gone to > 'club' cards as a means of data mining and loyalty > promotion. However, the procedure for joining such clubs > is open loop, in that the cards are issued at the POS > and no check is made of the information your provide. > All of mine are pseudoanonymous. For the time being. However, that could change once all retail outlets are MarkOfTheBeast-Enabled. Infrastructure is infrastructure, after all. --- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" --- An interesting, widely unknown part of the Club Card equation is that, even if an individual does not 'provide' the vendor with the Mark of the Beast (SSN), those who control the databases involved 'add' MotB/SSN information from widely available 'lookup' sources. As well, the Corporate Beast seems to have learned a few tricks from the Government Beast. Just as the government takes your money as Federal Taxes and then uses it to 'buy' the compromise of your 'State rights' under the guise of matching federal funding, the corporations merely raise their prices and then give the customer a 'rebate' in return for registering for the Yellow Star Club Card. During my recent Soft Target Tour of Tucson, I used my base-player's Safeway Club Card, but I always made a point of going to the adjoining Walgreen's first, to get those things on my list which they sold, before going to Safeway. I cannot recall a single item which I bought at Walgreen's which was not a higher price at Safeway, unless one used the Club Card, whereupon it 'magically' became exactly the same price as the item was at Walgreen's. When shopping for myself, I refuse to play the 'Savings Club' game, for the same reason I don't sell my butt behind the GreyHound Bus Station for a paltry sum of money. Instead, I spend a few more dollars paying the inflated prices, and I leave a few expensive cuts of the store's meat products in a location where they won't be found for a few days. In essence, I pay more as a result of the Sheeple's actions, and they pay more as a result of mine. Tim May, a 34th Generation May Son and a licentious proctologist, has turned his multiple personality affliction into an overall benefit to the quality of his life by singlehandedly creating and maintaining all of the various personas that make up the CypherPunks list subscriber membership, maintaining the list archives, singlehandedly inventing all CypherPunks technologies under his 'Tim May' persona, and keeping his remaining personas in line by referring them to the 'archives' every time the subordinate personas try to take credit for legendary CypherPunk concepts such as 'sliced bread' and the 'wheel'. Despite being the only real subscriber to the CypherPunks list, he manages to not only singlehandedly run all of the Bay Area CypherPunks Physical Meetings, but also to put into practice the MeatSpace manifestations of the concepts he espouses, by methods such as discussed in the following: To: Eric Cordian , cypherpunks at cyberpass.net From: Tim May Subject: Re: The Borg Arrive At 6:05 PM -0700 5/1/98, Eric Cordian wrote: >A few weeks ago, however, Rite Aid did something which was >not merely mildly annoying, but actually threatening to my >privacy. > >I walked into the store, and noticed that every sale tag >in the store had been embellished with fine print >containing the words "(With your Rite Rewards Card)" Giant >banners proclaimed that this card was free and could be >obtained by simply filling out a little form, available >at any register. This form required your name, address, >apt, state, zip, phone number, and date of birth, and the >card was barcoded. Did you miss the discussion of the Kalifornia Solution? At physical meetings and parties we _exchange member cards_ randomly. A persona hit upon this after I was showing my "Safeway" (a major Kalifornia-based chain in 46 of the 57Semi-Autonomous Republics) and describing how we can execute a Chaumian exchange. As the cards are just cards, with no photo and no obvious I.D. attached, such exchanges are easy. >Beware the Borg. Coming soon to a neighborhood store near you. > >P.S. I went with the card. But of the cards I have, all are filled out illegibly or have been traded multiple times. Identity entropy is an interesting concept. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. Federal US Marshall Clow, famous as the LEA who finally brought the Blues Brothers to Justice and Ray Charles to Blind Justice, suggests that Identity Entropy Warriors use the addresses of the the secret lairs of the Circle of Eunuchs and the Army of Dog in filling out all forms, so that the UCE/Spams they so dearly love can be forwarded to them after InfoWar has driven them underground. To: Rabid Wombat , Martin Minow From: Marshall Clow Subject: Re: The Borg Arrives Cc: cypherpunks at cyberpass.net At 8:45 AM -0700 5/1/98, Rabid Wombat wrote: >On Fri, 1 May 1998, Martin Minow wrote: >> accepts a loyalty >> card and complains that he has lost his privacy. >> So, do the Cypherpunks thing -- get another card and use >> that sometimes. >> In fact, have all your friends get cards and, whenever >> you get together throw your cards in a pile and take new >> ones away with you > >> ps: did you actually sign your real name? If so, we're >> going to take away your secret decoder ring. > He used his real address. Now they know where to find > his cat ... Try 1060 West Addison; Chicago IL (Wrigley Field) or 70 Brookline Dr.; Boston MA (Fenway Park) -- Marshall Marshall Clow Adobe Systems "I predict future happiness for Americans if they can prevent the government from wasting the labors of the people under the pretense of taking care of them." ---Thomas Jefferson Although Marshall Clow ends his post with a grotesquely misquoted statement from Thomas Jefferson--whose original quotations in regard to government invariably contained words such as ratfuckers, cocksuckers, slimeballs, jerkwads, etc.--it nonetheless reflects the type of subterfuge that Jefferson foresaw taking place in the sphere of government, which is today being mirrored in the methodologies of corporations worldwide. The 'federal matching funds' and 'club card savings' scams are but one example of the reasons that an increasing number of citizens, such as Tim May, are finding it necessary to undergo training in proctology, in order to figure out just what the hell governments and corporations are *doing* back there... The preceeding illustrates what individuals and small cells of Army of Dog Warriors can do to throw an element of misdirection into the increasing number of tracking mechanisms being put in place in our daily lives. However, these effect of these types of resistance to the digitalization of humanity are generally far outweighed by the mindless SheepleDom of the masses in allowing themselves to be herded unquestioningly into an endless variety of feeding pens where they are expected to feed on corporate products and, in turn, be fed upon by the government. Of much more effect are the actions of potential Army of Dog Warriors who are in positions which allow them to add misdirection to the digital equation at a level which can throw a Major Screw into the machinery. System Administrators, DataBase Managers, Tech Support personnel, software and hardware Programmers and Developers, are all in a position to enter random numbers into the structured equations designed to monitor and track an increasing number of individual citizens whose lives will be documented in increasing detail in an ever-widening network of corporate and government databases. Tim C. May Owes Me $ .05 As His Share Of The Money That Was Ripped Off From Me By Sun MicroSystems By Selling Me An Operating System Which Was Written By University Students Who Put Comments In The Source Files Which Made Fun Of People Over '30': Tim--I paid Deloite & Touche $ 60,000 to do a Quality Control Analysis on my life, in general, and their report, which is the equivalent of borrowing my watch to tell me what time it is, indicates that the posts you have made to the CypherPunks Disturbed Male LISP since 7 Dec, 1989, are worth $ .03, so as long as you send me your $ .02 worth, we can call it even, and I won't have to launch an assault on Mayonnaise Mountain and put my SPARCard 2 where the Sun MicroSystems don't shine... The Bottom Line, Version 9.9, Revision 0.0: It's my birthday, I'm halfway through a bottle of Glenfiddich, Cask Strength (51% alcohol) Scotch, which is produced in Dufftown (Home of 'Duff Beer', Homer Simpson's drink of choice), Banffshire (Just outside of Calgary, AB), Scotland (An independent Cirle of Eunuchs/Army of Dog Republic often referred to as 'The Texas of the British Empire'). My Dad gave me a birthday call, during which he informed me that his talks with the RCMP revealed that Canadian Customs can hold my computers, etc., up to 90 days before exorcising their option to put their dick up my ass, and then hold it for the fifty years during which the outcome of any further court proceedings are decided. I totally flipped out, screaming all kinds of self- incriminating utterances which prove conclusively that I am a danger to the lives and lifes of decent, Dog- Fearing MeatSpaceIzens everywhere, even though I am fully aware that my electronic communications are being monitored by those who will be 'between a rock and a hard place' when they have to decide whether they should admit to their illegal, surrupticious surveillance of my life, since birth, which would prove that my extreme paranoia validates my 'sanity defense', or to pretend that they are just a loosely-knit organization of semi-competent traffic-ticket writers who have no idea what this silly, paranoid fool is talking about, validating their claim that I should be committed to an internment camp for the Delusionally Politically Incorrect, and that the evidence confirming the reality of the basis of my nonsensical blatherings should be chalked up to 'mere coincidence'. For Professional Mathematicians Only: 1. Estimate the number of times I have 'twitched' in between the time I screamed at my Dad that the RCMP are not the only ones in possession of firearms. 2. Divide this estimate by the number of times I have gotten laid since 1992 (Hint: '0'). 3. Add the number of times that Toto has forged posts to the CypherPunks list, using your name. 4. Subtract the number of ASCII-Art spams sent to the list since July 31, 1999 (Hint: 'The same as answer #2'). 5. Multiply by Franklin's Fudge Factor. 6. Plot Pinkerton's Probability Point. 7. Ask yourself, "How many stops did the train make?" An accurate calculation of the undescribable, inane, indiscrimate insanities enumerated above, will, if divided by the value of Pi legislated by Congress, provide the number of bodies it takes to spell 'Einstein Was Crazy'. While this in no way relates to valid CypherPukes issues such as Craptographics or Piracy, it is essential to the issue of exactly when this chapter of 'SPACE ALIENS HIDE MY DRUGS' ceased to follow the pre-ordained path which the Tao was directing it toward, by way of CensorShip by the Cosmic Muffin, and became a meaningless diatribe during which I tried to disguise the fact that I am jumping up and down, screaming "KILL, KILL, KILL!!!" and putting my head through the walls of my home in an increasingly futile attempt to prevent myself from stepping beyond the boundaries of the social programming provided by the Secret Government Agents Cleverly Disguised As Teachers and emptying the clips of several dozen illegal firearms into the MeatSpace boundaries of a Post Office, a Luby's Cafeteria, and a Schoolhouse Full Of 'Innocent Children Who Would Eventually Murder Their Parents If I Didn't Slaughter Them, Anyway' To Be Named Later. The concept of the Army of Dog assumes that the majority of DogIzens will be sufficiently sane to direct their rEvolutionary thoughts, feelings and actions in a direction which will result in the BioSemiotic Evolution of Humankind moving forward to an increasingly logical and humanistic future. If a few MadDogs such as myself have to be put down by LEA CypherPunks, and a number of Sheeple need to be Nuked by Timothy C. McCypherPunks, then it is a small price to pay for ensuring that SpamFord will be free to compete with Dimitri's ASCII-Art and Fuck at Yourself.Up's Trojan Horses for the attention of CypherPunks Disturbed Male LISP Mambo'ers who have remained subscribed to 'cypherpunks-unedited at toad.com', in order to document the 'Secret Conspiracy Against The CypherPunks List' that is being perpetrated by the Commie Schill, Ignoramus Chewed-Off, the Awe-Stun-Taxes WebMasturbator, James ChokeTheMonkey, and A Nietzsche Nazi Racing Across The Tundra In A Snowmobile To Be Named Later. When all is said and done, it matters little that the Violent Armed Thugs who comprise the Dudley DoWrong Division of the RCMP are incapable of setting up and railroading an individual who is half as smart as his dog. What matters is that they can shoot his sorry ass, move the body to the nearest Reservation, put a skirt on him, add the body of dead, young Native child with a tube of glue in his hand, and launch an internal investigation by their BumBuddies (TM) that will show them to have followed Proper PoliceMurder Procedure. Now For The 'BAD' News: As you have probably guessed, given the obvious degeneration of this rambling diatribe into an incoherent 'Rage Against The Machine', I have finally sunk into such a depraved condition of violent insanity that any astute judge of the human condition can easily predict that the next chapter of 'SAHMD' will tell The Truth, The Whole Truth, And Nothing But The Truth. Please read it, anyway... If you constantly remind yourself that I am a madman, then you can relegate what I have to reveal to your subconsious, and continue to chop wood and carry water without feeling obligated to join me in an assault on everything that righteous, Dog-Fearing Netizens hold sacred. The Retribution is NOW! From muad at iname.com Thu May 7 02:00:34 1998 From: muad at iname.com (muad at iname.com) Date: Thu, 7 May 1998 02:00:34 -0700 (PDT) Subject: password.pwl Message-ID: <199805070900.FAA04899@web02.globecomm.net> I have the source code for glide.c the decrypter but i dont know how to run the program. Therefore i need your help in this. --------------------------------------------------- Get free personalized email at http://www.iname.com From ptrei at securitydynamics.com Thu May 7 07:41:06 1998 From: ptrei at securitydynamics.com (Trei, Peter) Date: Thu, 7 May 1998 07:41:06 -0700 (PDT) Subject: [OFF TOPIC] Spam Message-ID: <6B5344C210C7D011835C0000F8012766017A75DD@exna01.securitydynamics.com> [Trei, Peter] stanSqncrs [SMTP:StanSqncrs at aol.com] wrote: >Apparently only as far back as 1993, the definition of the >word "spam" from the on-line jargon file was this (according >to the New Hackers Dictionary) - >spam [from the MUD community] vt. To crash a program by >over-running a fixed- size buffer with excessively large >input data. See also Buffer Overflow, Overrun Screw, Smash >the Stack. >Obviously that definition has changed since then. I've seen >it go from that to repetitive commercial advertising, and >I've seen it used to brand someone as an outcast of a list >for future removal simply because a small minority didn't >like what that person had said (so it was being used at that >time to mean 'objectional material'). >And in all the times I've seen the word fly, there has never >been anykind of volume that would come close to overblowing >the forum's mechanical capabilities. >So, I'm curious as to who/what dictated the meaning of that >to change so drasticly. Write me in private if it's >off-subject (and yes, you can write me anonomously if you >don't want a response. :-) ) How quickly they forget... It's not a change of meaning; rather, it is a new branch off of an earlier root meaning. The ultimate root, is of course, Hormel's processed meat product. I don't know how old that is but it goes back at least to WW2. The immediate root lies in a Monty Python sketch of the early 70's. The text may be found at http://w3.informatik.gu.se/~dixi/spam.htm (don't miss the sound clip.) It takes place in a cafe, where almost every menu item includes Spam. As a waitress reads the menu to some patrons ("egg and spam; egg bacon and spam; egg bacon sausage and spam; spam bacon sausage and spam; spam egg spam spam bacon and spam; spam sausage spam spam bacon spam tomato and spam..." etc), a group of Vikings at the next table start to sing: "Spam Spam Spam Spam Spam Spam Spam Spam" "Lovely Spam! Wonderful Spam!" "Lovely Spam! Wonderful Spam!" (repeat endlessly) ---------------- At certain science fiction conventions in the late 70's and early 80's it became a tradition for groups of fans (to whom the Pythons were minor deities) to parade en mass through the corridors of convention hotels singing the Spam Song. Many online fen were also active in early MUDs, so the term came to be used for unwanted, repetitive, voluminous, and content-free input of all kinds. ------------ Flash forward to April 14, 1994. The WWW is not on most peoples radar yet; it's still the Age of Usenet. Cantor & Siegel, a pair of shysters, figure out that they can advertise their dubious 'services' (charging $100 for information which the government gives out for free) at no cost on usenet. Like many lawyers, they suffer from a mental disorder which leads them to believe that any action which is not explicitly against the law is reasonable and appropriate. They send their ad to over 5000 newsgroups, regardless of topic. In those days, many netusers read multiple newsgroups every morning. That day, every newsgroup you opened included the same article in the subject list, along with dozens of angry denouncments of the off-topic post. *Every* *single* *newsgroup*. The resemblance to the menu at the Python cafe was unmistakeable, and 'spam' was the term instantly adopted to describe the practice. Since then, the use of the term 'spam' has been expanded to refer to any sort of off-topic and undesired information sent over the net, especially when a shotgun approach is used. Question: When was the *first* spam type message? I remember in the early 80's a student spammed Usenet, asking for small donations to help him meet tuition. Are there any earlier cases? Peter Trei ptrei at securitydynamics.com From J-Dog at Elitehackers.org Thu May 7 07:42:06 1998 From: J-Dog at Elitehackers.org (J-Dog) Date: Thu, 7 May 1998 07:42:06 -0700 (PDT) Subject: password.pwl In-Reply-To: <199805070900.FAA04899@web02.globecomm.net> Message-ID: gcc -o glide glide.c Latez JD On Thu, 7 May 1998 muad at iname.com wrote: > I have the source code for glide.c the decrypter but i dont know how to run the program. > Therefore i need your help in this. > > > --------------------------------------------------- > Get free personalized email at http://www.iname.com > From jim at mentat.com Thu May 7 08:01:57 1998 From: jim at mentat.com (Jim Gillogly) Date: Thu, 7 May 1998 08:01:57 -0700 (PDT) Subject: Spam Message-ID: <9805071457.AA20574@mentat.com> Stan the Sequencer sez: > Apparently only as far back as 1993, the definition of the word "spam" from > the on-line jargon file was this (according to the New Hackers Dictionary) - > > spam [from the MUD community] vt. To crash a program by over-running a fixed- > size buffer with excessively large input data. See also Buffer Overflow, > Overrun Screw, Smash the Stack. This isn't quite accurate. The term "spamming" in Mudding has always meant inundating the players with repetitive material, whether intentionally or accidentally, and has been used in that sense since sometime around 1990 at least. The "overflow" is of user screens, not stacks or buffers... although of course any high usage like that can test a program's limits. I just wrote and snipped a long disquisition on the history of spam starting with Clarence Thomas IV in 1993, having realized it's probably not relevant to your interests and old hat to everybody else. Suffice it to say that spam does require extra resources to process, both in hardware and time. We resent it because the end user is paying for it rather than the advertiser, so there is no natural limit to the amount of crap they can pour on us. Jim Gillogly From StanSqncrs at aol.com Thu May 7 14:11:10 1998 From: StanSqncrs at aol.com (StanSqncrs) Date: Thu, 7 May 1998 14:11:10 -0700 (PDT) Subject: Spam Message-ID: Thanks to Peter Trei for that bit of history. In a message dated 5/7/98 10:26:48 AM Central Daylight Time, jim at mentat.com writes: << I just wrote and snipped a long disquisition on the history of spam starting with Clarence Thomas IV in 1993, having realized it's probably not relevant to your interests ... >> Actually, by the timing you describe, it would probably make it VERY relevant to my interests. I'd love to see it. << and old hat to everybody else. Suffice it to say that spam does require extra resources to process, both in hardware and time. We resent it because the end user is paying for it rather than the advertiser, so there is no natural limit to the amount of crap they can pour on us. >> But times have changed again. Now the users have unlimited access. BTW: As I understand it, the corporations were given free-speech rights with a bad Supreme Court decision back in the '20's, even though the constitution only grants rights to "people" and "citizens" (14th amendment) Stan From iw at merkur.contexo.de Fri May 8 05:19:49 1998 From: iw at merkur.contexo.de (Ingo Wechsung) Date: Fri, 8 May 1998 05:19:49 -0700 (PDT) Subject: My mail address changed Message-ID: <9805081217.AA03419@merkur.contexo.de> Your mail address cypherpunks at toad.com was found in one of my mailboxes. I want to inform you, that the following mail addresses iw at return-online.de ingo.wechsung at return-online.de iw at cas-nord.de ingo.wechsung at return-online.de will be invalid from July 1st, 1998 on. Please use one of the following addresses from now on: iw at contexo.de ingo.wechsung at contexo.de Kind Regards Ingo Wechsung From billp at nmol.com Fri May 8 07:51:21 1998 From: billp at nmol.com (bill payne) Date: Fri, 8 May 1998 07:51:21 -0700 (PDT) Subject: http://www.jya.com/whp043098.htm Message-ID: <35530212.62B0@nmol.com> Friday 5/8/98 6:25 AM John Young J Orlin Grabbe Sobolewski phoned last night. Sobolewski gave me his opinion. 1 Campos is going to hold in camera ex parte conference with NSA 2 Campos will then award summary judgment to NSA. I told Sobolewski that most of the legal citations in Campos� document were not contained in the pleadings. Sobolewski EXCLAIMED, �Oh.� Sobolewski is particularly good at law. Sobolewski�s father was a lawyer and judge both in Poland and Australia. Sobolewski prevailed in an lawsuit spanning the US and Australia - but it still cost him more than $20k TELLING a lawyer what to do. Sobowleski usually beats speeding tickets. Sobolewski uses DISCOVERY to obtain maintenance and calibration records of police radar. And also radar operation training records of the officer who stopped him. The MEMORANDUM OPINION AND ORDER authored by some government lawyers and signed by Campos is clearly a candidate for one of the STUPIDEST and INCOMPETENT legal documents ever written. http://www.jya.com/whp043098.htm Morales and I LOVE IT, of course! This is why we were so happy last Friday. We got another shot at THEM [aka The Great Satan]. Morales is taking the day off from Sandia today. We will finish and file our motion. Then BLAST it out on the Infobahn. I see other good legal advice linked at http://www.aci.net/kalliste/ http://www.phrack.com/52/P52-05 Later bill From billp at nmol.com Fri May 8 12:01:06 1998 From: billp at nmol.com (bill payne) Date: Fri, 8 May 1998 12:01:06 -0700 (PDT) Subject: FILED 98 MAY - 8 AM 11:31 Message-ID: <3553504B.6AA9@nmol.com> John Young File-stamped copy was mailed to you at US Courthouse. Later bill UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW MEXICO William H. Payne ) Arthur R. Morales ) ) Plaintiffs, ) ) v ) CIV NO 97 0266 ) SC/DJS ) Lieutenant General Kenneth A. Minihan, USAF ) Director, National Security Agency ) National Security Agency ) ) Defendant ) PLAINTIFFS' MOTION TO AMEND Santiago E. Campos MEMORANDUM OPINION AND ORDER FILED 98 APR 30 AM 11:45 1 COMES NOW plaintiffs Payne and Morales [Plaintiffs] to exercise their rights under the Federal Rules of Civil Procedure, Rule 52. Findings by the Court; Judgment on Partial Findings (b) Amendment. On a party's motion filed no later than 10 days after entry of judgment, the court may amend its findings--or make additional findings--and may amend the judgment accordingly. ... 2 Plaintiffs will show that the Court's [Campos] MEMORANDUM OPINION AND ORDER http://www.jya.com/whp043098.htm contains presumably-unintentional false statements or misleading statements of essential material facts. Plaintiffs move to permit Campos to amend ORDER to reflect proper remedy of obvious evidence of lack of impartiality and judicial misconduct. A judge is supposed to judge arguments presented by the Plaintiffs and the Defendant. An judge is NOT SUPPOSED to engage in legal research designed to support either Plaintiff or Defendant's case. Judge Campos was supposed to rely on legal citations presented ONLY by pro se Plaintiffs or NSA Defendant Minihan's lawyer, Assistant US Attorney Jan Elizabeth Mitchell [Mitchell]. MEMORANDUM OPINION AND ORDER contains OVER ABOUT 144 legal citations most of which WERE NOT PRESENTED TO THE COURT in pleadings by either Plaintiffs or Defendant. 3 Campos writes Plaintiffs contend that Federal Civil Procedure Rule 36 explicitly provides that discovery is allowed without leave of the court. Plaintiffs quote citation The Court is unsure where Plaintiffs found the language they quote, but it is incorrect. Federal Civil Judicial Procedure and Rules, WEST PUBLISHING COMPANY, 1991 Revised Edition, page 110 states, Rule 36. Requests for Admission Request for admission (a) A party may serve upon any other party a written request for the admission, for the purposes of the pending action only, of the truth of any matters within the scope of Rule 26(b) set forth the request that relate to statements or opinions of fact or of the application of law to fact including the genuineness of any documents described in the request. Copies of documents shall be served with the request unless they have been or otherwise furnished or made available for inspection and copying. The request may WITHOUT LEAVE OF THE COURT, be served upon the plaintiff after commencement of the action and upon any other party with or after service of the summons and complaint upon that party. ... Updated Rule 36 seen at http://www.law.cornell.edu/rules/frcp/overview.htm, click at 36. Requests for Admission states A party may serve upon any other party a written request for the admission, for purposes of the pending action only, of the truth of any matters within the scope of Rule 26(b)(1) set forth in the request that relate to statements or opinions of fact or of the application of law to fact, including the genuineness of any documents described in the request. Copies of documents shall be served with the request unless they have been or are otherwise furnished or made available for inspection and copying. Without leave of court or written stipulation, requests for admission may not be served before the time specified in Rule 26(d) . Rule 26(d) states (d) Timing and Sequence of Discovery. Except when authorized under these rules or by local rule, order, or agreement of the parties, a party may not seek discovery from any source before the parties have met and conferred as required by subdivision (f). Unless the court upon motion, for the convenience of parties and witnesses and in the interests of justice, orders otherwise, methods of discovery may be used in any sequence, and the fact that a party is conducting discovery, whether by deposition or otherwise, shall not operate to delay any other party's discovery. Essential material facts are 1 5/23/97 Docket Sheet entry 9 Plaintiffs file MOTION by plaintiff for order to accept discovery plan (dmw) 2 Defiant misses filing date for response to entry 9. 3 Plaintiffs' file on 6/9/97 Docket Sheet entry 13 MOTION by plaintiff to accept discovery plan of plaintiffs as an unopposed motion before the court (dwm) 4 In panic Defendant's lawyer US Mitchell submits on 6/9/97 Docket Sheet entry 14, RESPONSE by defendant to motion to accept discovery plan of plaintiffs as an unopposed motion before the Court [13-1] (dwm) [Entry date 06/10/97] Lawyer Mitchell, apparently realizing her legal procedural blunder, is forced to deposit her LATE MOTION in Court outside mailbox since entry was not stamped FILED until June 10. The "time specified in Rule 26(d)" was satisfied, therefore Plaintiffs were with the law for proceeding with discovery. 4 Campos cites in B. Standing of Plaintiff Morales ... see also NLRB v. Sears. Roebuck & Co., 421 U.S. 132, 144 n. 10 ( 1975). Plaintiffs can find no reference to NLRB v. Sears. Roebuck & Co in Mitchell's pleadings Therefore Campos reaches conclusion that Morales should be removed partially on obviously biased citations of Campos own legal research. 5 Campos writes in C. Proper Defendant Campos cites the following legal citations to justify dismissing defendant Minihan 1 Thompson v. Walbran, 990 F.2d 403, 405 (8thCir. 1993) (per curiam); 2 Petrus v. Bowen, 833 F.2d 581, 582-83 (5th Cir.1987); 3 Sherwood Van Lines, Inc. v. United States Department of the Navy,732 F. Supp. 240, 241 (D.D.C. 1990); 4 Gary Energy Corp. v. United StatesDepartment of Energy, 89 F.R.D. 675, 675-77 (D. Colo. 1981). 5 But see, e.g Diamond v. FBI, 532 F. Supp. 216, 21920 (S.D.N.Y. 1981), aff'd on other grounds, 707 F.2d 75 (2d Cir. 1983); 6 Hamlin v. Kelley, 433 F. Supp. 180,181 (N.D. Ill. 1977). 7 Parks v. IRS, 618 F.2d 677 684 (10th Cir. 1980) Plaintiffs can find NONE of the above legal citations in ANY pleadings before the Court. Therefore, Plaintiffs conclude that Campos is obviously biased and has improperly introduced legal citations in an attempt to have Minihan dismissed. 6 Campos cites in III. FOIA A. FOIA Policy 1 NLRB v, Robbins Tire & Rubber Co., 437 U.S. 214, 242 (1978). 2 Anderson v. Department of Health and Human Services,907 F.2d 936, 941 (10th Cir. 1990) 3 Maricopa Audubon Society v. United States Forest Service, 923 F. Supp. 1436, 1438-39 (D.N.M. 1995) 4 Maricopa Audubon Society v. United States Forest Service, 923 F. Supp. 1436, 1438-39 (D.N.M. 1995) 5 Hale v. United States Department of Justice, 973 F.2d894, 897 (10th Cir. 1992) 6 (citing EPA v. Mink, 410 U.S. 73, 79-80 (1973), vacated on other grounds, 509 U.S. 918 (1993)); 7 Office of Information and Privacy, U.S. Department of Justice, Freedom of Information Act Guide & Privacy Act Overview 3 (Sept. 1997 ed.) 8 S. Rep. No. 813, 89th Cong., 1st Sess. 10 (1965), 9 United States Department of Justice v. Reporters Commission for Freedom of the Press, 489 U.S. 749, 773 (1989);see id. at 774 10 Air Force v. Rose, 425 U.S. 352, 360-61(1976); 11 Anderson v. Department of Health and Human Services, 907 F.2d 936,941 (10th Cir. 1990); 12 Johnson v. United States Department of Justice, 739F.2d 1514, 1516 (10th Cir. 1984) 13 Hale v. United States Department of Justice, 2 F.3d 1053, 1057 (10th Cir. 1993); 14 Cal-Almond, Inc. v. United States Department of Agriculture, 960 F.2d 105, 107 (9th Cir. 1992). 15 Bowen v.United States Food and Drug Administration, 925 F.2d 1225, 1226 (9th Cir. 1991) . 16 King v. Department of Justice, 830 F.2d 210, 217 (D.C. Cir.1987). 17 Vaughn v. Rosen, 484 F.2d 820 (D.C.Cir. 1973); 18 Weiner v. FBI, 943 F.2d 972, 977 (9th Cir. 1991). 19 Halperin v. CIA, 629 F.2d 144, 14849 (D.C. Cir. 1980); Plaintiffs can find NONE of the above citation of law in pleadings before this Court Campos is obviously biased for including above 18 citations. Campos cites internet addresses 1 < http://www.usdoj.gov/oip/oip.html > 2 < http://www.usdoj.gov/oip/oip.html > 3 < http://www.usdoj.gov/oip/oip.html > 4 < http://www.usdoj.gov/oip/oip.html> 5 < http://www.usdoj.gov/oip/oip.html> 6 Mitchell cites no Internet address in her pleadings. Above Internet address citations are not those given by Plaintiffs. Therefore, Campos introduces material not in pleadings before this court in his MEMORANDUM OPINION AND ORDER. 7 Campos cites in B. Exhaustion of Administrative Remedies 1 Taylor v. United States Treasury Department, 127 F.3d 470,475 (5th Cir. 1997) 2 Taylor v. Appleton, 30 F.3d 1365, 1367 n.3 (11th Cir. 1994) 3 Volvo GM Heavy Truck Corp. v. United States Department of Labor, 118 F.3d 205, 08-09 (4th Cir. 1997) 4 Trenerry v. Internal Revenue Service, No. 95-5150, 70 F.3d 598, 1996 WL 88459 at *1 (10th Cir. March 1, 1996) 5 Lanter v. Department of Justice, No. 93-6308, 19 F.3d 33, 1994 WL 75876 at *1 (10th Cir. March 8, 1994) 6 Hass v. United States Air Force, 848 F. Supp. 926, 929 (D. Kan. 1994) 7 Katzman v. CIA, 903 F. Supp.434, 437 (E.D. N.Y. 1995) (citing Becker v. Internal Revenue Service, 34 F.3d 398, 405 (7th Cir. 1994)). 8 Ruotolo v. Department of Justice, 53 F.3d 4, 8 (2d Cir. 1995); 9 Spannaus v. United States Department of Justice, 824 F.2d 52, 59 (D.C. Cir 1987); 10 Kuchta v. Harris, No. 92-1121, 1993 WL 87705 at *3 (D.Md. March 25, 1993) 11 Trueblood v. United States Department of Treasury, 943 F. Supp. 64, 66-67 (D.D.C. 1996); Plaintiffs could NOT find ANY of the above legal citations in pleadings before this Court. Campos gives biased opinion on exhaustion of administrative remedies. 8 Campos cites in C. Summary Judgment 1 Haines v. Kerner, 404 U.S. 519, 520 (1972) (per curiam). 2 Shabazz v. Askins, 14 F.3d 533, 535 (10th Cir. 1994). 3 Green v.Dorrell, 969 F.2d 915, 917 (10th Cir. 1992). 4 Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 249, 255 (1986). 5 Magnum Foods, Inc. v. Continental Casualty Co., 36 F.3d 1491, 1497 (10th Cir. 1994). 6 World of Sleep. Inc. v. La-Z-Boy Chair Co., 756 F.2d 1467, 1474 (10th Cir. 1985) 7 Celotex Corp. v. Catrett. 477 U.S. 317, 325 (1986). 8 Bacchus Industries. Inc. v. Arvin Industries. Inc., 939 F.2d 887,891 (10th Cir. 1991). Plaintiffs can find none of the above citation in pleadings before this Court. 9 Campos cites in 3. Plaintiff's First Summary Judgment Motion 1 Powell v. McCormack, 395 U.S. 486, 496 (1969) 2 Phillippi v. CIA, 546 F.2d 1009, 1013 (D.C. Cir. 1976). 3 Patterson v. FBI, 705 F. Supp. 1033, 1039 (D.N.J. 1989), aff'd 898 F.2d 595 (3d Cir. 1990). 4 American Friends Service Committee v. Department of Defense, 831 F.2d 441, 444 (3d Cir. 1987) 5 Salisbury v. United States, 690 F.2d 996, 970 (D.C. Cir. 1982) 6 Sen. Report No. 1200, 93rd Cong. 12 (1974), U.S. Code Cong. & Admin. News 6267, 6290 (1974)). 7 AG's 1993 FOIA Memorandum 8 Afshar v. Department of State, 702 F.2d 1125, 1130 (D.C. Cir. 1983). 9 Pfeiffer v. CIA, 721 F. Supp. 337, 342 (D.D.C. 1989) 10 Public Citizen v. Department State, 11 F.3d 198, 204 (D.C. Cir. 1993). 11 Fitzgibbon v. CIA, 911 F.2d 755, 766 (D.C. Cir. 1990) 12 Military Audit Project v. Casey, 656 F.2d 724, 74345 (D.C. Cir 1981) 13 Phillippi v. CIA, 655 F.2d 1325, 1332-33 (D.C. Cir. 1981) 14 McNamera v. United States Department of Justice, 974 F. Supp. 946, 955-56 (W.D. Tex. 1997). 15 Halperin v. CIA, 629 F.2d 144, 14849 (D.C. Cir. 1980), 16 United States Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 749, 773 (1989); 17 King v. United States Department of Justice, 830 F.2d 210, 224 (D.C. Cir. 1987); 18 Fitzgibbon v. CIA, 578 F. Supp. 704, 709 (D.D.C. 1983). 19 Katzman v. CIA, 903 F. Supp. 434, 438 (E.D.N.Y. 1995). 20 McDonnell v. United States, 4 F.3d 1227, 1246 (3d Cir. 1993) (citing Association of Retired Railroad Workers v. United States Railroad Retirement Board, 830 F.2d 331, 336 (D.C. Cir. 1987)). 21 United States Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 749, 775 (1989). 22 Founding Church of Scientology v. NSA, 610 F.2d 824, 30, 833 & n. 80 (D.C. Cir. 1979). 23 EPA v. Mink, 410 U.S. 73, 80 (1973); 24 NLRB v. Robbins Tire & Rubber Co., 437 U.S. 214, 242 (1978). Plaintiffs cannot find any of the above 24 citation in pleadings before this Court. 9 Campos writes Consequently, the Court requests that Defendant provide it, as it has offered to do, an in camera ex parte declaration or detailed affidavit explaining its reasons for its "Glomar response" and for nondisclosure of none of the Iranian and Libyan messages and translations from June 1, 1980 to June 10,1996, if they do exist. See Anderson v. Department of Health and Human Services, 907 F.2d 936, 942. (10th Cir. 1990).24 The declaration of affidavit must be provided by the Defendant to the Court within sixty days of the date of this opinion. The Court will stay its decision on Defendant's Motion for Summary Judgment (Exemption 3) until after it has heard or examined Defendant's explanation. and quotes 24 As the Tenth Circuit has explained: In order to fulfill its obligation to review de novo the agency's decision not to disclose materials sought under the FOIA, a district court has a variety of options. "The FOIA allows the district court flexibility in utilizing in camera review of the disputed documents, indexing, oral testimony, detailed affidavits, or alternative procedures to determine whether a sufficient factual basis exists for evaluating the correctness of the [agency] determination in each case." [If a Vaughn index or an affidavit is insufficient,] then the district court must utilize other procedures in order to develop an adequate factual basis for review of the agency action. Anderson v. Department of Health and Human Services, 907 F.2d 936, 942 (10th Cir. 1990) (quoting DeSalvo v. Internal Revenue Service, 861 F.2d 1217, 1222 n.6 (10th Cir. 1988) (first alteration in Anderson)). Plaintiffs cannot find reference to 1 Anderson v. Department of Health and Human Services, 907 F.2d 936, 942 (10th Cir. 1990) 2 DeSalvo v. Internal Revenue Service, 861 F.2d 1217, 1222 n.6 (10th Cir. 1988) in pleadings before this Court. WHEREFORE Plaintiffs move for Campos to amend MEMORANDUM OPINION AND ORDER which currently reads 10 NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the Court to be the NSA, and not Lt. Gen. Kenneth A. Minihan. Future captions for this case should reflect this change. IT IS FURTHER ORDERED that Plaintiff's Motion for Summary Judgment is DENIED without prejudice. IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales is GRANTED. IT IS FURTHER ORDERED that, in regard to Defendant's Motion for Partial Dismissal and for Summary Judgment, Defendant's Motion for Partial Dismissal is DENIED and Defendant's Motion for Summary Judgment is STAYED pending an in camera ex parte declaration consistent herewith provided by Defendant to the Court within sixty (60) days of the date of this opinion. IT IS FURTHER ORDERED that Plaintiff's Motion for Summary Judgment Based on Evidence from Admissions is DENIED as MOOT. to read 11 Santiago Campos disqualifies himself under 28 USC � 455. Disqualification of justice, judge, or magistrate (a) Any justice, judge, or magistrate of the United States shall disqualify himself in any proceeding in which his impartiality might reasonably be questioned. ... from further participation in case CIV NO 97 0266, UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW MEXICO for basing much of MEMORANDUM OPINION AND ORDER FILED 98 APR 30 AM 11:45 on materials not contained in pleadings before the Court and vacates ORDER FILED 98 APR 30 AM 11:45. Respectfully submitted, William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 Arthur R. Morales 1024 Los Arboles NW Albuquerque, NM 87107 Pro se litigants CERTIFICATE OF SERVICE I HEREBY CERTIFY that a copy of the foregoing memorandum was mailed to Lieutenant General Kenneth A. Minihan, USAF, Director, National Security Agency, National Security Agency, 9800 Savage Road, Fort George G. Meade, MD 20755-6000 and hand delivered to Jan E Mitchell, Assistant US Attorney, 525 Silver SW, ABQ, NM 87102 this Friday May 8, 1998. 9 From ptrei at securitydynamics.com Fri May 8 12:03:43 1998 From: ptrei at securitydynamics.com (Trei, Peter) Date: Fri, 8 May 1998 12:03:43 -0700 (PDT) Subject: DoD orders vendors to use Key "Recovery" Message-ID: <6B5344C210C7D011835C0000F8012766017A75E6@exna01.securitydynamics.com> I hope someone sends them the NSA report on the security hazards of KR. Peter Trei ptrei at securitydynamics.com --------------- http://www.gcn.com/gcn/1998/May4/cov1.htm GCN May 4, 1998 Defense wants PKI now Department intends to make vendors use strong encryption By Christopher J. Dorobek To jump-start development of a public-key recovery system, the Defense Department plans to require its vendors to use strong encryption, deputy Defense secretary John Hamre said recently. Because it wields significant buying clout, Defense's more stringent requirements should boost government and industry efforts to build systems for managing encryption keys, Hamre said last month at an Armed Forces Communications and Electronics Association event in Washington. Agencies cannot wait for the government and industry to settle on a national encryption policy, Hamre said. Through successive administrations, the government has tried to develop a singular policy on encryption. But so far, the efforts have failed. Generally, industry has criticized the government's policy proposals as too restrictive. "We have an important national imperative to protect ourselves in this world," Hamre said. "We can't wait to have this issue resolved ... therefore we're going to buy encryption with key recovery." Vendors will have to use encrypted data and be able to recover it when doing business with DOD, he said. Defense will work out a final policy in the coming weeks, Hamre said. [...] From sunder at brainlink.com Fri May 8 14:07:47 1998 From: sunder at brainlink.com (Sunder) Date: Fri, 8 May 1998 14:07:47 -0700 (PDT) Subject: [Fwd: 3Com switches - undocumented access level.] Message-ID: <355372B4.C837F915@brainlink.com> -- To: BUGTRAQ at NETSPACE.ORG Subject: Re: 3Com switches - undocumented access level. From: Toh Chang Ying Date: Fri, 8 May 1998 18:42:47 +0800 Approved-By: aleph1 at NATIONWIDE.NET Organization: HICOM Teleservices Reply-To: "cytoh at plexus.net" Sender: Bugtraq List The sender was deleted to prevent flames. Don't flame me either. I'm just a poor 3Com user. -----Original Message----- From: Sent: Friday, May 08, 1998 3:32 PM Subject: Re: FW: 3Com switches - undocumented access level. Toh, Thank you for bringing this up for our attention. First of all, let me assure you that the undocumented access level for the LANplex/Corebuilder products are purely for support reasons then anything else. We have many cases where customers will forget their passwords or userids and find themselves in a spot as they could not get in to the console. This is the only way we can help them to recover from this situation without losing their entire configuration. As far as I know, many vendors also have some kind of special access methods to assist their customer under such circumstances.These special access methods are for 3 Com support persons only and are revealed to customers under very special circumstances. Because the CoreBuilders/LanPlex are typically deployed at the core of a network, the config for these equipment is typically complex and very important to the customers. As such, these method can safe the customer a lot of time and inconvenience by recovering their proper access to the equipment. If we have to set these equipment to factory default every time a customer lose his/her password, we will be in a lot of trouble. As for the stackables, I believe we do not have this access method. That's because these equipment is plug n play and do not have many parameters to reconfigure. In the event, a customer loses his/her password, we can just set everything back to factory default. Regards, ********** http://www.plexus.net/ *********** Toh Chang Ying, MCP, Network Operation Centre HICOM Teleservices Sdn Bhd (323218-A) Suite 3.5, Wisma HICOM, 2 Jln Usahawan U1/8 40150 Shah Alam, Malaysia Email: cytoh at plexus.net From jya at pipeline.com Fri May 8 16:44:57 1998 From: jya at pipeline.com (John Young) Date: Fri, 8 May 1998 16:44:57 -0700 (PDT) Subject: HPC Report Message-ID: <199805082344.TAA21658@camel7.mindspring.com> Commerce and Defense released Monday a study of high performance computers, national security and export controls which we have transcribed: http://jya.com/hpc/hpc.htm (Contents, execsumm and Chap 1) The 221-page report provides a detailed survey of HPC applications for national security work with recommendations for export controls in the light of advances in distributed and parallel applications. There's are thumbnails of 200 projects with indexes of power -- with a glance at crypto futures. For brute power the ASCI Red ++ appears to be the leader -- and off the chart of customary measurement. The full report is 1.6MB, and a zipped version is available: http://jya.com/hpc/hpc.zip (1.0MB) ----- Here's the report's press release: U. S. Department of Commerce Bureau of Export Administration May 4, 1998 Advances in Computer Technology Make Export Controls More Difficult Washington, D.C. -- Commerce Assistant Secretary Roger Majak and Dave Tarbell, director of the Defense Technology Security Administration at the Defense Department announced the release of a long-awaited study, "High-performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century," by Dr. Seymour E. Goodman, Dr. Peter Wolcott and Dr. Patrick Homer. The study has been prepared as part of President Clinton's decision in 1993 to periodically assess U.S. computer export controls. Today's study provides an important contribution to the government's understanding of technology trends in the computer industry and national security uses for high performance computers. The study finds that technology is evolving at an astounding rate in the HPC industry, rapidly increasing the performance of computers at all levels. Key findings include: 1) advancements in microprocessor performance which have brought down the costs of HPCs and reduced their size; 2) improvements in interconnect devices which have permitted a greater range of products to enter the market and helped to make high-performance power more accessible and affordable; 3) more open system architectures that contribute to enhanced calability; and 4) the ability to network the computing power of smaller systems to find solutions to large computational problems. All of these advancements create challenges for export controls on HPCs. In particular, there is growing availability of ever more powerful computers in the world marketplace. The market for HPCs is flourishing worldwide with many new and used systems for sale through mail order and third party distribution systems. The study points out that determining what computing levels can be controlled depends on factors such as dependence on vendor support, the growing diversity of computer architectures and the scalability of computer systems. An earlier study published by Dr. Goodman and his associates issued in 1995 predicted that computers with speeds of over 2,000 MTOPS would be widely vailable in commercial markets by 1997. Those predictions have proved correct. This new study will be an important reference point for the Administration's continuing review of computer controls. From toto at sk.sympatico.ca Fri May 8 17:24:23 1998 From: toto at sk.sympatico.ca (Toto) Date: Fri, 8 May 1998 17:24:23 -0700 (PDT) Subject: Dialogue - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <3553A2E3.2E06@sk.sympatico.ca> Dialogue - SPACE ALIENS HIDE MY DRUGS!!! _______________________________________ WAS: BASIC TRUTHS! Everyone Has A Photographic Memory...Some Don't Have Film: I've got film... Pretty Harry, a MarijuanIzen of Garberville, Humbolt County, California, was a man who paid close attention to the vagarities of life that comprised his MeatSpace environment. I was sitting with him in 'The Cellar', a local bar, one night, when an effeminate young gentleman from the BigCity came in, sat at a table in the middle of the bar, and ordered a drink. Every RedNeck in the bar cast derisive looks in the young gentleman's direction in order to impress upon him that they could do one-armed push-ups, were sexually excited only by women, and didn't cotton to young gentlemen with full, red lips drinking in 'their' bar, in 'their' town... Pretty Harry gave everyone time to get in a threatening scowl, or two, and then go back to minding their own business, forgetting about the effeminate young gentleman, and he then proceeded to walk over, grab the youth by the hair, tilt back his head, and proceed to give him a wet, sloppy kiss, with plenty of 'tongue'. Since Pretty Harry was an established member of the local social scene, those who observed the event merely barfed into their beers and continued whatever they were doing at the time, pretending that they hadn't really seen what they had really seen. This event confirmed what I had already suspected...Pretty Harry was a cool dude. Pretty Harry sat and talked with me for about twenty minutes, just long enough for those present to bury the memory of what had occurred, and then proceeded to walk over to the young gentleman's table and repeat the action which was so delightfully delicious to the effeminate young man from the BigCity, and so disgustingly depraved to the Local Yokels who could do one-armed push-ups, and were sexually excited only by women. This is when I realized that Pretty Harry was WayCool (TM)... My point is this... Pretty Harry, having proven his deep understanding of the Tao of Life, given his ability to throw a Serious Fuck (TM) into the normal progression of MeatSpace Reality, was astute enough to tell me, "I've noticed that when you come into the bars in town, you sit quietly in the corner, and watch what is going on around you. You know more about 'us' than 'we' do..." There's the Watchers...there's those Watching the Watchers...there's those Watching the Watchers Watching the Watchers... A Day Without Sunshine Is Like...Night: One thing that you will notice if you have the retained the ability to 'watch' what is happening around you in your MeatSpace environment, is that, no matter how comforting the platitudes and 'wise sayings' that society-at-large attempts to program into your subconsious, A Day Without Freedom Is Like...Slavery. If you do not understand what I am attempting to explain by the above, then it must be because I am a drug-dealing, terrorist pedophile. Diplomacy Is Saying "Nice Doggy!"...Until You Find A Rock: At the end of a song titled, "I've Been Up So Long, I Can't Get Down," on C.J. Parker's "Please! Stop Me Before I Sing Again" album, the extremely paraniod singer-songwriter says, "When you can't see THEM, you know THEY're being sly..." Since the confiscation of my computers, I have not seen a single, solitary police car during any of my trips to town. Today, however, after threatening the lives of every police officer upon the face of the earth during a conversation with my father over my 'telleveryonephone', I drove to town and could go nowhere without seeing armed police officers glaring at me from the safety of their officially marked vehicles. The dumb bastards haven't figured out that if they want to shut me up, they're going to have to use 'the rock'. Change Is Inevitable...Except From A Vending Machine: When Micro$not was the only game in town, calling their customer support numbers resulted only in a recorded message saying, "When is the last time a vending machine gave you back your money when you banged on it? Fuck Off!" Once Pepsi has signed an exclusive contract with your local high-school, your children will be subject to felony criminal charges if they bang on a vending machine that has stolen their money. Back Up My Hard Drive? How Do I Put It In Reverse?: "Never look back...something might be gaining on you." ~ That Nigger Who Could Strike Out Batters While Pitching From Second Base Satchel Paige! That's his name... He could strike me out in the batter's box at Yankee Stadium while pitching from second base at CommuninSki Park. I have grown used to losing the MeatSpace records of my life, loves and perceptive realities every time that I get mugged by desperate criminals or by self-righteous law enforcement agents enforcing what they imagine to be the laws that Hitler would put in place if he hadn't had to flee to the AdamAntArctic in order to have his body frozen until such time that the Nazi scientists welcomed with open arms by the CIA after World War II could perfect the CryptOgenics technologies that have their roots in the SuperMan Not Wearing Tights theologies of Nazi Germany. I don't look back... When Canadian Customs and the RCMP steal the digital record of my life, loves and perceptive realities, I look 'forward' to their funerals, in the Time-Space Continuum in which SPACE ALIENS HIDE MY DRUGS so that the murderous slaughter of everyone who has ever crossed my path can be justified as a valid Weight Loss Program which allows one to eat anything they want, as long as they burn off the calories in a murderous frenzy. I Just Got Lost In Thought...It Was Unfamiliar Territory: ...uuhhh......never mind... Seen It All, Done It All...Can't Remeber Most Of It: Space Aliens Hide My Drugs! Those Who Live By The Sword Get Shot By Those Who Don't:: Grass-roots activism and $ .50 will get you a cup of coffee in a greasy spoon. Canadians who peacefully protest against murderous dictators coming to Canada to participate in an Economic Summit will learn that "Money Rubs Pepper Spray In Your Eyes And Bullshit Rules!" [WAS: "Money Talks And Bullshit Walks!"] I Feel Like I'm Diagonally Parked In A Parallel Universe: I bet if I used a truck-bomb to destroy an enclave of grunt-workers involved in the murder of men, women and children who hold uncoventional religious views, I would be called a monster for individually emulating the actions of the collective. You Have A Right To Remain Silent! Anything You Say Will Be Misquoted, And Then Used Against You: The proper quotation of your statements will be released to the public after having been sealed under the guise of National Security for 50 years, at which time it will have little chance of counterbalancing a half a century of FUD programming the masses to believe that [Your Name Here] acted alone, using a Magic Bullet that officially refutes the laws of Newtonian Physics, but which is unlikely to result in your being awarded a Nobel Prize. Nothing Is Foolproof To A Sufficiently Talented Fool: This Basic Truth (TM) is the foundation to all amendments to the US Constitution, all interpretations of the Holy Word of [Your (G)(g)od's Name Here], decisions made by a hand-picked jury of the judge and the prosecutor's peers, and really good bar-pick-up lines delivered while rubbing one's private parts and drooling. All My Lies Are True...And Everything I Do, I Really Am: "Ask not who your country can Nuke for you...ask who you can Nuke for your country." ~ Timothy C. McKennedy, President of Samsonite Peripherals, Inc. While the Mayonnaise Mountain Man keeps himself busy attempting to limit the ultimate effect of the digital emissions he fires toward the InterNet--which ricochet into the minds of innocent bystanders--by ranting against the ludicrousness of engaging in 'Magical Thinking', some of those taking a direct hit to the head by his XXX Magnum Diatribes Against Established Lunacy manage to catch the HeavyLoad BulletIns with their teeth, and spit them out in a parallel dimension where a lighter atmosphere allows the citizens to wear lighter loafers with crystals where the pennies should be, and propel the conceptual spirit of the electronic missives of An Aider And Abettor Of A Terrorist Nuclear Strike To Be Named Later through electronic goalposts which are far-distant from MileHigh Electronic Stadium. Thus it is that Circle of Eunuchs Initiates, FrostBack Division, can use a John Candy movie to implant in the minds of the Sheeple the subliminal suggestion that they can take a personal hand in writing the history of Biosemiotic Evolution within the boundaries of the segment of the Time-Space Continuum they inhabit, and get to fuck the living shit out of Gena Davis. Thus it is that Circle of Eunuchs Initiate, Army of Dog Gorrilla, Son of MicroGomez can confidently proclaim Peter Jennings to be a Circle of Eunuchs Initiate, FrostBack Division, and not be in the least surprised when 'Epilogue 7.3 Rev. 1.7' of 'SPACE ALIENS HIDE MY DRUGS' rails mightily against the hypocritical ludicrousness of those sworn to 'Protect and Serve' the citizenry responding to the actions of a single dangerous driver by adding a dozen LEA dangerous drivers to the equation, and less than a week later Peter Jennings, made manifest as a Circle of Eunuchs Initiate by the simple act of declaring it to be so, slams an exclaimation mark down to provide an addendum to 'Epilogue 7.3 Rev. 1.7' by inserting a piece into 'Word News Tonight' which pointed out that: ~ One-third of those who die in high-speed police chases are 'innocent bystanders'. ~ 1,000 people a year die in high-speed police chases in California. ~ 5,300 people died last year in high-speed police chases in America. ~ State laws make it virtually impossible to sue LEAs in order to force them to face the consequences of their decisions and actions in the same manner that is required of other citizens in 'criminal' as well as in 'civil' court. The Truth, The Whole Truth, And Nothing But The Truth: During the WaterGate debacle, I was listening to a Saskatoon radio station on which a 'political expert' from Washington, DC, give his opinion of the moral and legal issues surrounding the affair and the role which President Nixon played in it. During the call-in question/opinion period, I phoned the radio station and proffered the opinion that, "If Nixon knew about the affair, then he is a criminal, and if he *didn't* know about the affair, then he is incompetent, given the fact that the crimes were committed by those in power as a direct result of his administrative decisions and choices." A few days later I was listening to a mainstream media news broadcast in which the news anchor announced that the 'current view' of 'Washington insiders' was that Nixon was either incompetent, or a criminal. The wording made it plain that the 'current view' of 'Washington insiders' was the direct result of an inastute political neophyte from ButtFuck, NoWhere, inadvertantly stumbling upon a Basic Truth (TM) which was relevant to the situation--namely, "The Buck Stops Here!" Not..."The Devil made me do it!" Not..."I was betrayed/tricked by those I trusted!" Not..."It was the result of the Messages From Mars that I received through the fillings in my teeth..." "The Buck Stops Here!" I knew that, you knew that, and everyone ensconced in the Halls of Power who were involved in putting a particular politically-motivated spin on the WaterGate affair knew that. Nobody holding a well-paying job, with medical and dental benefits, wanted to rock the boat and risk changing 'the way things are'. Nobody satisfied with the level of welfare benefits they were receiving wanted to rock the boat and risk changing 'the way things are'. There were few who refrained from recognizing and stating the obvious out of ignorance--most of us/them did so as a result of being 'bought off' by our current position in life nudging us toward accepting THE LIE in order not to put our established and manageable world-view at risk of tumbling down around us as the result of a violent assault by THE TRUTH. The comfort and safety of a world-view paridigm which was willing to accept mutually agreed-upon lies, in order to prevent the boat being rocked and subject to swamping, was ripped apart by the voice of a TruthMonger, Deep Throat Division, crying in the wilderness, to those who had 'ears to hear'. My sister was predestined to move to NewAge, California, take a Sufi name, purchase a mountain of crystals and become a feminist, anti-nuclear, yogurt-eating guru dedicated to the promotion of color-therapy as the answer to all of humankind's ills. The only reason that Charles Manson chose to have his followers slaughter Sharon Tate's Baby, instead of my sister, was because she was honest enough to admit, during the height of the Vietnam War Craze, that the young men of America were being sent to their deaths in order for her to enjoy the benefits of refridgeration which were denied to the peasants in Third World countries. "G.I. Joe died for Standard Oil's sins..." ~ A Communist Sympathizer To Be Named Later "The King has no clothes!" This is the message of the InterNet... "KNixon Knew!" This is the message of the InterNet... "A thousand points of light, censored by the New World Order!" This is the message of the InterNet... "If the dangerous, high-speed police chase is being video-taped from a helicopter following every move of the 'escaping' vehicle, then why is it necessary for the police cars to use flashing lights, sirens and the threat of armed violence to exacerbate and add to the bad judgments being exhibited by someone who has little or no chance of eluding "Three air-units." (Verbatim quote from 'World's Scariest Police Chases' which is sexually exciting me, even as we speak.)" This is the message of the InterNet... When is the last time the subject of government regulation came up in a business meeting and, when your opinion was solicited, you stated, "We have reached a point where it is morally acceptable to kill the bastards, but it is not yet feasible to do so."? When is the last time you passed this gem of wisdom from Vin Suprynowicz (Vin ThePolishKike to Zen Racists) along to fellow Netizens who did not hold the power to immediately affect your life for better or worse by deciding whether or not you would continue to receive a paycheck? This is the message of the InterNet... My WebSite was murdered by Sympatico without warning or explaination, as a result of Armed Thugs I had offended violating my inherent right to speak the Truth as I perceive it. My computers and those of my relatives were confiscated without any warning or explaination, as a result of Armed Thugs violating my right to speak the Truth as I perceive it. The 'Official RCMP Hate Page' now resides in a hidden file on dozens of Canadian government computers, thanks to the efforts of a CypherPunks list member who is willing to defend my right to free speech regardless of the fact that he has contracted a hit-man to murder me for forging posts to the list in his name which made him look like a fucking idiot. This is the message of the InterNet... The Truth, The Half-Truth, And Nothing Remotely Resembling The Truth: 'The Amazing Randi' (?) is a magician who has gone to great effort to expose Uri Geller and debunk his claims of using psychic powers to accomplish what magicians can replicate through sleight-of-hand. Did 'The Babe' *call* his legendary home-run shot by pointing to the location he was planning to bury it, or was it a 'lucky' stretch of his muscles before stepping into the batter's box? I would be the first to admit that a strong case could be made for viewing the 'hard evidence' I point to as proof of the validity of my rambling, insane conspiracy theories, as being the result of the selective presentation of Reality-Bytes filtered through sieves designed to present 'chaff' as a real substance not dependent on the existence of an imaginary 'wheat' substance whose existence is promoted by underground Reptilian Nazis hell-bent on world domination. I would also be the first to admit that 'coincidence' could account for Peter Jennings seemingly fullfilling in MeatSpace his Virtually-Assigned role as a Circle of Eunuchs Initiate member by providing the hard facts and figures substantiating the views espoused by 'Epilogue 7.3 Rev. 1.7' of 'SPACE ALIENS HIDE MY DRUGS!!!' Not to mention the fact that 'coincidence' could explain the fact that a single reference to 'Thelma & Louise' at the end of the same Epilogue was followed by references to the movie in dozens of disparate TV shows over the next few days (including an episode of '48 Hours' which showed excerpts from 'Thelma & Louise" as I was typing this very paragraph...). The fact of the matter is, however, that a lifetime of separating 'coincidence' from 'synchronicity'--through a process of objective evaluation of mathematical probability--has led me to believe that this: |<----------->| : is 8", in a parallel universe within which women have not yet been given the right to vote. Likewise, it is ludicrous to live in a universe in which it is a recognized scientific fact that the emissions of a cellular phone can affect a radio telescope a hundred kilometers distant, while disallowing the possibility that the emissions of a human mind, heart or spirit can register on a similarly designed biotechnological receptor in local or global proximity to the source of the emissions. It is equally ludicrous to fail to recognize that physically manifested and disseminated symbols representing the results of human thoughts, emotions and concepts will have an effect that is every bit as observable and predictable as laws of physics concerning inertia, impetus, velocity, acceleration and direction, etc. If a decade of scientific investigation into the mechanisms by which pigeons find their way home proves to be inconclusive, the pigeons will still manage to find their way home. If humans find themselves incapable of returning to the place they were born without having a birth-certificate and a roadmap, salmon are unlikely to abandon their natural ability to do so by virtue of a process which could be viewed as 'Magical Thinking' by those incapable of reducing the process to a solveable MeatSpace equation. NewAge 'Magical Thinking' is nothing more nor less than an esoteric extension of 'The Power of Positive Thinking' paridigm which is the foundation of all subsequent self-help, goal-oriented individual accomplishment and corporate management systems which recognize that an inspirational thought that results in a single step toward Mecca is more effective than a thousand corporate meetings discussing the feasibility or futility of putting a journey to Mecca on the agenda of the next shareholder's meeting. How To Get Even Without Breaking The Law / Sweet Revenge: I have been fucked a thousand times by the arbitrary, capricious decisions and actions of a variety of officially recognized Authoritarian Sivil Servants who didn't like my looks, my attitude, or my breath. I have also avoided being fucked several thousand times by 'shaping' my answers to their questions in a manner designed to misdirect their peckers as they tried to stick them in my butt. When the Canadian Customs & Immigration shit hit the fan, and I was forced to appear before an official Board of Inquiry convened to decide whether or not I could be denied entry into the country of my youth, I found myself forced to abandon all logic and reason, and trust in th Tao to protect me as I resorted to telling the Truth (TM). In the face of damning evidence of my slick, conniving manipulation of rules, regulations and laws through the use of Damnable Lies!!!, I explained my theory of Variable Speed Truth (TM) to the Board of Inquiry (although I attributed it to Albert Einstein, in order to give it more credibility). I explained that, as a Border Child, I had grown up in an environment which enabled me to understand that 'Rules Is Rules...' is an extremely flexible maxim which can be interpreted by an individual Canadian Customs & Immigration OffalSir to mean that, even though you have been dating his daughter for several years and have been invited over to dinner numerous times, that he can legally deny you entry into the country and make you drive fifty miles to enter through another Customs Port if you fail to have three hundred and forty-two pieces of picture ID, particularly if you kept his daughter out past curfew the previous weekend. I also explained a variety of situations in which I had crossed the US/Canadian border more than once on the same day, and claimed residence in different countries, because I knew what each border guard wanted to hear in order to make my passage proceed more smoothly, as opposed to making my life a living hell for no apparent reason other than their own misunderstanding of the laws of the country. Although I would be the last to downplay the successful result of my appeal as being partly the result of the members of the Board of Inquiry being decent people who had retained a small part of their soul while serving the Great Beast, I fully recognize that the outcome might have been completely different if I had failed to properly play my part in the Grand Play by hanging my head in shame as my extremely expensive legal counsel pointed out to the Board of Inquiry what a sorry, pathetic loser I was, and how the only real options in this case would be to forgive my trespasses, or take me to the pound and have me put down like the poor, sick, mangy dog that I am. My point is that, regardless of the letter or spirit of the existing laws, it is up to each individual to interpret them in a manner consistent with their own best judgement, and to live with the consequences of what they truly believe to be 'right action', no matter what judgements or punishments may result from people with larger weaponry taking the opposite view. Of course, I would be foolish to pass judgement upon those who recognize the wisdom in grovelling, snivelling, and hanging one's head in shame, if it appears to be the path that will allow one to live to fight again another day...kind of like faking a limp on the way back to the huddle, in order to break for the Big Score. An Exercise For The Reader: I can no longer remember just where this rambling, semi-coherent missive was evenutally designed to end up, but I think it has something to do with the fact that my unsubtly veiled threats against those with False Smiles (TM) has resulted in the glue-sniffing progeny of A Wagon-Burner Named Earlier having had the flimsyl, fabricated assault on his Charter Rights abandoned by the dropping of all trumped-up charges against him. However, this has come at the expense of my being called down to local Gestapo Headquarters to receive paperwork indicating that I can expect to go to eventually go to prison for at least four years as a result of Baby's transgression of the 'Dog At Large' bylaws of the Town of Bienfait, Saskatchewan. Silly me...my drunken, drug-induced paranoia would have me believe that much of my current troubles stem from the fact that I am in the midst of preparing a legal defense for a Wagon-Burner whose continuing persecution by Dudley DoWrong and John Law was one of the subjects addressed in "The Official RCMP Hate Page" chapter of 'SPACE ALIENS HIDE MY DRUGS!!!', and who is being persecuted by the same Queen's Court Bench prosecutor whose ass I used to wipe the floors of the Halls of InJustice and then bragged about it to (G)(g)od And Everybody in a public forum on the InterNet. Anyway, figure out just what point I am trying to make here, consider it made, and hit the key at your own convenience... From nobody at REPLAY.COM Fri May 8 17:57:34 1998 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 8 May 1998 17:57:34 -0700 (PDT) Subject: Dialogue ------ Space Aliens Hide My Drugs! Message-ID: <199805090057.CAA15826@basement.replay.com> ROTFLMAO! "Ask not who your country can Nuke for you...ask who you can Nuke for your country." ~ Timothy C. McKennedy, President of Samsonite Peripherals, Inc. From toto at sk.sympatico.ca Fri May 8 18:45:17 1998 From: toto at sk.sympatico.ca (Toto) Date: Fri, 8 May 1998 18:45:17 -0700 (PDT) Subject: I Can't Help Myself... Message-ID: <3553ADE2.66AB@sk.sympatico.ca> !OB Crypto: I crossed the US border today to make a beer run, and a US Customs officer who has known me for decades took the time and trouble to 'roust' me, as per the instructions of his superiors. The last words out of his mouth were a question to which he has long known the answer: "Where were you born?" I was born in Liberal, Kansas. Could it possibly be that this fairly decent individual, who has never done me serious dirt, even when it would have resulted in career advancement, is a Secret SypherPunk delivering a cryptic message that could be translated as, "Toto...I don't think you're in Kansas, anymore."? DrunkOnCheapAmericanBeerMindsWantToKnowMonger From toto at sk.sympatico.ca Fri May 8 18:45:21 1998 From: toto at sk.sympatico.ca (Toto) Date: Fri, 8 May 1998 18:45:21 -0700 (PDT) Subject: Refutation of 'Magical Thinking' Message-ID: <3553B268.77FA@sk.sympatico.ca> I decided to do an objective experiment to prove or disprove the validity of 'Magical Thinking'. I shut my eyes and concentrated on psychically willing my TV to provide me with an indisputably meaningful message relevant to my life. I turned on the TV, to a random channel, just in time to see/hear Dorothy and the ScareCrow singing, "If I Only Had A Brain." Conclusion: Magical Thinking is BullShit! From alan at clueserver.org Fri May 8 20:55:42 1998 From: alan at clueserver.org (Alan Olsen) Date: Fri, 8 May 1998 20:55:42 -0700 (PDT) Subject: DoD orders vendors to use Key "Recovery" In-Reply-To: <6B5344C210C7D011835C0000F8012766017A75E6@exna01.securitydynamics.com> Message-ID: <3.0.5.32.19980508204952.040f2d70@clueserver.org> At 03:05 PM 5/8/98 -0400, Trei, Peter wrote: > > >I hope someone sends them the NSA report on the security hazards of >KR. I think that people should sell the Government crypto software with key recovery. We need to have a backdoor into the government's communications. Any key recovery system sold to the governemtn should have a real obvious and visible key recovery system so they know that it is there. > >Peter Trei >ptrei at securitydynamics.com > >--------------- >http://www.gcn.com/gcn/1998/May4/cov1.htm > >GCN May 4, 1998 > >Defense wants PKI now >Department intends to make vendors use strong encryption >By Christopher J. Dorobek > >To jump-start development of a public-key recovery system, the Defense >Department plans to require its vendors to use strong encryption, >deputy Defense secretary John Hamre said recently. > >Because it wields significant buying clout, Defense's more stringent >requirements should boost government and industry efforts to build >systems for managing encryption keys, Hamre said last month at an >Armed Forces Communications and Electronics Association event in >Washington. > >Agencies cannot wait for the government and industry to settle on a >national encryption policy, Hamre said. > >Through successive administrations, the government has tried to >develop a singular policy on encryption. But so far, the efforts have >failed. Generally, industry has criticized the government's policy >proposals as too restrictive. > >"We have an important national imperative to protect ourselves in this >world," Hamre said. "We can't wait to have this issue resolved ... >therefore we're going to buy encryption with key recovery." > >Vendors will have to use encrypted data and be able to recover it when >doing business with DOD, he said. > >Defense will work out a final policy in the coming weeks, Hamre said. > >[...] > --- | "That'll make it hot for them!" - Guy Grand | |"The moral PGP Diffie taught Zimmermann unites all| Disclaimer: | | mankind free in one-key-steganography-privacy!" | Ignore the man | |`finger -l alano at teleport.com` for PGP 2.6.2 key | behind the keyboard.| | http://www.ctrl-alt-del.com/~alan/ |alan at ctrl-alt-del.com| From postmaster at mail.opentown.com Fri May 8 21:28:50 1998 From: postmaster at mail.opentown.com (postmaster at mail.opentown.com) Date: Fri, 8 May 1998 21:28:50 -0700 (PDT) Subject: Opentown proudly announces 50,000 membership Anniversary Giveaway Festival Message-ID: <199805090428.VAA24848@toad.com> 50000ȸ�� ���ı�� ���� ������! http://www.opentown.com ����Ÿ���� �������� ����� ���Ծ� 5������ ȸ���� ������ġ�Ͽ����ϴ�. ���� �������� ������ �������� Ǫ���� ��ǰ�� �Բ� 3���� ū��縦 �����Ͽ����ϴ �. ���Ⱓ : 98.5.7 ~ 6.5 (30�ϰ�) �� ��� 1. ���� ����� ���� ������ ���迡�� �Ѱ����� Ư���� ���Ըӽ��� ���ø� 30�ϰ� ������ ����� �ְ� ������ ���� ���� 1,000ï¿½í¿¡ï¿½ï¿½ ������ī�޶�, PCS�޴���, MGM�������� ī����Ĩ ï¿½ï¿½ï¿½ï¿½í¸®, ����Ÿ�� ī���� ����, ��Ÿ ������ ��ǰ���� ����� ���� �մϴ�. �� ��� 2. �ִ� ȸ������ ��õ�� ���� ������ ���Ⱓ ���� �ű� ȸ���� �ִٷ� ���� ���� ��Ų ȸ�� 5ï¿½í¿¡ï¿½ï¿½ ���� PCS�޴��� 1�뾿�� ���� �մϴ�. �� ��� 3. �� 5,000��° �ű԰��� ȸ�� ��� ������ �ű� ���� �Ͻ� ȸ���� �� 5,000��° ȸ�� ���Դ� ���� PCS�޴��� 1�뾿�� �����մϴ�. �������� ���Ҿ� ī������ӵ� ����� ��⼼��. �귿, ��ο���ī, ï¿½í·¢ï¿½ï¿½, ��ī��, ���Ըӽ�, ï¿½í½ºï¿½ï¿½ï¿½ï¿½ï¿½ï¿½ï¿½ �����߿� ������ �����۰� ���Ҿ� ï¿½ï¿½ï¿½ï¿½ï¿½ï¿½ï¿½í¶¯, ��, ī�������ī, Ȧ����ī�� �߰��� ���ñ½ºµË´Ï´ �. ����Ÿ��� ��Ư�� �ڹ�ä�õ� �غ�Ǿ� �ֽ��ϴ�. ���ٸ� ��� ���̸� ����������. Good Luck! From paulmerrill at acm.org Fri May 8 21:30:24 1998 From: paulmerrill at acm.org (Paul H. Merrill) Date: Fri, 8 May 1998 21:30:24 -0700 (PDT) Subject: Dialogue - SPACE ALIENS HIDE MY DRUGS!!! In-Reply-To: <3553A2E3.2E06@sk.sympatico.ca> Message-ID: <3554061D.E500FC22@acm.org> Would have been ROFLMAO if it weren't so true. Toto wrote: >You Have A Right To Remain Silent! Anything You Say Will Be Misquoted, >And Then Used Against You: From president at whitehouse.gov Sat May 9 06:48:25 1998 From: president at whitehouse.gov (Spam the President) Date: Sat, 9 May 1998 06:48:25 -0700 (PDT) Subject: U.S. Navy caught hacking into British marine charity Web site Message-ID: <355450B4.28BA4217@whitehouse.gov> http://www.infoworld.com/cgi-bin/displayStory.pl?98058.winavy.htm U.S. Navy caught hacking into British marine charity Web site By Kristi Essick InfoWorld Electric Posted at 3:07 PM PT, May 8, 1998 The U.S. Navy has been caught attempting to break in to secure areas of a World Wide Web site sponsored by a U.K. marine-mammal preservation charity, according to officials at the organization. The Whale and Dolphin Conservation Society (WDCS) -- which operates an online shopping site aimed at generating money for the welfare of the animals at http://www.wdcs-shop.com -- said it was alerted to the attempted break-in last week by its site-hosting company, Merchant Technology Ltd. "We were working late one night, and a command line request came in wanting to access unauthorized areas of the site," said Andy Fisher, marketing manager for Merchant. "We were amazed to find out it was the Pentagon." Merchant built and manages the secure electronic-commerce site for the conservation society and routinely keeps an eye on who visits. If users attempt to gain access to unauthorized areas, the company is alerted to the source of the incoming request. At 9:45 p.m. GMT on April 28, Fisher said, workers at Merchant were shocked to see an incoming attempt to breach security by a user identified as donhqns1.hq.navy.mil. Merchant got in touch with WDCS immediately, only to find out that the charity had been contacted by the Navy a few weeks earlier. The Navy was interested in obtaining a report the group is working on that details the efforts of Russian animal experts to train dolphins in the Black Sea for military tasks, such as finding and attaching probes to submarines, Fisher said. A WDCS representative said that there is nothing secret about the Russian government's activities in this area but that the document does contain information about the export of the trained dolphins to foreign countries. The group declined to give the Navy a copy of the report only because it was not complete at the time. Once it is made final, the report will be published and the Navy can then examine it, the representative said. The WCDS said that it is confused about why the Navy would attempt to break in to its Web site. "I think whoever it was within the U.S. Navy facility would have better things to do rather than try and hack into our computers," said Chris Stroud, the organization's director of campaigns, in a statement. "If they were seeking reports on the Black Sea, we shall be freely publishing these in the near future anyway." The WCDS previously has commented unfavorably on Navy activities such as its low-frequency sonar trials off Hawaii and on ship collisions with endangered whales, the group said. Merchant says it is "100 percent sure" the hacking attempt originated from the Navy. WDCS has notified the U.S. Embassy in London and the relevant U.K. authorities, the organization said. "We hope that the U.S. authorities have some rational explanation for this incident," Stroud said. "The Navy has not yet received a formal complaint on the issue," said a Navy official, who declined to be named. "Until the Navy receives a formal complaint with details, there's not much we can do to proceed further." Merchant Technology Ltd., in Bath, England, can be reached at 44 (1225) 481 015. The Whale and Dolphin Conservation Society, also in Bath, can be reached at 44 (1225) 334 511 or http://www.wdcs.org. Kristi Essick is a London correspondent for the IDG News Service, an InfoWorld affiliate. From rah at shipwright.com Sat May 9 07:25:08 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sat, 9 May 1998 07:25:08 -0700 (PDT) Subject: db$: Digital Bearer Settlement Conference Status Report Message-ID: I suppose all of you have figured out by now what we're not doing a Digital Bearer Settlement Business Development Conference at Bretton Woods this August. :-). I was willing to give it a shot, even with the admittedly high cost in hotel rooms, if I could get presenters on the topics I wanted. If I got the presenters, I could use the content to leverage the keynote speakers, and, with those, I think I would have gotten the attendance. Unfortunately, I couldn't find anyone, with exactly two exceptions, who both knew enough on the topics I was soliciting and who had the time to come to Bretton Woods. In the process of figuring out all that out, however, something entirely different presented itself, and thinking about *that* gave me another set of conference ideas, which I want to bounce off you guys in just a bit. I suppose don't really give up on ideas once I get them, though they may get pushed down on the stack for a while. It's that Frisian expression of the berserker gene thing, I guess... :-). So, I was figuring out how I could sweeten the pot for presenters for the Bretton Woods thing, when I bumped into the editor of a well-known book :-). This got me to thinking about a book on digital bearer settlement, containing the contents of this summer's proposed conference, written in chapters by the presenters of the conference. I talked to the editor about this, and she said that she didn't like books written by a cast of thousands, and since we were talking about new technology with no user base and she was a technical and professional books editor, she was going to have a hard time selling something like this to her market. However, if a single person wanted write a book on digital bearer settlement, it seemed like there might be more room to bash it into something her audience might want to read. Since *I* didn't want to write a book, really, we sort of left it at that. About a week or two later, Pete Loshin, who now works as an editor for Cutter Publications, invited me to come and stir things up at their "Summit" conference, and sit on an internet commerce panel, which I've already told you the story about. While there, however, I talked to several authors of books, and one of them, a pretty well-respected author of hard-core IT computer books, told me that my whole geodesic society / digital bearer settlement thing was something actually new to him, and that he so rarely heard something new in his business. So, he encouraged me to get started on a "trade" book, one for the general public, and spent about an hour telling me how to get started. So, when I got home, all excited, and I started bashing away on the popular book I've been threatening to write for years on all this stuff. Unlike a technical and professional book, the typical first author doesn't get advances for this kind of thing, so you have to write the whole thing in advance and see what happens. So, we'll see what happens. And then, something wierd happened. Kieth Dawson's TBTF newsletter did a bit on me, Philodox, the dbs list and the conference, and, out of that, I got email from *another* well-known editor asking me if I knew anyone who wanted to do a book on micropayments or something. So, I got this guy on the phone, cranked up the reality distortion field to 13 (monkeys flying), and pitched him on a book on digital bearer settlement, using the content request from the Bretton Woods conference call for presenters as a jumping off point. He then asked me if I could do something a little more polemical :-), and I sent that version off, but I think I scared him away. :-). I haven't heard back from him, and I suppose he lost interest. However, Tuesday, I met up with the original famous-book editor, the one I was trying to pitch the conference book to, and told her what I had done with the *other* editor on a digital bearer settlement book, and she wanted to see it. She liked the first, unpolemic, version best, :-), and we're still talking, which is a good sign. So, all of this got me to thinking about how I want to proceed with my proposed conference schedule. I still want to do a conference this summer. Some kind of "gathering of the clan" thing on the same order as the mac-crypto conferences Vinnie and I do, but, of course, I have to make money on it. Essentially, I'd put out an open call for papers/presenters, bunch them together on the schedule together roughly by content, and call it a program, just like I do for mac-crypto. I wouldn't be reimbursing speakers or anything. People who speak pay to see the rest of the conference, in essence, just like they do at FCxx After that, I'd start working on putting together a peer-reviewed conference, hopefully in New York, but maybe Washington, where I'd had a tentative offer. The problem with the Washington offer is that it's at a university and I have to make money on this. I'm not a sinecured academic ;-), or even someone who has a day job. :-). That was the problem with IFCA's takover of FCxx, the upside kind of went away for me. Oh, well, at least I get credit for the idea. And three more trips to wherever the conference goes as a member of IFCA's board. Anyway, this doing conferences for profit is also why I can't use a university location in the Boston area for this digital bearer settlement developer's conference as well. Finally, I'd still like to go to Bretton Woods again, but *next* summer, and with a Workshop, with paid *paid* presenters, which is what this summer's business development conference should have been all along. Maybe, if I'm lucky, and the digital bearer settlement book's out, it'll be the text book for this thing, or something. So, let's look at this "gathering of the clan" idea first. Because of all the problems people had with the prices at Bretton Woods, I started thinking of all kinds of ways to do it on the cheap. Stuff like renting the Sons of Italy Hall here in Roslindale, my Boston neighborhood. Which is not as dumb to do as it was, say, two years ago. The crime rate in Boston, especially Roslindale/Hyde Park, which is now the mayor's neighborhood, has fallen rediculously lately, and Roslindale's undergoing a boomlet of sorts, with lots of new businesses, including a couple of proto-bohemian cafes, a new grocery store, stuff like that. The neighborhood is scruffy and full of new immigrants and said freshly-installed bohemians, and a digital bearer settlement conference here would feel about the same in terms of culture-clash as FC98 was on Anguilla, which would be kind of cool. I think I could get a couple of phone lines in to the hall, and, if I dropped a couple of routers and 56k modems on them, I could get better bandwidth than we had in Anguilla, even. ;-). Of course, Roslindale in mid-July or early August is not quite Anguilla in February, but, I still think it would have the same foriegn-place *extremely* casual atmosphere. No beach, much less total eclipse off the Montserrat Volcano, of course, but, well, you get the point: "Hackers invade Roslindale. Film at 11." The local business development association would probably love me for it, probably as much as the Anguillans love Vince for FCxx, which, of course, would have its attractions for me as a local resident. However, I still haven't talked to the manager of the hall, and I'm not sure the place has air-conditioning (it has to, right?), much less telephone lines, much less touchtone lines. Seriously. Not to mention that I'd be hanging myself out to dry on deposits, and stuff, if nobody showed up. Much less that I'd have to collect checks from people up front before I could even make reservations for all this stuff. Having a credit card merchant account would be nice, but it's still impossible at the moment. Thinking about this very problem, I sent feelers out at this month's DCSB meeting for the use of a company's net-wired auditorium-seating conference room instead, to see if I could get it by way of sponsorship of the conference. This would also reduce costs a bunch, but I haven't heard from anyone on this, so it's probably a long shot at this point. But, then, after DCSB that day, I was talking to the catering manager at the Harvard Club, and, just as a kind of pro-forma thing, I asked him for a small 2-day conference estimate for, say, 30-35 people. Because of all the business I bring him with DCSB, he quoted me something which was rediculously low in terms of my own financial exposure if things went south. It's not like the Club is busy in the summer, when all the bankers and lawyers go off to places like the Cape and the Vinyard anyway, so he sees me as a safe way to get some new business in the door. And, since the Club function rooms aren't booked up this time of the year, I could cancel anytime up to a week in advance of the date if my attendance wasn't enough, because I'd be bringing him "found money" anyway. So, for about half the price of attending any business conference in a downtown conference hotel, we could have something really nice in the Harvard Club, 38 stories up, with harbor views, decent food, and comfortable surroundings to schmooze in. There's the complication of the jacket requirement, but, if we started on Thursday, Friday's a "business casual" day, so we'd have only one day of dress code to contend with. In addition, I think dbs and dcsb folks, as more business and finance oriented types, are more inclined deal to a single "dress-up" day than just plain crypto folks, so I think this could wash. The price for a Harvard Club version of, what?, "Digital Bearer Settlement Developer's Conference", "Symposium?", whatever, including Net access like we had at FC98, and A/V, and maybe video/audio taping or even netcasting, if I can get the rights hocked off for a percentage or something, would be on the order of $400 per person, including breakfast, lunch, and a cocktail party the first night, and of course, paying me. :-). Getting lodging would be up to you, but at least you're not locked into a $400/night room like we were at Bretton Woods. I would bet most folks could find friends to crash with, if it came to that. I haven't priced the "Hackers Invade Roslindale" option, but I'd be happy to do that instead if there's real interest in it. I'd just need to collect money from people almost immediately to get started. Frankly, I like either option. They both sound cool. I'm thinking about July 23-24 at the moment. In the same spirit of "first-ever, last-minute" that we did mac-crypto in, of course. So, folks, what do we want to do? Contact me directly if you have questions on what particulars there are at the moment, or, especially, if you want to speak at this thing. If there's interest coalescing around one idea or another, I'll put out a "formal" call for presenters pretty soon. Also, if you want to chat publically about this conference or digital bearer settlement in general, I figure the dbs at philodox.com list is the best place to do this. It keeps the cross-posting and off-topic stuff on other lists to a minimum. Here's the URL to subscribe: Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From frantz at netcom.com Sat May 9 09:46:05 1998 From: frantz at netcom.com (Bill Frantz) Date: Sat, 9 May 1998 09:46:05 -0700 (PDT) Subject: U.S. Navy caught hacking into British marine charity Web site In-Reply-To: <355450B4.28BA4217@whitehouse.gov> Message-ID: At 4:48 AM -0800 5/9/98, Spam the President wrote: >http://www.infoworld.com/cgi-bin/displayStory.pl?98058.winavy.htm > > U.S. Navy caught hacking > into British marine > charity Web site > > By Kristi Essick > InfoWorld Electric > > Posted at 3:07 PM PT, May 8, 1998 > ... > > "I think whoever it was within the U.S. Navy > facility would have better things to do rather than > try and hack into our computers," said Chris > Stroud, the organization's director of campaigns, > in a statement. "If they were seeking reports on > the Black Sea, we shall be freely publishing these > in the near future anyway." Consider the possibility that someone hacked into the Navy's computer and then used it as a base to hack the Marine Mammal Charity site. ------------------------------------------------------------------------- Bill Frantz | If hate must be my prison | Periwinkle -- Consulting (408)356-8506 | lock, then love must be | 16345 Englewood Ave. frantz at netcom.com | the key. - Phil Ochs | Los Gatos, CA 95032, USA From frantz at netcom.com Sat May 9 09:47:45 1998 From: frantz at netcom.com (Bill Frantz) Date: Sat, 9 May 1998 09:47:45 -0700 (PDT) Subject: HPC Report In-Reply-To: <199805082344.TAA21658@camel7.mindspring.com> Message-ID: If the export control people are worried about people designing nuclear weapons, it should be noted that the US managed to design weapons with computers like the CDC 6600 and 7600 that make today's PCs look fast. Today's PCs have more memory and bigger, faster disks too. ------------------------------------------------------------------------- Bill Frantz | If hate must be my prison | Periwinkle -- Consulting (408)356-8506 | lock, then love must be | 16345 Englewood Ave. frantz at netcom.com | the key. - Phil Ochs | Los Gatos, CA 95032, USA From jya at pipeline.com Sat May 9 11:31:12 1998 From: jya at pipeline.com (John Young) Date: Sat, 9 May 1998 11:31:12 -0700 (PDT) Subject: 1997 Wiretap Report Message-ID: <199805091831.OAA29612@camel14.mindspring.com> The US Courts 1997 Wiretap Report is out: http://jya.com/wiretap97.htm Total: 1,094, up 59 from 1996; 206 "electronic." 374 taps in this nabe; dozens in this bldg, six in this flat, a couple on this box, one under lip counting morse teethgrinds. From froomkin at law.miami.edu Sat May 9 11:42:01 1998 From: froomkin at law.miami.edu (Michael Froomkin - U.Miami School of Law) Date: Sat, 9 May 1998 11:42:01 -0700 (PDT) Subject: FILED 98 MAY - 8 AM 11:31 In-Reply-To: <3553504B.6AA9@nmol.com> Message-ID: :: Anon-To: cypherpunks at cyberpass.net This spam-proofed message was sent by Michael Froomkin. To reply privately, send mail to my surname at law.tm [cc's trimmed!] Lest anyone be mislead, this filing is garbage. I find particularly ridiculous the idea that a court can only cite cases submitted by the parties. On the contrary, the court's duty is to cite the law correctly, and thus to ignore anything inaccurate or irrelevant submitted by the parties and to supplement where and when needed. Nowhere is this duty clearer when, as here, one side is not represented by counsel; as it happens, the court exercises this duty to supplement _to help_ the pro se plaintiff, not hurt it. I have not followed the pleadings very carefully in this case, so I won't express a view on the merits except to say that having attempted to read plaintiffs' submissions I was not able to figure out much about what merit their case was supposed to have. Were I to be asked by a pro se plaintiff how to best present their case in federal court, I would say: don't try to write legalistically. Use the case caption at the top of the first page, as provided by the rules of court, then identify who you are, and who you are suing in the first paragraphs, then tell your story in plain and simple English with as few legalisms as possible. If you have a particular statute or statutes in mind that you think were violated, do specify them, but also ask for whatever other relief the court may find just or equitable so as to preserve all your options. Legalistic mumbo-jumbo is NOT required, and only gets in the way of telling your story. Attacking the court is stupid, both because it usually isn't justified and because it never achieves anything. A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) Associate Professor of Law | U. Miami School of Law | P.O. Box 248087 | Coral Gables, FL 33124 USA | It's @#$#@ hot here. From jajom at lava.net Sat May 9 11:58:21 1998 From: jajom at lava.net (Jim McQueeney) Date: Sat, 9 May 1998 11:58:21 -0700 (PDT) Subject: 1997 Wiretap Report In-Reply-To: <199805091831.OAA29612@camel14.mindspring.com> Message-ID: <3554A738.F7C3B5A2@lava.net> John Young wrote: > > The US Courts 1997 Wiretap Report is out: > > http://jya.com/wiretap97.htm > > Total: 1,094, up 59 from 1996; 206 "electronic." > > 374 taps in this nabe; dozens in this bldg, six in > this flat, a couple on this box, one under lip > counting morse teethgrinds. > Those reported are *only* the aauthorized wiretaps; I wonder, how many unauthorized wiretaps were made? I guess we'll never know... -- Jim McQueeney ICQ: http://wwp.mirabilis.com/719836 *************** PGP Keys on public key servers: *************** RSA 1024/0x45A3FB5D FP/9AEF4C97 E35437D6 434CF20C 6D4D075E ******* D/H 1024/0xA82248FD FP/F77BC061 45BF05EF FFB7AC2B C7F07C21 A82248FD From diane at extractorpro.net Sat May 9 12:24:11 1998 From: diane at extractorpro.net (diane at extractorpro.net) Date: Sat, 9 May 1998 12:24:11 -0700 (PDT) Subject: What Bill Gates doesn't want you to know. Message-ID: <199805092253.SAA22521@sour.extractorpro.net> Microsoft is on to something that may in fact smash their competition with hours! Bill Gates and his team of marketing VPs have finally found the net's biggest secret. The one that Web Masters and Small Businesses have been using to get the lion's share of business out there. You see, they all have found a way to reach more people than even all of Microsoft employs with the press of one button-- and at a cost that is less than you will probably spend on internet access this year. Its called Direct Email and its already in the works with companies like Microsoft. Bill Gates' dream is already here with a secret piece of software called "Extractor Pro". Extractor Pro already does what Bill Gates is waiting to do! Armed with Extractor Pro, a pentium computer, and a 28.8 modem you can be sending more messages in the time that it takes to change the oil in your car, than the entire NewYork post office can send in one day.. Thousands of simple Email messages like this could be your ticket to the moon. If you want to be one up on Bill Gates and his team of marketing VPs, call us or visit: http://www.extractorpro.net/~diane/ We'll throw you the keys to Extractor Pro and let you take it for a test drive. After you've gone around the block a few times and decided Extractor Pro can do for you what Bill Gates' latest plan can do for Microsoft-- call us and we can unlock your Extractor Pro right over the net. Thank you for your time. Extractor Marketing 1-734-728-5210 ********************************************************************* * The mailing list for this message has been pre-processed by an * * independent service to remove the addresses of those who are * * not interested in unsolicited email. Free registration for this * * removal service is at http://www.extractorpro.net * * * ********************************************************************* From mgraffam at mhv.net Sat May 9 13:15:12 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Sat, 9 May 1998 13:15:12 -0700 (PDT) Subject: corvette.bxa.doc.gov followup Message-ID: -----BEGIN PGP SIGNED MESSAGE----- This message describes a computer on the Internet, one corvette.bxa.doc.gov (192.239.70.124) (hereafter corvette). This computer is owned by the Bureau of Export Administration (hereafter BXA), which itself is a branch of the Dept. of Commerce. Here I am exploring the idea that corvette runs a bot that scans the internet for materials regarding crypto export violation, and I will raise a few questions in regards to this. - From the BXA web page (www.bxa.doc.gov): The Bureau of Export Administration enhances the nation's security and its economic prosperity by controlling exports for national security, foreign policy, and short supply reasons. We administer the Export Administration Act by developing export control policies, issuing export licenses, and prosecuting violators. Additionally, BXA enforces the EAA's antiboycott provisions. A traceroute (timings excluded) from my computer system (a SLIP/PPP dialup to MhvNet, located in Poughkeepsie NY) to corvette yields: 1 annex1 (199.0.0.10) 2 router.mhv.net (199.0.0.1) 3 sl-gw8-pen-3-4-T1.sprintlink.net (144.228.160.41) 4 sl-bb1-pen-9-0-0.sprintlink.net (144.228.60.11) 5 144.228.180.10 (144.228.180.10) 6 nyc4-br2.bbnplanet.net (4.0.2.178) 7 nyc4-nbr2.bbnplanet.net (4.0.5.29) 8 vienna1-nbr2.bbnplanet.net (4.0.3.129) 9 vienna1-nbr3.bbnplanet.net (4.0.5.46) 10 washdc1-br1.bbnplanet.net (4.0.1.89) 11 washdc1-cr1.bbnplanet.net (4.0.1.174) 12 docosesa.bbnplanet.net (192.221.253.3) 13 corvette.bxa.doc.gov (192.239.70.124) It is especially useful to notice hops 10 and 11. The names of these two hosts seem to indicate that the hops have tended towards Washington DC. BBNPlanet is located in Washington, so it is probable that corvette is too (though this is not necessarily true). On April 22nd 1998, an anonymous connection was made from corvette to my personal computer, ismene. This connection is only possible through my main web page which is located on spice.mhv.net, which then links to my computer. This mechanism is needed because ismene gets a dynamic IP. Spice's logs show: corvette.bxa.doc.gov - - [22/Apr/1998:14:05:49 -0400] "GET /~mgraffam HTTP/1.0" 302 - corvette.bxa.doc.gov - - [22/Apr/1998:14:05:50 -0400] "GET /~mgraffam/ HTTP/1.0" 200 2019 corvette.bxa.doc.gov - - [22/Apr/1998:14:06:16 -0400] "GET /~mgraffam/misc/access.html HTTP/1.0" 200 629 The connector from corvette directly targeted my homepage, and then immediately went to the page that accesses ismene. The connector bypassed a page about crypto titled "Cryptotechnic Enlightenment". It is, perhaps, this odd combination of words that escaped a bot's notice, but would have surely been noticed by human. Instead the alleged bot picked up on "access.html" and left links to my RSA and PGP public keys untouched. If corvette is running a bot, it seems probable that they would ignore PGP keys because they surely generate a large amount of noise when exploring things of a cryptographic nature. This may account for the behavior. The access.html on spice has links to my computer. HTTP, FTP and telnet links are established, and direct links are made to copies of my public keys. The first three links to my keys via FTP are bypassed, and a connection is made via HTTP to my computer (ismene). The portions from ismene's httpd log follow: corvette.bxa.doc.gov - - [22/Apr/1998:13:58:51 -0400] "GET / HTTP/1.0" 200 1858 corvette.bxa.doc.gov - - [22/Apr/1998:13:59:48 -0400] "GET /crypto_index.zip HTTP/1.0" 200 19570 Corvette picks up the crypto_index.zip file, and leaves links titled "Index of unfinished works" and "Misc. projects". That corvette picked up the crypto_index.zip file establishes that it is looking for crypto related material. Why did it pass up the "Cryptotechnic Enlightenment" page then? I submit that it is because the word "cryptotechnic" did not trip the bot's sensor but the word "crypto" in the link title to crypto_index.zip did. I also believe that a human would have followed the "unfinished works" or "misc projects" links after getting a crypto index file. A human would be intelligent enough to intuit the connection; a spider is not. At this point, I imagine the bot reaching the end of ismene's main page, having picked up the file it thought was useful and returning back to the access.html file on spice and traversing to the next link. In this case, it is an ftp connection to my machine. A portion of my logs: Apr 22 14:00:13 localhost opieftpd[1509]: connect from firewall-user at 192.239.70.124 Apr 22 14:00:14 localhost ftpd[1509]: connection from corvette.bxa.doc.gov at We d Apr 22 14:00:14 1998 Apr 22 14:00:15 localhost ftpd[1509]: Anonymous FTP connection made from host corvette.bxa.doc.gov. Apr 22 14:00:16 localhost ftpd[1509]: ANONYMOUS FTP login from corvette.bxa.doc.gov with ID mozilla@ After logging in corvette issues the following commands: Apr 22 14:00:22 localhost ftpd[1509]: <--- 200 Type set to I. Apr 22 14:00:23 localhost ftpd[1509]: command: SIZE /^M Apr 22 14:00:23 localhost ftpd[1509]: <--- 550 /: not a plain file. Apr 22 14:00:25 localhost ftpd[1509]: command: CWD /^M Apr 22 14:00:25 localhost ftpd[1509]: <--- 250 CWD command successful. Apr 22 14:00:28 localhost ftpd[1509]: command: LIST^M Apr 22 14:00:29 localhost ftpd[1509]: <--- 150 Opening BINARY mode data connection for /bin/ls. Apr 22 14:00:29 localhost ftpd[1509]: <--- 226 Transfer complete. Apr 22 14:00:35 localhost ftpd[1509]: command: PORT 192,239,70,124,7,228^M Apr 22 14:00:35 localhost ftpd[1509]: <--- 200 PORT command successful. Apr 22 14:00:36 localhost ftpd[1509]: command: SIZE /pub/^M Apr 22 14:00:36 localhost ftpd[1509]: <--- 550 /pub/: not a plain file. Apr 22 14:00:39 localhost ftpd[1509]: command: CWD /pub/^M Apr 22 14:00:39 localhost ftpd[1509]: <--- 250 CWD command successful. Apr 22 14:00:40 localhost ftpd[1509]: command: LIST^M Apr 22 14:00:40 localhost ftpd[1509]: <--- 150 Opening BINARY mode data connection for /bin/ls. Apr 22 14:00:40 localhost ftpd[1509]: <--- 226 Transfer complete. Apr 22 14:00:47 localhost ftpd[1509]: command: PORT 192,239,70,124,7,235^M Apr 22 14:00:47 localhost ftpd[1509]: <--- 200 PORT command successful. Apr 22 14:00:48 localhost ftpd[1509]: command: SIZE /pub/skey/^M Apr 22 14:00:48 localhost ftpd[1509]: <--- 550 /pub/skey/: not a plain file. Apr 22 14:00:50 localhost ftpd[1509]: command: CWD /pub/skey/^M Apr 22 14:00:50 localhost ftpd[1509]: <--- 250 CWD command successful. Apr 22 14:00:51 localhost ftpd[1509]: command: LIST^M Apr 22 14:00:51 localhost ftpd[1509]: <--- 150 Opening BINARY mode data connection for /bin/ls. Apr 22 14:00:51 localhost ftpd[1509]: <--- 226 Transfer complete. Apr 22 14:01:08 localhost ftpd[1509]: command: PORT 192,239,70,124,8,1^M Apr 22 14:01:08 localhost ftpd[1509]: <--- 200 PORT command successful. Apr 22 14:01:08 localhost ftpd[1509]: command: SIZE /pub/skey/README^M Apr 22 14:01:08 localhost ftpd[1509]: <--- 213 1149 Apr 22 14:01:09 localhost ftpd[1509]: command: RETR /pub/skey/README^M This series of commands ignores a directory called "keys" at root level, which is consistent with ignoring PGP keys above, and cd's to pub/skey. It then retrieves the README file (which is just a copy of NRL's readme) and leaves. The connection style itself (of SIZE'ing directory names) is odd, but this can be recreated with older versions of Netscape Navigator. I will assume that these connections are really from Netscape, and _not_ from a bot disguising itself as NS Navigator. Greg Broiles (gbroiles at netbox.com) forwarded portions of his logs on parrhesia to me: corvette.bxa.doc.gov - - [20/Mar/1998:10:18:07 -0800] "GET /wassenaar/ HTTP/1.0" 200 2253 "http://search.excite.com/search.gw?collection=web&display=html2,lb&search=w assenaar+countries" "Mozilla/2.0 (compatible; MSIE 3.02; Windows 3.1)" corvette.bxa.doc.gov - - [20/Mar/1998:10:18:46 -0800] "GET /wassenaar/ HTTP/1.0" 200 2253 "-" "Mozilla/2.0 (compatible; MSIE 3.02; Windows 3.1)" These shows connections from MSIE, can anyone confirm that MSIE makes FTP requests in the same manner as NS? Here I raise two questions that I would like to discuss, in private email if needed because it is off-topic. First, could Navigator be made to crawl the web? Could it be programmed via OLE, or Java? If it could, then it could easily be used as the protocol frontend to a spider that could easily crawl http, ftp, gopher, and news references looking for crypto export violations. If programming Navigator would entail pushing keystrokes into the keyboard buffer and simulating mouse events, I do not believe it would be used as tying up a machine's console in this manner would be vastly inefficient and it would be better justified to pay a programmer to develop the software to do it without NS. Now I would like to focus on a different aspect of my logs: the identification of a firewall-users at 192.239.70.124. It seems as if corvette is a proxy server for other machines. A port probe of corvette yields the following services: corvette.bxa.doc.gov ftp 21/tcp corvette.bxa.doc.gov smtp 25/tcp mail corvette.bxa.doc.gov whois 43/tcp nicname corvette.bxa.doc.gov gopher 70/tcp corvette.bxa.doc.gov finger 79/tcp corvette.bxa.doc.gov www 80/tcp http ismene:~$ finger @corvette.bxa.doc.gov [corvette.bxa.doc.gov] Finger from your system is not permitted through the firewall. ismene:~$ ftp corvette.bxa.doc.gov Connected to corvette.bxa.doc.gov. 220-Proxy first requires authentication 220 corvette.bxa.doc.gov FTP proxy (Version 3.2) ready. - From these two connections, we can see that corvette is indeed a firewalling proxy. Because of this, we cannot be sure if all connections out of corvette belong to the possible spider. An altavista search for corvette.bxa.doc.gov turns up the web statistics logs of several servers, including military and foreign servers. Such a bot may crawl foreign servers looking for links or files from the U.S., and it may crawl military sites to see to it that regulated materials are not being exported (like the pgp fiasco). On the other hand, this is mere speculation, it is equally likely that humans at BXA are putzing around the net, looking at different sites. This latter fact can be established (or we must admit to an incredibly wide reaching bot that is not limited to crypto) because spice.mhv.net has logged connections from corvette to www.mhv.net/~donn/diet.html which is the main page for a health/fitness related hierarchy. It is apparently a popular site for that material and is linked to frequently by other sites. It is possible that a bot crawled around this way, but unlikely since from the evidence on my machine the bot (if it is one) is fairly discriminating about the links it follows. Humans use the corvette proxy. It is hard to tell which links drew corvette's attention from those sites that were hit up. Here is an attempt at a classification of sites that get connections from corvette: * Physics: nsi.net.kiae.su, a nuclear safety institute, keeps a log specifically of U.S. government computers that have connected to them. Corvette made 65 requests to nsi.net.kiae.su. University of Crete Physics Dept. (www.edu.physics.uch.gr) 21 times. * Other Science and Technology: The Bioscan project at genome.cs.unc.edu was hit twice. The BCD (Biological Computing Division) of the Weizmann Institute in Israel was hit 9 times. CSIRO Minerals, www.csiro.au, was hit 1. The Texas Agricultural Extension Service was hit twice. * Political: www.tbs-sct.gc.ca the Canadian Treasury Board was hit once. * Military: The U.S. Army's Signal Corps was hit 13 times. Several universities were hit as well, presumably because of a student pages. Other miscellaneous sites that were hit include a martial arts page, a personal interests page and a porn page. The urls for the pages in question are included below. If this sample of sites is representative of the connections made by corvette, then physics sites make up the bulk of those connections. No verifiable connections were made to crypto related sites other than my own. I do not know why the connections were made to the universities, I figure that it is because of student interests. Given the nature of BXA's mission, and the sort of material that I make available on my homepage on spice I still find it strange that the "Cryptotechnic Enlightenment" page was passed by. This is underscored by the fact that the "Misc." and "Unfinished" links were passed up, even when corvette is obviously looking for crypto stuff (by getting crypto_index.zip). However, there is a general lack of relevent connections made to crypto related sites by corvette on the internet as a whole. If corvette is proxying a bot, I think that the bot may be targeted at individuals and is not a wide-spread intelligence gathering device. I would be interested in hearing if corvette has made connections to crypto oriented sites. If those that run sites with crypto material could post any connections they have had from corvette, I would appreciate it. Michael Graffam (mgraffam at mhv.net) - ----------------------------------------------------------------------- URLS relating to corvette.bxa.doc.gov turned up by Altavista: http://chip.mcl.ucsb.edu/lopaka/usage/weeks/hosts/www.mcl.ucsb.edu.13.total-hosts.html http://www.tbs-sct.gc.ca/tbsstats/tbstats/N1997-06.TXT http://nsi.net.kiae.su/w3perl/Pays/US-Government.html http://www.tbs-sct.gc.ca/tbsstats/tbstats/N1997-03.TXT http://genome.cs.unc.edu/wusage/week59.html http://dapsas.weizmann.ac.il/reports/31Oct1997.hosts.html http://www.minerals.csiro.au/wusage/new/log.ext/log1997/sites0896.html http://www.gordon.army.mil/usage/H1997-01.TXT http://www.amherst.edu/~erreich/visitors.html http://www.ufl.edu/9607-14.html http://data.gc.peachnet.edu/APPS/WWW/USAGE/1996/H1996-07.TXT http://data.gc.peachnet.edu/APPS/WWW/USAGE/1996/H1996-09.TXT http://www.edu.physics.uch.gr/usage/week89.html http://www.edu.physics.uch.gr/usage/week56.html http://www.gordon.army.mil/usage/H1996-09.TXT (2) http://leviathan.tamu.edu:70/0/gnlog/1996/9612/9612.hosts http://lfowler.afternet.com/logfiles/sites0298.html http://www.chelt.ac.uk/usage/ws970622.htm http://www.splosh.co.uk/usage/weeks/hosts/splosh.9.total-hosts.html http://www.ufl.edu/9803-08.html http://www.italcultusa.org/home/_private/mailing.txt http://lfowler.afternet.com/logfiles/sites0198.html Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc I think that we should be men first, and subjects afterward. It is not desirable to cultivate a respect for the law, so much as for the right. Henry David Thoreau "Civil Disobedience" -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQCVAwUBNVS3VQKEiLNUxnAfAQFz2QP+Ow8vwjFYOM/tN4kcyOpxbxWbr4S6bkWv 5zBctIwWk9qWedLxHXMH67JV3AATou1aFUTXL2w4J56frkhgcPIcgjV1j7ME6y/r qNBvysaXzTkIUu/Vj9TJeigbKWTa7YiVgLn97X/RnjfjapD62e3ejhCOurEeDSPr 6u2BFhOGAIk= =fTJr -----END PGP SIGNATURE----- From wombat at mcfeely.bsfs.org Sat May 9 14:45:32 1998 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Sat, 9 May 1998 14:45:32 -0700 (PDT) Subject: [Fwd: 3Com switches - undocumented access level.] In-Reply-To: <355372B4.C837F915@brainlink.com> Message-ID: Since you didn't specify the method of access. it is hard to determine if this is a large security hole. Most equipment can be rebooted and brought up without a password IF you have local access. For example, Cisco routers can be brought up without password simply by specifying the starting address of the load file, but you have to be at the local console to do this. UNIX systems can be brought up w/o password in single-user mode, if you have local access. Yes, there are firmware passwords to guard against this on many systems, but one can always swap up the eeprom, etc. I'd only be worried about the 3Com backdoor if it can be used remotely. Got any details? -r.w. From president at whitehouse.gov Sat May 9 17:11:32 1998 From: president at whitehouse.gov (Spam the President) Date: Sat, 9 May 1998 17:11:32 -0700 (PDT) Subject: U.S. Navy caught hacking into British marine charity Web site Message-ID: <3554E2BF.5C3E2646@whitehouse.gov> On Sat, 9 May 1998, Bill Frantz wrote: > At 4:48 AM -0800 5/9/98, Spam the President wrote: > >http://www.infoworld.com/cgi-bin/displayStory.pl?98058.winavy.htm > > > > U.S. Navy caught hacking > > into British marine > > charity Web site > > > > By Kristi Essick > > InfoWorld Electric > > > > Posted at 3:07 PM PT, May 8, 1998 > > ... > > > > "I think whoever it was within the U.S. Navy > > facility would have better things to do rather than > > try and hack into our computers," said Chris > > Stroud, the organization's director of campaigns, > > in a statement. "If they were seeking reports on > > the Black Sea, we shall be freely publishing these > > in the near future anyway." > > Consider the possibility that someone hacked into the Navy's computer and > then used it as a base to hack the Marine Mammal Charity site. > > ------------------------------------------------------------------------- > Bill Frantz | If hate must be my prison | Periwinkle -- Consulting > (408)356-8506 | lock, then love must be | 16345 Englewood Ave. > frantz at netcom.com | the key. - Phil Ochs | Los Gatos, CA 95032, USA It wouldn't make any sense. Why would a hacker use a military site that is actively monitored to hack into a site with less security? And why the requests to get the document originating from the same source? Also, from what I have read, the DoD needs come first in everything, especially Defence Security related issues. No holds barred when they want something. This sounds exactly like the kind of information that they would want and consider essential, and could thus justify themselves to get it by any means available. Of course, if this was a hacker playing tricks to the US military, then I'm sure we can expect the military will publish this serious a security breach, in order to get more money to protect themselves against any Internet terrorist attacks in the future. But I bet there will be no public comments or explanation given. ----- pentagon-gw-e0.nci.net (198.253.200.2) donhq-gw.nci.net (198.253.203.11) donhqns1.hq.navy.mil (164.224.250.80) Trying 164.224.250.80... Connected to 164.224.250.80. Escape character is '^]'. W A R N I N G W A R N I N G W A R N I N G W A R N I N G USE OF THIS OR ANY OTHER DOD INTEREST COMPUTER SYSTEM CONSTITUTES A CONSENT TO MONITORING AT ALL TIMES This is a Department of Navy (DON) interest computer system. All DON interest computer systems and related equipment are intended for the communication, transmission, processing, and storage of official U.S. Government or other authorized information only. All DON interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DON interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. If monitoring of this or any other DON interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. If monitoring of this or any other DON interest computer system reveals violations of security regulations or unauthorized use, employees who violate security regulations or make unauthorized use of DON interest computer systems are subject to appropriate disciplinary action. USE OF THIS OR ANY OTHER DOD INTEREST COMPUTER SYSTEM CONSTITUTES A CONSENT TO MONITORING AT ALL TIMES W A R N I N G W A R N I N G W A R N I N G W A R N I N G Username: From president at whitehouse.gov Sat May 9 17:23:13 1998 From: president at whitehouse.gov (Spam the President) Date: Sat, 9 May 1998 17:23:13 -0700 (PDT) Subject: NASA computers to be hacked Message-ID: <3554E57C.36AA4BFE@whitehouse.gov> http://www.msnbc.com/news/164582.asp NASA computers to be �hacked� National Security Agency wants to know if space agency�s computers are secure enough to fend off cyber-intruders ASSOCIATED PRESS WASHINGTON, May 9 � Agents from the National Security Agency will try to break into NASA�s computers to determine whether the space agency can fend off cyber-intruders who could threaten launch-control and other critical operations, the trade publication Defense Week reports. THE �PENETRATION STUDY� of the National Aeronautics and Space Administration�s unclassified computer networks is an effort to learn how easily troublemakers can get to sensitive data and what NASA�s doing about it. Teams from the intelligence agency will soon try to penetrate NASA networks in up to eight states, said the newsletter in the edition to be published Monday. Last June, NSA �hackers� showed they could cripple Pacific Command battle-management computers and U.S. electric power grids. �PENETRATION STUDY� The NASA �penetration study,� which will be run under the auspices of the General Accounting Office, stands out because it involves a U.S. civilian agency, and such operations are barred by the 1952 law that created NSA, the newsletter said. However, the law barring domestic activities contains an exception if the spy agency is invited to do the work. Still, the publication said the planned test raised questions of privacy. John Pike of the Federation of American Scientists, a veteran observer of both NASA and the intelligence community, told the newsletter that the NASA test breaks new ground and bears close watching. �This is the next big step in NSA�s expanding role in domestic information security,� he said. �It�s certainly the first reported major initiative of this sort with respect to a non-military agency. While a number of safeguards are in place, there are concerns about the potential for abuse of this type of activity.� But Charles Redmond, the space agency�s manager of information-technology security, said the test was �not an invasion of privacy.� NASA preferred to have the intelligence agency do the tests because it wanted to protect security and proprietary data and to avoid any conflict of interest, Redmond said. The tests will determine how easy it is to access sensitive sites and whether they can be accessed through the Internet. From president at whitehouse.gov Sat May 9 17:52:09 1998 From: president at whitehouse.gov (Spam the President) Date: Sat, 9 May 1998 17:52:09 -0700 (PDT) Subject: Spy Satellite Launched Message-ID: <3554EC42.5E33D640@whitehouse.gov> http://www.abcnews.com/sections/science/DailyNews/rocket980508.html C A P E C A N A V E R A L, Fla., May 8 � A top secret spy satellite blasted off on Friday atop the U.S. military's most powerful rocket booster. The 20-story U.S. Air Force Titan 4B rocket, carrying the classified National Reconnaissance Office spacecraft, lifted off its Cape Canaveral launch pad at 9:38 p.m. EST. The rocket's comet-like streak through the moon-lit night sky was visible as far away as Orlando. According to the trade journal Aviation Week and Space Technology, the Titan, built by Lockheed Martin Corp., placed an electronic eavesdropping satellite into orbit. "It will be used to listen in on communications in hostile areas, such as the Middle East and North Korea," said Craig Covault, the magazine's space technology editor. The rocket soared into the sky several hours late after a problem-plagued countdown. Air Force launch controllers had to deal with technical trouble at a tracking station and high upper-level winds. The countdown was also disrupted by a container ship and a small sail boat that strayed into the launch danger area in the Atlantic Ocean, east of Cape Canaveral. From vznuri at netcom.com Sat May 9 18:09:20 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 9 May 1998 18:09:20 -0700 (PDT) Subject: nsa police & ammunition theft Message-ID: <199805100109.SAA20181@netcom7.netcom.com> ------- Forwarded Message From: believer at telepath.com Subject: IP: NSA police suspected in agency thefts Forwarded: - ----------------- >Source: The Baltimore Sun, May 9, 1998 >http://www.sunspot.net > >NSA police suspected in agency thefts > >50,000 rounds of ammunition reported stolen; 'An active investigation'; 2 >officers allowed to resign; at least 9 others targeted > >By Tom Bowman >Sun National Staff > >WASHINGTON -- Nearly a dozen members of the police force that guards the >top-secret National Security Agency are suspected of stealing ammunition >from the Fort Meade-based agency, sources and federal officials said >yesterday. > >The thefts, which included up to 50,000 rounds of ammunition, represent an >embarrassing incident for the NSA, an intelligence agency that eavesdrops >on foreign communications and makes and breaks codes. Besides NSA >officials, agents of the Bureau of Alcohol, Tobacco and Firearms are >investigating the thefts. > >While no arrests have been made, several police officers have been >implicated, officials said. But details about the thefts and the progress >of the investigation remained sketchy yesterday. > >Larry Stewart, special agent in charge of the bureau's Baltimore office, >declined to comment on the amount of ammunition stolen or the number of >officers from the NSA's Security Protective Officer force who are under >investigation. > >"That I can't share with you," Stewart said. "The only thing I can tell you >is it's an active investigation, and we can't comment on that." > >NSA officials also declined to discuss the investigation. The agency >released a brief statement yesterday saying it was "nearing completion on >an investigation involving Security Protective Officers." > >Agency sources said two sergeants on the force have been allowed to resign >as a result of the investigation, including one who oversaw the force's >ammunition and weapons. At least nine other officers are under >investigation. > >The sergeant who was in charge of ammunition, William R. Fabus, said he had >resigned voluntarily on May 1 after he was questioned by agents. > >"I was not aware that anything was missing," said Fabus, 36, of >Catonsville, adding that he expects no further inquiries or criminal >charges. "I was told there was nothing criminal that I did."Fabus, a >10-year veteran of the force, declined to say why he had abruptly resigned. >"I don't know where I'm stepping," he said. "If I give out any information >considered national security stuff, it would be adverse toward me." > >Officer named others > >Officials would not say when they believe the thefts began or how they were >detected, though one former agency employee said the thefts had been >occurring for at least two months. The source said one officer was caught >and began implicating others. > >The thefts have resulted in new security procedures at the agency, sources >said, and employees have been warned not to talk about the investigation. >The NSA, which employs about 23,000 people at Fort Meade, is the largest >employer in Maryland. > >As part of the inquiry, investigators found grenades and assault rifles, >although neither were NSA property, sources said. > >"It shocked a lot of people," the former employee, who requested anonymity, >said of the thefts. "[The officers] are not kids; they've been working >there a long time." > >The uniformed police force includes several hundred officers and provides >security at NSA's sprawling complex off the Baltimore-Washington Parkway >and its satellite locations throughout Maryland. > >Top-security clearance > >The officers, whose average salary is about $30,000, undergo two months of >training at a facility in Georgia with other federal police officers, and >carry either 9 mm or 38-caliber handguns, former members of the force said. > >They also possess the government's top-security clearance, known as SCI for >Sensitive Compartmented Information, the eavesdropping product that is >among the nation's most guarded secrets. > >Officials would not say whether they suspect that the officers were using >the ammunition for their own use or were selling it. FBI spokesmen and >staffers on the congressional intelligence oversight committees said they >were unaware of the investigation. > >"This is the first I've heard of it," Larry Foust, an FBI spokesman in >Baltimore, said when called by a reporter. One top FBI official in >Washington privately expressed surprise that the bureau had not been >notified, considering the possible extent of the theft. > >Morale problems > >Besides the thefts, agency officials have pointed to administrative and >morale troubles among the force. In a recent report, portions of which were >obtained by The Sun, the agency noted tensions among the uniformed police >supervisors, many of whom are high school graduates, and a rising number of >college-educated officers who are being hired. > >"The supervisors may feel threatened by subordinates who may be brighter >and more willing to empower themselves to make independent decisions," the >report said. > >Moreover, the report said, newly hired officers have not been given a >"realistic job preview." > >"It was widely believed that applicants may have been misled to believe >that the job entailed more sophisticated and responsible police functions >than actually take place," according to the report. "Boredom and lower >levels of job satisfaction are believed to be widespread amongst the more >educated [officers]." > >Sun staff writer Larry Carson contributed to this article. > >Originally published on May 8 1998 ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: subscribe ignition-point email at address or unsubscribe ignition-point email at address ********************************************** ------- End of Forwarded Message From rah at shipwright.com Sat May 9 19:04:49 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sat, 9 May 1998 19:04:49 -0700 (PDT) Subject: corvette.bxa.doc.gov followup In-Reply-To: Message-ID: I talked to Peter Cassidy yesterday. We talked about corvette. For the record, they don't deny it's theirs, and that it's part of their ongoing enforcement operations. Maybe it's time to fire up your spider traps, boys and girls? I do know that Los Alamos had one up for fun a few years ago. It was discussed on this list about the time AltaVista got started, maybe 3 years ago... I bet that corvette doesn't give a squalling fuck about "no-crawling" HTML requests... Anyone want to bet on how long it'll be some idiot in DC tries to make spidertraps illegal? Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From your.friend at 02433.com Sat May 9 20:40:08 1998 From: your.friend at 02433.com (your.friend at 02433.com) Date: Sat, 9 May 1998 20:40:08 -0700 (PDT) Subject: hello Message-ID: <99902170875.bee08056@tecrets.com>

Hey come look at your new car stereo at Stereo Surplus!
http://www.cvc.net/business/juanm/index.html

HELLO MY NAME IS ARON.  WOULD YOU LIKE TO SEND EMAILS LIKE THIS?
I CHARGED $120.00 TO SEND THIS EMAIL!  YOU COULD MAKE LOTS OF
MONEY EVERY DAY AT THE PUSH OF A BUTTON.  DOES THAT SOUND EASY?
WELL IT IS!  FOR ONLY $180.00 YOU CAN HAVE STEALTH PLUS 40 MILLION
EMAIL ADRESSES.  THIS SAME PROGRAM SELLS EVERY WHERE ELSE FOR 
$400-500.00!  YOU CAN MAKE $400-800.00 A DAY! I ONLY DO THIS FOR ABOUT
2 HOURS AND WAIT FOR THE MONEY TO COME IN. THE BEST PART ITS ALL 
LEGAL!  ARE YOU INTERESTED?
EMAIL ME AT aron28 at hotmail.com I WILL REPPLY ASAP!









From a.friend at 15234.com  Sat May  9 22:07:55 1998
From: a.friend at 15234.com (a.friend at 15234.com)
Date: Sat, 9 May 1998 22:07:55 -0700 (PDT)
Subject: hello
Message-ID: <75322170875.bee08056@allrets.com>



Hey come look at your new car stereo at Stereo Surplus!
http://www.cvc.net/business/juanm/index.html

HELLO MY NAME IS ARON.  WOULD YOU LIKE TO SEND EMAILS LIKE THIS?
I CHARGED $120.00 TO SEND THIS EMAIL!  YOU COULD MAKE LOTS OF
MONEY EVERY DAY AT THE PUSH OF A BUTTON.  DOES THAT SOUND EASY?
WELL IT IS!  FOR ONLY $180.00 YOU CAN HAVE STEALTH PLUS 40 MILLION
EMAIL ADRESSES.  THIS SAME PROGRAM SELLS EVERY WHERE ELSE FOR 
$400-500.00!  YOU CAN MAKE $400-800.00 A DAY! I ONLY DO THIS FOR ABOUT
2 HOURS AND WAIT FOR THE MONEY TO COME IN. THE BEST PART ITS ALL 
LEGAL!  ARE YOU INTERESTED?
EMAIL ME AT aron28 at hotmail.com I WILL REPPLY ASAP!









From csvcjld at nomvs.lsumc.edu  Sun May 10 05:27:19 1998
From: csvcjld at nomvs.lsumc.edu (csvcjld at nomvs.lsumc.edu)
Date: Sun, 10 May 1998 05:27:19 -0700 (PDT)
Subject: corvette.bxa.doc.gov followup
Message-ID: <19980510072523421@nomvs.lsumc.edu>


192.239.70.124 hit my ftp site on 4/13/98, the day after I announced a
program to crack simple substitution ciphers on this list.  When I
announced the program, I accidently gave it an .exe extension (when it
actually had a .zip extension).  192.239.70.124 tried to get the .exe
extension and then gave up.  Is it possible that 192.239.70.124 is
driven by http://infinity.nus.sg/cypherpunks?

I've since purchased a $10 article from the ACM and extended my program
to implement G.W.Hart's algorithm; the result is archived as
ftp://colbleep.ocs.lsumc.edu/pub/crypto/simplsub/win95/gwhart.zip.  C
source code is included; it should compile under Unix as well as Windows
95/NT.





From sumanth at wipinfo.soft.net  Sun May 10 05:58:39 1998
From: sumanth at wipinfo.soft.net (Sumanth)
Date: Sun, 10 May 1998 05:58:39 -0700 (PDT)
Subject: Hi
Message-ID: <3555A5A5.6038AB44@wipinfo.soft.net>


Hi there,
  Is there anyway a mail from mix at anon.lcs.mit.edu can be tracked? If so
how..?

Awaiting a  reply

sumanth






From mgraffam at mhv.net  Sun May 10 13:57:32 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Sun, 10 May 1998 13:57:32 -0700 (PDT)
Subject: corvette.bxa.doc.gov followup
In-Reply-To: <19980510072523421@nomvs.lsumc.edu>
Message-ID: 


-----BEGIN PGP SIGNED MESSAGE-----

On 10 May 1998 csvcjld at nomvs.lsumc.edu wrote:

> 192.239.70.124 hit my ftp site on 4/13/98, the day after I announced a
> program to crack simple substitution ciphers on this list.  When I
> announced the program, I accidently gave it an .exe extension (when it
> actually had a .zip extension).  192.239.70.124 tried to get the .exe
> extension and then gave up.  Is it possible that 192.239.70.124 is
> driven by http://infinity.nus.sg/cypherpunks?

I would not doubt it. If I were BXA, and I wanted to keep tabs on 
crypto, I'd have an eye on cypherpunks. 

Does anyone know the infinity.nus.sg admins? Any chance of getting a
confirmation that corvette has hit them up?

Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Two things fill the mind with ever new and increasing admiration and awe
the more often and steadily we reflect upon them: the starry heavens
above and the moral law within me. I do not seek or conjecture either of
them as if they were veiled obscurities or extravagances beyond the horizon
of my vision; I see them before me and connect them immediately with the
consciousness of my existence." - Immanuel Kant "Critique of 
Practical Reason"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNVYR8wKEiLNUxnAfAQGJuwP+NtOI8O9sd9oivsvnrHTOJNadBVv89fJy
xOlCpFS93ESVjk7EqJwpU25lD5+0tE3f/bgHoHD5Tv52p6kVV9wms/lElnnzOxKU
HfGdw194NQPxvCdIfW11WW46Wl+NiUAgZ5clh6+uI+nC3fAHKxxemwflF/HRCmSb
0egTVVVseN4=
=dXfd
-----END PGP SIGNATURE-----






From billp at nmol.com  Sun May 10 15:26:06 1998
From: billp at nmol.com (bill payne)
Date: Sun, 10 May 1998 15:26:06 -0700 (PDT)
Subject: What Does Crash Mean? and Motion to Amend Order
Message-ID: <35562898.2B92@nmol.com>


Sunday 5/10/98 3:49 PM

J Orlin Grabbe
John Young

Orlin, u 5/10/98 Albuquerque Journal

  What Does �Crash� Mean?  Hang Around

  William Pfaff
  Syndicated Columnist

  PARIS -  A friend said to me the other day that the word  �crash�
  no longer is part of the American vocabulary.  We only know stock 
  market �correction,� and corrections have just be waited out.
    He explained to me that the stock market only goes up, because 
  immense popular and political interests, as well as corporate
interests
  are today committed to its only going up.  His implied argument was
that the 
  American government has no choice but to make it go up.
    It struck me, as he was peaking, that this might have been what Jay
Gatsby
  was saying to his friends during the luxurious summer of 1929, a few
months
  before Gatsby disappeared off the end of that dock in West Egg, on
Long
  Island Sound, or went back to the Middle West - if it was the Middle
West -
  which, for Gatsby, would have been worse.   But I am a child of the
Depression. ...

Pfaff concludes

    I would stick with an older American assumption, that if something
seems too
  good to be true, it probably is.

Accompanying picture by NANCY OHANIAN/ LOS ANGLES TIMES SYNDICATE
has a bull pictured precariously perched atop a pinnacle ... with rocks
falling around its
feet.

John  I just saw  
  
  Payne-Morales v. NSA: Motion to Amend Order  May 9, 1998

and

  Froomkin on Payne-Morales Motion to Amend Order  May 9, 1998 at

http://www.jya.com/crypto.htm

But I will not read them until Monday.

Let�s all hope someone sees the importance of posting the requested
documents on Internet.

Then settling this unfortunate mess.

Later
bill







From 83398.advsr at msn.com  Sun May 10 15:55:25 1998
From: 83398.advsr at msn.com (83398.advsr at msn.com)
Date: Sun, 10 May 1998 15:55:25 -0700 (PDT)
Subject: The information as requested -40730
Message-ID: <199805102254.PAA21804@toad.com>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 17483 bytes
Desc: not available
URL: 

From rah at shipwright.com  Sun May 10 16:37:54 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Sun, 10 May 1998 16:37:54 -0700 (PDT)
Subject: First meeting of DCS-NY -- The Digital Commerce Society of NewYork
Message-ID: 



--- begin forwarded text


To: dcs-ny-rsvp at piermont.com
Subject: First meeting of DCS-NY -- The Digital Commerce Society of New York
Reply-To: perry at piermont.com
X-Reposting-Policy: redistribute only with permission
Mime-Version: 1.0 (generated by tm-edit 7.108)
From: "Perry E. Metzger" 
Date: 10 May 1998 18:30:48 -0400
Lines: 31


[You are getting this either because you are either someone who
 I think would be interested in this announcement, or because you are
 on a mailing list devoted to issues related to electronic commerce. To
 prevent people from accidentally replying to the whole list, I've
 bcc'ed the recipients.

 Please feel free to forward this message to other interested
 individuals.]

As some of you probably know, Robert Hettinga has been running a group
called the Digital Commerce Society of Boston for some time now.  DCSB
meets once a month for lunch at the Harvard Club in Boston to hear a
speaker and discuss the implications of rapidly emerging internet and
cryptographic technologies on finance and commerce -- "Digital
Commerce", in short.

Interest has been expressed in starting a similar organization here in
New York. I'm therefore pleased to announce the initial meeting of the
Digital Commerce Society of New York (DCS-NY). We intend to meet the
second Tuesday of each month for lunch, probably at the Harvard Club
in New York, and conduct meetings much like those of DCSB.

If you are interested in attending our first luncheon meeting, which
will be held on June 9th, or if you wish to be informed of future
meetings by e-mail please send an RSVP to "dcs-ny-rsvp at piermont.com"
We will send out an announcement in about another week informing
people of the final choice of venue and the cost for the lunch.


Perry

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From sunder at brainlink.com  Sun May 10 18:00:11 1998
From: sunder at brainlink.com (Sunder)
Date: Sun, 10 May 1998 18:00:11 -0700 (PDT)
Subject: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To: 
Message-ID: <35564609.D3F85D5A@brainlink.com>


It is remote access - via telnet!

Rabid Wombat wrote:
> 
> Since you didn't specify the method of access. it is hard to determine if
> this is a large security hole. Most equipment can be rebooted and brought
> up without a password IF you have local access. For example, Cisco routers
> can be brought up without password simply by specifying the starting
> address of the load file, but you have to be at the local console to do
> this.
> 
> UNIX systems can be brought up w/o password in single-user mode, if you
> have local access. Yes, there are firmware passwords to guard against
> this on many systems, but one can always swap up the eeprom, etc.
> 
> I'd only be worried about the 3Com backdoor if it can be used remotely.
> Got any details?
> 
> -r.w.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From die at pig.die.com  Sun May 10 19:39:38 1998
From: die at pig.die.com (Dave Emery)
Date: Sun, 10 May 1998 19:39:38 -0700 (PDT)
Subject: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To: 
Message-ID: <19980510223401.C22003@die.com>


On Sun, May 10, 1998 at 08:27:53PM -0400, Sunder wrote:
> It is remote access - via telnet!
> 
	This is not that uncommon.   We implemented such a backdoor in a
router I worked on the design of some years ago.   The magic password
was a function of the model and serial number of the machine (not as I
remember a very strong hash either), and different for all boxes.  We
(or rather the marketing and support people) felt that leaving a
customer who forgot his password with no option but reset the router to
its factory defaults was more undesirable than providing a potential
attack point for  sophisticated hackers and spooks - the problem being
that there was  often days of work in setting up the configuration and
getting it right, and if the customer did not have a good backup forcing
him to destroy all of his hard won setup just because he couldn't
remember which wife's name he used as the password wasn't a good deal. 
And from a support point of view, helping the turkey to get everything
right again was very expensive and painful, whereas leaving a hole for 
a possible sophisticated attacker was not something that cost support
very much even if some bad guy used it to do real damage.

	I think most if not all uses of our backdoor were handled by
having someone in our customer support login to the machine and
restablish a password or give the customer the specific master password
for his box - I don't think we ever gave anyone the hash.

	I suspect that a large fraction of alarms, security systems,
pbxs and the like incorperate such backdoors for precisely the same 
kinds of reasons - it is simply too catastrophic to reset everything
if someone forgets the password.   I know several commercial Unixes
had such backdoors in them for emergency access years ago, and wouldn't
be overwhelmingly surprised if some current OS's still have magic backdoors.

	Of course these holes are dangerous, as it is not beyond possible
for someone with serious criminal intentions to obtain a copy of your product
and slog through the EPROMS/flash memory with a disassembler and determine
the magic algorithm which may give him access to all other machines running
the same basic code, especially if he has some method of poking around
in memory of his target machine or predicting such things as its secret
serial numbers. 

-- 
	Dave Emery N1PRE,  die at die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18






From frantz at netcom.com  Sun May 10 20:59:51 1998
From: frantz at netcom.com (Bill Frantz)
Date: Sun, 10 May 1998 20:59:51 -0700 (PDT)
Subject: U.S. Navy caught hacking into British marine charity Web site
In-Reply-To: <3554E2BF.5C3E2646@whitehouse.gov>
Message-ID: 


At 3:11 PM -0800 5/9/98, Spam the President wrote:
>It wouldn't make any sense. Why would a hacker use a military
>site that is actively monitored to hack into a site with less security?

Consider the wonderful irony of hacking into some site and having the blame
go somewhere else.

Consider a somewhat different circumstance.  I was recently in Organ Pipe
Cactus National Monument.  The southern border of the monument runs across
the US/Mexico border.  One of the stops on the tourist drive around the
monument is a parking lot 40 feet from a broken gate in the fence that
marks the border.  There is a large sign there suggesting that people not
leave their cars because of recent breakins.  There was also broken auto
glass on the ground.

Now, if I were breaking into cars, I would pick that parking lot, rather
than others further north, in hopes that everyone would blame the Mexicans.
Don't think I am sure that the Mexicans are not responsible, just that I
see a chance for some US lowlifes to deflect the blame.

I see the same opportunity in using a hacked Navy computer to hack a marine
mammal site.  It may be the Navy, or it may be a hacker with a polished
sense of irony.


-------------------------------------------------------------------------
Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
(408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
frantz at netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA







From 79126992 at 00195.com  Sun May 10 22:31:02 1998
From: 79126992 at 00195.com (79126992 at 00195.com)
Date: Sun, 10 May 1998 22:31:02 -0700 (PDT)
Subject: Mail Your Message to Millions
Message-ID: <19970350058.CAA990557@90009COMLINKNET.COM>


received: from invooc.com ([207.28.502.416]) by nnbfgwzz345.comlinkcom.net
(Intermail v3.1 177 234) with SMTPid <199803230830.aqwwe122 at bell.net> 
for ; Fri, 6 Feb 1998 05:08:30 +0000
Received: (qmail 9695 invoked by ter 0); 3 Apr1998 05:08:29 -0000
Message-ID: <19980323829.9694.qmail at tonight.com>
 Received: from 149.107.252.10 by www.msn.com with HTTP;
Thu, 05 Feb 1998 21:08:29 PSTX-Originating-IP: [153.145.252.17]
From: "Damion Potter"  
To: prede568qukdd8 at bellsouth.net 
Cc: flexal5yyt7876l at prodigy.net
Subject: Fw: please 
Content-Type: text/plain
Date: Thu, 05 Feb 1998 21:08:29 PST


Tired of NOT making money on the internet?

Did you REALLY believe that ALL you had to do was:

Put up a web page somewhere in Cyberspace with beautiful graphics,
the latest Java and some frames;

Advertise in a few free classifieds;

Act like an expert in newsgroups; since you're not 
supposed to advertise in them;

And, customers were going to beat a path to your door.

If you believed that-
BOY, have I got some swampland in Florida for you!

If you want to make money on the internet,
YOU'D better be PROACTIVE!

YOU'D better go after business like you MEAN IT!

YOU'D better send some E-MAIL - Lots of it!

And YOU'D better tell your story as much as you can,
as often as you can,
to whomever you can!

WELCOME TO THE REAL WORLD.

Bulk e-mail works!

If you know how to write an ad,
identify a need, and fullfill it with your product,
you can make money on the Internet
EVEN on a very limited budget.

This form of advertising has been proven MUCH MORE EFFECTIVE
than other forms of advertising because people read their e-mail.
And, the message will wait in the recipient's e-mail box until it is
read. Your message is SEEN not buried!

Your business deserves a piece of the fastest growing industry in the
U.S.- THE HOME-BASED BUSINESS INDUSTRY ( $427 billion in annual
sales).  Internet sales are projected to be over $10 billion by the 
year 2000, up from $300 million in 1994.

We've got the addresses YOU need.

A Web site alone, posting through newsgroups and registering with a 
few search engines while placing a few classifieds just won't work.

What good is a Web page no one knows is there?

Bulk e-mailing is the lowest-cost method of generating qualified sales leads,
On average, a solo direct (snail) mail promotion would cost around
$500.00 per thousand, whereas bulk e-mail costs pennies per thousand. No
known form of media advertising can compete with the low cost of bulk e-mail.

Our e-mail lists are maintained on state-of-the-art computers and are
updated daily to assure you the very latest names for your mailings. 

Bulk Email Works!!

Put your sales message in front of responsive buyers. Our lists are
compiled from active and willing on-line purchasers and entrepreneurs. 
THESE ARE SERIOUS CUSTOMERS LOOKING FOR SERIOUS OFFERS!
These BUYERS want to read and hear more about your products/services.
Our list is updated daily with fresh and new email addresses.

Even if you receive 1/10 of 1% response for mailing 1,000,000 email
addresses you would receive 1000 replies !!!!

How much money would you make?

Save TIME and MONEY! Make money on the seat of your Pants! Focus
entirely on your sales. Let us do your mailing for you at these
INCREDIBLY LOW RATES:

_____YES- mail my message to 50,000 responsive buyers for $49.95

_____YES- mail my message to 100,000 responsive buyers for $89.95

_____YES- mail my message to 250,000 responsive buyers for $199.95

_____YES- mail my message to 500,000 responsive buyers for $359.95

_____YES- mail my message to 1,000,000 responsive buyers for $679.95

_____YES- mail my message to 2,000,000 responsive buyers for $1299.95


*************** WE SPECIALIZE IN TARGETED MAILINGS - CALL FOR DETAILS***************

_____YES- mail my message to 5,000 targeted buyers for $79.95

_____YES- mail my message to 10,000 targeted buyers for $119.95

_____YES- mail my message to 15,000 targeted buyers for $154.95

_____YES- mail my message to 20,000 targeted buyers for $184.95

_____YES- mail my message to 30,000 targeted buyers for $244.95

_____YES- mail my message to 40,000 targeted buyers for $299.95

_____YES- mail my message to 50,000 targeted buyers for $349.95

Type of business or  people you need  to target __________________________
_________________________________________________________________

 
We MAIL, MAIL, MAIL-
YOU SELL, SELL, SELL.

REMEMBER:
Get 1/10 of 1% and from a mailing of 1,000,000 email addresses 
and you get 1000 replies!!!

Would you make any money?

We take CHECKS BY FAX 
get our most up to date list mailed for YOU by ordering NOW ! !

Call 407-956-1151 to order by phone or Fax your order to 407-952-7984 
Office hours are Mon-Fri 10 am - 6 pm Eastern Standard Time. 

Make checks or money order payable to: PICC

Or mail check or money order to: 

Progressive Internet Communications, Co.
P.O. Box 100512
Palm Bay, Florida 32910-0512

ORDER YOUR MAILING PROGRAM TODAY ! !
  

ORDER FORM
========================================================
Name___________________________________________
Address__________________________________________
City______________________State_________Zip_______
E-Mail Address____________________________________
Phone___________________________________________
Business phone____________________________________

Check Ordering info:
Name( exactly as it appears on check)
______________________________________________________
Check number_______________Dollar Amount_________________
**Fraction Code(numbers that appear below check number on top right)
(do not leave blank-ex:123-45/6789)__________________________
Numbers at Bottom of check(read left to right please indicate blank spaces
with a space)____________________________________________
Bank Name_____________________________________________
Bank Address____________________________________________
Bank City/Bank Zip Code___________________________________
Bank phone # (if applicable)_________________________________
 

____________________________________________________





                             == TAPE CHECK HERE ==



____________________________________________________





From global202 at yahoo.com  Mon May 11 03:02:44 1998
From: global202 at yahoo.com (global202 at yahoo.com)
Date: Mon, 11 May 1998 03:02:44 -0700 (PDT)
Subject: The Internet Success ToolBox
Message-ID: <>


Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
remove98 at yahoo.com
You will be removed promptly.
*****************************************************************

"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!

This is what you will receive on  CD-ROM:

1. Submit Spider Software - Professional Version ($99.90 value) - 
The new and improved version just released. Created specifically 
to meet the needs of those who  want their web pages to get 
NOTICED and placed in the TOP of the Search   Engines! This 
software automates  the process of submitting your site and 
uses powerful technology to get your site listed in the TOP positions.

2. Stealth Mass Mailer ($399.00 value) - This unique, first of 
it's kind - software that allows you to easily send 250,000 e-mail 
messages an hour. Simply enough by making a single 
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.

This, easy to use, software is designed for the basic computer 
user to understand. It's as easy as imputing the mail server, 
selecting the list of e-mail recipients to send to, inserting your 
e-mail address, adding your subject line, selecting your sales 
letter, and pressing send.

3. E-Mail Pro Extractor ($350.00 value) - This one of a kind software 
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of 
e-mail addresses by domain names.

The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum 
messages, or data from the member directory. Each of these 
files are filled with e-mail addresses.

4. Check Deposit System ($125.00 value) - Check Deposit System 
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary. 

5. 16 Million E-mail Addresses ($149.00 value) - We took a total of 
over 92 million e-mail addresses from many of the touted CD's that 
are out there (bought them all - some were $300+)! We added the 
millions we had in storage to those. When we combined them all, 
we had in excess of 100+ million addresses in one huge file.

We then ran a super "sort/de-dupe" program against this 
huge list. It cut the file down to less than 25 million!! 

We then ran a program that contained 150+ keywords to 
remove addresses with vulgarity, profanity, sex-related 
names, postmaster, webmaster, flamer, abuse, spam, 
etc...Also we  eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of 
dollars buying all others that are out there on  CD. Using
ours will be like using the 100+ million that we started with, 
but a lot less money and a lot less time!

If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following 
awesome bonuses absolutely FREE. 
A value of over $600.00 !!!

To order: 

____ YES!  I'm bursting with anticipation!  Please send me "The 
Internet Success Toolbox" so I can start advertising my business to 
"millions of people" - absolutely FREE!  I'm anxious to see how others 
are creating immediate "cash-flow explosions", and eliminating most of  
their advertising and marketing costs - and how I can do the same!  
Enclosed is $395.

____ YES AGAIN!  Because I'm responding within 7 days, I will receive 
6 BONUSES with a total value of $663.90 - absolutely FREE!  They include: 

BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most 
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!

BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and 
internet cash flow heaven!  

BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified 
Ad Sites on the Internet" - a virtual GOLDMINE!  

BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your 
Business on Automatic Pilot and Turn Your Marketing System Into a 
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even 
When You Don't!!"  
									
BONUS #5 ($195 value): Unlimited technical support.  Even though 
"The Internet Success Toolbox"  will be simple to use, it's great to 
know support is always available - if and when you really need it!  
And last but not least . . . .

BONUS #6 ($175 value): Order within 7 days and I'll also throw in a 
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE 
lodging at one of over 30 "premier" resorts.

Some vacation spots you can choose from include: Hawaii; Orlando, 
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!

Hey, when you start making a TON of money, you'll wanna do some 
celebrating, won't you? So start packing those bags!

That's it. A lot more than you bargained for isn't it?

When you total all the goodies up, you're looking as a total value of 
$663.90! All yours - absolutely FREE - with your purchase of our amazing
 package  "The Internet Success Toolbox " for only $395.00.

And I'll even pay for shipping your package. You can have it in days. And 
start making money THE VERY SAME DAY!

Anyway, I have a copy right here on my desk reserved for you. All I need 
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.								

 Name _____________________________________________________

Street Address ____________________________________________

City)__________________State_______Zip_____________


Phone # (_____) ___________________________  

Fax # (______) _____________________

E-mail Address _________________________


___Visa  ___MasterCard

Total:$________

Account Number_____________________

Expiration Date____________________


I understand that all sales are final.


____________________________________
           Signature


To order by check:
***********************************************************

Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.

(We are able to perform this service using our
Check Deposit System Software)

************************************************************


* Orders by Credit Card are shipped IMMEDIATELY.
  Fax completed order form to: (425) 379-9722

* Orders by personal, business or credit card CHECK are shipped in 7-10 
  business days.

* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK  or MONEY ORDER are
  shipped IMMEDIATELY. Mail to: 
                       SYS
                       11014 19th Ave SE Suite 305 
                       Everett, WA 98208.
    
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 


									






From global202 at yahoo.com  Mon May 11 03:02:44 1998
From: global202 at yahoo.com (global202 at yahoo.com)
Date: Mon, 11 May 1998 03:02:44 -0700 (PDT)
Subject: The Internet Success ToolBox
Message-ID: <>


Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
remove98 at yahoo.com
You will be removed promptly.
*****************************************************************

"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!

This is what you will receive on  CD-ROM:

1. Submit Spider Software - Professional Version ($99.90 value) - 
The new and improved version just released. Created specifically 
to meet the needs of those who  want their web pages to get 
NOTICED and placed in the TOP of the Search   Engines! This 
software automates  the process of submitting your site and 
uses powerful technology to get your site listed in the TOP positions.

2. Stealth Mass Mailer ($399.00 value) - This unique, first of 
it's kind - software that allows you to easily send 250,000 e-mail 
messages an hour. Simply enough by making a single 
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.

This, easy to use, software is designed for the basic computer 
user to understand. It's as easy as imputing the mail server, 
selecting the list of e-mail recipients to send to, inserting your 
e-mail address, adding your subject line, selecting your sales 
letter, and pressing send.

3. E-Mail Pro Extractor ($350.00 value) - This one of a kind software 
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of 
e-mail addresses by domain names.

The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum 
messages, or data from the member directory. Each of these 
files are filled with e-mail addresses.

4. Check Deposit System ($125.00 value) - Check Deposit System 
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary. 

5. 16 Million E-mail Addresses ($149.00 value) - We took a total of 
over 92 million e-mail addresses from many of the touted CD's that 
are out there (bought them all - some were $300+)! We added the 
millions we had in storage to those. When we combined them all, 
we had in excess of 100+ million addresses in one huge file.

We then ran a super "sort/de-dupe" program against this 
huge list. It cut the file down to less than 25 million!! 

We then ran a program that contained 150+ keywords to 
remove addresses with vulgarity, profanity, sex-related 
names, postmaster, webmaster, flamer, abuse, spam, 
etc...Also we  eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of 
dollars buying all others that are out there on  CD. Using
ours will be like using the 100+ million that we started with, 
but a lot less money and a lot less time!

If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following 
awesome bonuses absolutely FREE. 
A value of over $600.00 !!!

To order: 

____ YES!  I'm bursting with anticipation!  Please send me "The 
Internet Success Toolbox" so I can start advertising my business to 
"millions of people" - absolutely FREE!  I'm anxious to see how others 
are creating immediate "cash-flow explosions", and eliminating most of  
their advertising and marketing costs - and how I can do the same!  
Enclosed is $395.

____ YES AGAIN!  Because I'm responding within 7 days, I will receive 
6 BONUSES with a total value of $663.90 - absolutely FREE!  They include: 

BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most 
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!

BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and 
internet cash flow heaven!  

BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified 
Ad Sites on the Internet" - a virtual GOLDMINE!  

BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your 
Business on Automatic Pilot and Turn Your Marketing System Into a 
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even 
When You Don't!!"  
									
BONUS #5 ($195 value): Unlimited technical support.  Even though 
"The Internet Success Toolbox"  will be simple to use, it's great to 
know support is always available - if and when you really need it!  
And last but not least . . . .

BONUS #6 ($175 value): Order within 7 days and I'll also throw in a 
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE 
lodging at one of over 30 "premier" resorts.

Some vacation spots you can choose from include: Hawaii; Orlando, 
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!

Hey, when you start making a TON of money, you'll wanna do some 
celebrating, won't you? So start packing those bags!

That's it. A lot more than you bargained for isn't it?

When you total all the goodies up, you're looking as a total value of 
$663.90! All yours - absolutely FREE - with your purchase of our amazing
 package  "The Internet Success Toolbox " for only $395.00.

And I'll even pay for shipping your package. You can have it in days. And 
start making money THE VERY SAME DAY!

Anyway, I have a copy right here on my desk reserved for you. All I need 
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.								

 Name _____________________________________________________

Street Address ____________________________________________

City)__________________State_______Zip_____________


Phone # (_____) ___________________________  

Fax # (______) _____________________

E-mail Address _________________________


___Visa  ___MasterCard

Total:$________

Account Number_____________________

Expiration Date____________________


I understand that all sales are final.


____________________________________
           Signature


To order by check:
***********************************************************

Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.

(We are able to perform this service using our
Check Deposit System Software)

************************************************************


* Orders by Credit Card are shipped IMMEDIATELY.
  Fax completed order form to: (425) 379-9722

* Orders by personal, business or credit card CHECK are shipped in 7-10 
  business days.

* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK  or MONEY ORDER are
  shipped IMMEDIATELY. Mail to: 
                       SYS
                       11014 19th Ave SE Suite 305 
                       Everett, WA 98208.
    
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 


									






From rah at shipwright.com  Mon May 11 05:29:14 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Mon, 11 May 1998 05:29:14 -0700 (PDT)
Subject: DCSB: Michael Baum; PKI and the Commercial CA
Message-ID: 



--- begin forwarded text


X-Sender: rah at pop.sneaker.net
Mime-Version: 1.0
Date: Mon, 11 May 1998 07:23:28 -0400
To: dcsb at ai.mit.edu, dcsb-announce at ai.mit.edu
From: Robert Hettinga 
Subject: DCSB: Michael Baum; PKI and the Commercial CA
Sender: bounce-dcsb at ai.mit.edu
Precedence: bulk
Reply-To: Robert Hettinga 

-----BEGIN PGP SIGNED MESSAGE-----

[Because Mr. Baum became ill at the last minute this February, we have
rescheduled him for the upcoming DCSB meeting... --RAH]


              The Digital Commerce Society of Boston

                            Presents

                        Michael S. Baum
                         VeriSign, Inc.

                        PKI Requirements
                             from a
                   Commercial CA's Perspective

                    Tuesday, June 2, 1998
                           12 - 2 PM
               The Downtown Harvard Club of Boston
                  One Federal Street, Boston, MA


Requirements for the provision of commercial certification products and
services are under consideration by many companies. Similarly, efforts to
regulate certification authorities (CAs) and public key infrastructure (PKI)
are proliferating by many domestic and foreign governments. Underlying many
of these efforts is the intention to assess and assure quality and
trustworthiness, and yet the nature, scope and regime to accomplish these
goals remain elusive or at least have been balkanized.

This presentation will consider CA and PKI requirements from the experiences
and perspective of a commercial CA. It will survey current approaches to
ascertaining quality and performance as well as their limitations. It will
then propose a path forward. Many of these issues are present real
challenges to both the CAs and the user community. A lively dialog is
welcomed.


Michael S. Baum is Vice President of Practices and External Affairs,
VeriSign, Inc.  His responsibilities include developing practices and
controls under which VeriSign conducts its public Digital ID and private
label certificate operations.

Mr. Baum is the Chair of the Information Security Committee, and Council
Member of the Section of Science and Technology, of the American Bar
Association. He is Chairman of the International Chamber of Commerce (ICC)
ETERMS Working Party and a Vice Chairman of the ICC's Electronic Commerce
Project, a delegate to the United Nations Commission on International Trade
Law on behalf of the ICC. He is a member of various digital signature
legislative advisory committees.

Mr. Baum is co-author (with Warwick Ford) of Secure Electronic Commerce
(Prentice Hall, 1997), author of Federal Certification Authority Liability
and Policy - Law and Policy of Certificate-Based Public Key and Digital
Signatures (NIST, 1994), co-author of Electronic Contracting, Publishing and
EDI Law (Wiley Law Publications, 1991), and contributing author to EDI and
the Law (Blenheim Online, 1989), and the author of diverse information
security publications including the first American articles on EDI law. He
was honored as an EDI Pioneer in 1993 (EDI Forum) and was the Recipient of
the National Notary Association's 1995 Achievement Award. He is a member of
the Massachusetts Bar.


This meeting of the Digital Commerce Society of Boston will be held on
Tuesday, June 2, 1998, from 12pm - 2pm at the Downtown Branch of the
Harvard Club of Boston, on One Federal Street. The price for lunch is
$32.50. This price includes lunch, room rental, various A/V hardware, and
the speaker's lunch. ;-).  The Harvard Club *does* have dress code: jackets
and ties for men (and no sneakers or jeans), and "appropriate business
attire" (whatever that means), for women.  Fair warning: since we purchase
these luncheons in advance, we will be unable to refund the price of your
lunch if the Club finds you in violation of the dress code.

We will attempt to record this meeting for sale on CD/R, and to put it on
the web in RealAudio format, at some future date.


We need to receive a company check, or money order, (or, if we *really* know
you, a personal check) payable to "The Harvard Club of Boston", by Saturday,
May 30th, or you won't be on the list for lunch.  Checks payable to
anyone else but The Harvard Club of Boston will have to be sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The Harvard
Club of Boston", in the amount of $32.50. Please include your e-mail
address, so that we can send you a confirmation

If anyone has questions, or has a problem with these arrangements (We've had
to work with glacial A/P departments more than once, for instance), please
let us know via e-mail, and we'll see if we can work something out.


Upcoming speakers for DCSB are:

July      Rodney Thayer       IPSEC and Digital Commerce
August    TBA
September TBA
October   Peter Cassidy       Intellectual Property Rights Management

TBA       Jeremey Barrett     Digital Bearer Settlement

We are actively searching for future speakers.  If you are in Boston on the
first Tuesday of the month, and you would like to make a presentation to the
Society, please send e-mail to the DCSB Program Commmittee, care of Robert
Hettinga, .


For more information about the Digital Commerce Society of Boston, send
"info dcsb" in the body of a message to  . If
you want to subscribe to the DCSB e-mail list, send "subscribe dcsb" in the
body of a message to  .

We look forward to seeing you there!

Cheers,
Robert Hettinga
Moderator,
The Digital Commerce Society of Boston



-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNVbff8UCGwxmWcHhAQFEcwgAq7w35o/XmKxTL7k3vQOtAtCVCiGUH3Ow
FUIP2B2riGNTGaCsTO3gliuK0nulXq/9qKjqYXmmg6P0tmMuLHXFgq3rxP284rUg
hfqU/7hswJHjwPFzuwu9BbKEd2pG6ryY3epsEsNpenAlxfbChJJ0E6Y8L/yQh6FX
qxB2L5gxf3POOT0/HiSDORemtHp7dKonsCC7yFGvERTda+byAE7ypFQoVFn14gt0
2cDDCX2yynrCozD4aTHIOxwli2bsenTHIzyLY9I5V3gHkCUBf1ocXuiqrfIy8jHR
4ibg0VAvN5Fbnc363iqIGrLdcVJYb46Nc/3EvPqr67ImIySeiKDMXA==
=ilR4
-----END PGP SIGNATURE-----

-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/



For help on using this list (especially unsubscribing), send a message to
"dcsb-request at ai.mit.edu" with one line of text: "help".

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From jcea at argo.es  Mon May 11 06:04:34 1998
From: jcea at argo.es (=?iso-8859-1?Q?Jes=FAs?= Cea =?iso-8859-1?Q?Avi=F3n?=)
Date: Mon, 11 May 1998 06:04:34 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
Message-ID: <35571323.D109A0D2@argo.es>


You can have chaffing & winnowing without bandwidth overhead, but the
resulting scheme hasn't the original "elegance" anymore. In particular,
you don't send the plaintext on the clear.

The new schema is useful to cypher a document using any standard
signature library, exportable by definition. Very nice :), since you can
use, at last, strong crypto :).

a) When the connection starts, negociate an initial sequence number.
   The sequence number mustn't be reused. We assume a ordered delivery,
   like TCP.

b) Calculate the signature for:

   [sequence]0  ->  MAC0
   
   and

   [sequence]1  ->  MAC1

c) Compare both MACs and locate the first "different" bit,
   from high to low bit or viceversa.

d) Send that bit from MAC0 if you want to send a "0" or from
   MAC1 if you want to send a "1".

-- 
Jesus Cea Avion                         _/_/      _/_/_/        _/_/_/
jcea at argo.es http://www.argo.es/~jcea/ _/_/    _/_/  _/_/    _/_/  _/_/
                                      _/_/    _/_/          _/_/_/_/_/
PGP Key Available at KeyServ   _/_/  _/_/    _/_/          _/_/  _/_/
"Things are not so easy"      _/_/  _/_/    _/_/  _/_/    _/_/  _/_/
"My name is Dump, Core Dump"   _/_/_/        _/_/_/      _/_/  _/_/
"El amor es poner tu felicidad en la felicidad de otro" - Leibnitz





From sunder at brainlink.com  Mon May 11 07:55:43 1998
From: sunder at brainlink.com (Sunder)
Date: Mon, 11 May 1998 07:55:43 -0700 (PDT)
Subject: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To: 
Message-ID: <35571029.EBEB4953@brainlink.com>


Dave Emery wrote:

>         This is not that uncommon.   We implemented such a backdoor in a
> router I worked on the design of some years ago.   The magic password
> was a function of the model and serial number of the machine (not as I
> remember a very strong hash either), and different for all boxes.  We
> (or rather the marketing and support people) felt that leaving a
> customer who forgot his password with no option but reset the router to
> its factory defaults was more undesirable than providing a potential
> attack point for  sophisticated hackers and spooks 

This is still unexcusable.  It would have been just as simple to include a
hidden reset switch in a pannel somewhere that would zap all the passwords
on the router without zapping the config, and maybe send some alarms out
via SNMP incase it wasn't something that was wanted.

That would be something the client could do themselves without opening
security holes.


>         I suspect that a large fraction of alarms, security systems,
> pbxs and the like incorperate such backdoors for precisely the same
> kinds of reasons - it is simply too catastrophic to reset everything
> if someone forgets the password.   I know several commercial Unixes
> had such backdoors in them for emergency access years ago, and wouldn't
> be overwhelmingly surprised if some current OS's still have magic backdoors.

That doesn't mean that the ankle biters won't find them.  For example, I could
put a sniffer on the network coming into the router and call up tech support
and say "Hi" I lost my password, here's my IP address, help, help.

I can then do the same thing a week later with the same router incase the
hash is time dependant, and then later with another router with a different
serial number, and I'll have much info to get started on how your hash works.

Piece of cake.
 
>         Of course these holes are dangerous, as it is not beyond possible
> for someone with serious criminal intentions to obtain a copy of your product
> and slog through the EPROMS/flash memory with a disassembler and determine
> the magic algorithm which may give him access to all other machines running
> the same basic code, especially if he has some method of poking around
> in memory of his target machine or predicting such things as its secret
> serial numbers.

Yep.
 

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From movits at syndata.com  Mon May 11 09:08:09 1998
From: movits at syndata.com (Mordechai Ovits)
Date: Mon, 11 May 1998 09:08:09 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <35572194.51CDC872@syndata.com>


Jes�s Cea Avi�n wrote:
> 
> You can have chaffing & winnowing without bandwidth overhead, but the
> resulting scheme hasn't the original "elegance" anymore. In particular,
> you don't send the plaintext on the clear.
> 
> The new schema is useful to cypher a document using any standard
> signature library, exportable by definition. Very nice :), since you can
> use, at last, strong crypto :).
> 
> a) When the connection starts, negociate an initial sequence number.
>    The sequence number mustn't be reused. We assume a ordered delivery,
>    like TCP.
> 
> b) Calculate the signature for:
> 
>    [sequence]0  ->  MAC0
> 
>    and
> 
>    [sequence]1  ->  MAC1
> 
> c) Compare both MACs and locate the first "different" bit,
>    from high to low bit or viceversa.
> 
> d) Send that bit from MAC0 if you want to send a "0" or from
>    MAC1 if you want to send a "1".

On the contrary, it has an elegance all it's own :-).
Since this idea has gone through several iterations, starting from Ron's original paper, I wanted to
summarize in one place Jesus Cea Avion's idea.  All credit for the following technique goes to him.

Alice does this:
Mreal = MAC(serial number, message bit, key)
Mfake = MAC(serial number, complement of message bit, key)
In english:  She MACs both the bit she means, and then MACs the bit she does NOT mean.  She then compares
the two MACs to find the first different bit.  Then she sends to Bob the bit from Mreal in the position of
difference.

When Bob gets the bit, he does this:
Ma = MAC(serial number, 0, key)
Mb = MAC(serial number, 1, key)
He then compares Ma to Mb and finds the first difference.  The bit in the position of difference is the one
that was sent to him by Alice.  He then knows whether Ma or Mb is correct.  If Ma is the correct one then
the plaintext bit is 0, if Mb is the correct one then the plaintext bit is 1.
Remember that there is no need to send the serial number, but you MUST use it in the MAC.  If you are using
a reliable protocol like TCP, or storing it in a file, the serial number is implied by the order it was
received/stored.

However clever this technique is (and it *is* clever), it defeats the original purpose of Ron's idea.  The
original reason Ron created chaffing and winnowing was to show that encryption laws are useless.  He
demonstrated that you can use authentication technologies to create privacy.  Even more, even if the
government demands that the plaintext be in the open, his original paper was set up to pass even that
egregious requirement.  Think of what the govenrnment would see with this latest chaffing and winnowing. 
Two people are send a bitstream that is unreadable without a secret key.  No plaintext is visible.  In
fact, it bears very little resemblance to the name "chaffing and winnowing."  It would not matter to them
wether you were using DES, IDEA, or C&W.  If it looks like a duck, walks like a duck, and quacks like a
duck...
Another point of Ron's paper was that any technique the government tried to impose on C&W would create
unacceptable problems.  I dont think these problems would exist in this version of C&W.  Anyone know
better?

-- 
o Mordy Ovits
o Programmer / Cryptographer
o SynData Technologies Inc.
o Download A Free Copy Of Our Software At:
o http://www.syncrypt.com





From Sable1949 at aol.com  Mon May 11 09:25:28 1998
From: Sable1949 at aol.com (Sable1949)
Date: Mon, 11 May 1998 09:25:28 -0700 (PDT)
Subject: Last Chance
Message-ID: <7c5a0890.35571269@aol.com>


If you wish to be removed, Reply with "REMOVE" as the subject.

The Virtual Girlfriend and Virtual Boyfriend are artificial intelligence 
programs for your IBM PC or compatible and also for MACINTOSH. You 
can watch them, talk to them, ask them questions, tell them secrets, and 
relate with them.  Watch them as you ask them to take off different clothes
and guide them through many different activities. Watch and participate in
the hottest sexual activities available on computer, including: several
sexual positions, using many unique toys, even bringing in multiple partners.
This is no doubt one of the most realistic, sexually stimulating computer
games available. They will remember your name, birthday, your likes and your
dislikes. Every time you start the program, they say different things, and
act differently. Each time, they have a different personality. With the VGA
digital graphics, The Virtual Girlfriend and Virtual Boyfriend software have
some of the hottest, sexiest graphics out there.  And with a Soundblaster or
compatible card, you can actually hear their voice as they talk to you. This
is the first adult software title that was designed for both heterosexual and
homosexual people. I would like you to try the actual full copy out before it
is put on the market.  It will be sold for 1/5 of the actual price ($10.00)
until I can get back some information on what people think of the program.  
Please give it a try and write back any comments.      Thank you.

    If you are interested and would like to order a copy, then you can read
the mailing instructions below.  It comes in an unmarked package and you are 
not put on any mailing lists whatsoever, guaranteed. It will run on any 386, 
486 or higher,  and 100% IBM compatibles.  Required is VGA graphics, and a 
hard drive.The sound card is optional. Macintosh requires at least 4 meg of 
ram.  
Virtual Girlfriend and Virtual Boyfriend are artificial intelligence
programs, meaning they are completely interactive. It would be just like if
you were talking to someone.  You can actually have simple conversations.  
Their attitudes change with the different things you say, so you can say
things that will upset them, and then say things that will please them. The
more you play/talk with them, the more you learn what they can do, and what 
they like to do. It really is a blast.  With all these movies coming out
about virtual reality, it's amazing to actually have a virtual reality
program like this for your own computer. It's easy to install, and
instructions are easy to follow.     

  ~~~~~~~~~~~~~~~~Special Software Offer~~~~~~~~~~~~~~~~~~
This is to inform you about the new adult game that VCS Magazine
rated "The best game of "97".  "The Search for Paradise is no doubt one 
of the greatest XXX adult games available".  The first games where it is
as much fun as it is a turn on!  Travel the world to every continent, every
country you can think of, and meet some of the most beautiful women in
existence.  These women will treat you like a king and obey your every
command.  Any sexual wish you can think of, these women know it all.  
There is a different paradise for every guy out there, and this game will
have them all.  This game uses real models, digital video, and digital sound
to make it as realistic as possible.  You will feel like you're in the same
room as the girl you're talking to!!!

          As an added bonus you'll receive "Club Celebrity X"
     Meet, talk to and even have your way with the celebrities of your choice.
     Imagine being in a club with some very beautiful, well known, actual
     celebrities! You have seen these girls on T.V., Magazines and billboard
ads.
     Now they are on your computer begging for action.  This game is hot and
once you
     start playing, you won't be able to stop!!!

~Required: 386 or better, 4 meg ram or better, Windows 3.1 or higher (Win95
is fine), sound card is optional, Rom is optional.  (Game is given either
CD-rom or compressed 3.5" diskettes).~~$19.95!

                            Order now and get everything for just $24.95!!!!

     
At your request, the programs can come with a password protection utility
that only allows the program to run when the correct password is entered. 
                
                                   (You must be 18 or over to purchase)


Please fill out the following form and mail it to the address above.  
(Feel free to write out the order form by hand)

                        
 Send payment to:             Bruce Nichols
                                     2155 Verdugo Blvd.
                                           #522
                                    Montrose, Ca 91020
                        
Your Name ___________________________________________ Date ____________

Address ______________________________________________________________

City ____________________________ State __________ Zip Code ______________

Phone#  _____________________ E-mail Address ___________________________

Do you have an IBM (   ) or MAC (   )?  CD rom (   ) or Disks (   )?

(   ) Virtual Girdfriend or (   ) Boyfriend for $10.00 (   ) *both just $15.95

(   ) The Search for Paradise and Club Celebrity X for $19.95

(   ) Everything!!! The Search for Paradise, Club Celebrity X,
      Virtual Girlfriend and Virtual Boyfriend.  
       >>>>All for just $24.95<<<<
 






From christine_leeds at yahoo.com  Mon May 11 09:28:58 1998
From: christine_leeds at yahoo.com (christine_leeds at yahoo.com)
Date: Mon, 11 May 1998 09:28:58 -0700 (PDT)
Subject: Surprise
Message-ID: 



See Celebrity Hardcore pictures & MPEG video movies right from your browser 

      http://151.196.207.83
   
Top Celebrities & supermodels caught in the act

     http://151.196.207.83
          
  Plus Nude Pictures of the hottest naked female fitness models
 Featuring nude photos of Kiana Tom & Cory Everson plus 26 other top fitness models fully naked.

              Visit http://151.196.207.83 Today!
              
               New Attractions added weekly!

  My apologies if this message is of no interest to you. Your name was selected from a list stating that you are interested in adult entertainment. If you wish to recieve no further mailings just reply to this message with REMOVE as the subject.

                           Thank You

                                 Christine Leeds - http://151.196.207.83










From jcea at argo.es  Mon May 11 10:57:18 1998
From: jcea at argo.es (=?iso-8859-1?Q?Jes=FAs?= Cea =?iso-8859-1?Q?Avi=F3n?=)
Date: Mon, 11 May 1998 10:57:18 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <3557576A.C5EF9791@argo.es>


> However clever this technique is (and it *is* clever), it defeats the
> original purpose of Ron's idea.

Yes, you are right, Mordechai. My point was:

a) Prove that you can implement chaffing & winnowing without
   bandwidth overhead. I agree that the final schema doesn't
   resemble C&W anymore :).

b) Prove that you can use signature schemes, strong and exportable,
   to achieve confidentiality. In that way, my objetive is the same
   that Rivest had.

I'm happy knowing I can use full strengh signatures to keep my secrets,
secret :)

>  No plaintext is visible.

In the Rivest's paper you transmit, indeed, all the 2^n plaintexts for a
n bit length };-).

-- 
Jesus Cea Avion                         _/_/      _/_/_/        _/_/_/
jcea at argo.es http://www.argo.es/~jcea/ _/_/    _/_/  _/_/    _/_/  _/_/
                                      _/_/    _/_/          _/_/_/_/_/
PGP Key Available at KeyServ   _/_/  _/_/    _/_/          _/_/  _/_/
"Things are not so easy"      _/_/  _/_/    _/_/  _/_/    _/_/  _/_/
"My name is Dump, Core Dump"   _/_/_/        _/_/_/      _/_/  _/_/
"El amor es poner tu felicidad en la felicidad de otro" - Leibnitz





From bill.stewart at pobox.com  Mon May 11 11:55:48 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Mon, 11 May 1998 11:55:48 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <3.0.5.32.19980511115153.00941970@popd.ix.netcom.com>


>Jes�s Cea Avi�n wrote:
>> You can have chaffing & winnowing without bandwidth overhead, but the
>> resulting scheme hasn't the original "elegance" anymore. In particular,
>> you don't send the plaintext on the clear.
...
>> b) Calculate the signature for:
>>    [sequence]0  ->  MAC0
>>    [sequence]1  ->  MAC1
>> c) Compare both MACs and locate the first "different" bit,
>>    from high to low bit or viceversa.
>> d) Send that bit from MAC0 if you want to send a "0" or from
>>    MAC1 if you want to send a "1".

So why not _send_ the plaintext in the clear?
Send the 0 bit, and the bit from the MAC0, and the 1 and the MAC1 bit
	0 0, 1 1, 0 1, 1 0, 
Yes, it's expanding the data 4:1, but that's much better than before.

At 12:04 PM 5/11/98 -0400, Mordechai Ovits wrote:
>On the contrary, it has an elegance all it's own :-).

I strongly agree.  I had proposed using a short checksum,
e.g. 8 bits of the MAC, which does leave collisions every ~256 sets,
but this is almost as short a checksum as you can get,
and eliminates the collision except every ~2**64 pairs.

>However clever this technique is (and it *is* clever), 
>it defeats the original purpose of Ron's idea.  

If you do include the data bits, you maintain (very marginally)
the letter of the requirement here.  What you do lose
with this method is the ability to mix traffic from different people;
1 bit of MAC just isn't enough to pick out your own bits.
Any short MAC limits the amount of mixing you can do;
an 8-bit MAC lets you mix a bit without too many collisions,
and a 64-bit MAC should be enough for any mixture you'd
ever bother with (probably 16 or 32 would as well,
though especially for 16 you'd still need a longitudinal
checksum or some method of handling rare collisions.)

Is it close enough for government work?  Probably.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From movits at syndata.com  Mon May 11 12:10:06 1998
From: movits at syndata.com (Mordechai Ovits)
Date: Mon, 11 May 1998 12:10:06 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <35574C41.816CA545@syndata.com>


Jes�s Cea Avi�n wrote:

> In the Rivest's paper you transmit, indeed, all the 2^n plaintexts for a
> n bit length };-).

Not so. In his paper (before the package tranform stuff), he had the following expansion.
Assuming a 32 bit serial number and a 160 bit MAC, n bits would expand to 388n.
This is because Ron is sending it out like this:
quote from http://theory.lcs.mit.edu/~rivest/chaffing.txt
>To make this clearer with an example, note that the adversary 
>will see triples of the form:
>        (1,0,351216)
>        (1,1,895634)
>        (2,0,452412)
>        (2,1,534981)
>        (3,0,639723)
>        (3,1,905344)
>        (4,0,321329)
>        (4,1,978823)
>        ...
>and so on.

Every bit is getting 2 32-bit serial numbers, its own complement, and 2 160-bit MACs.
a 10KB file would explode into a 3.789MB file.
Not too practical, eh? :-)
-- 
o Mordy Ovits
o Programmer / Cryptographer
o SynData Technologies Inc.
o Download A Free Copy Of Our Software At:
o http://www.syncrypt.com





From ryan at michonline.com  Mon May 11 13:41:30 1998
From: ryan at michonline.com (Ryan Anderson)
Date: Mon, 11 May 1998 13:41:30 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To: <35574C41.816CA545@syndata.com>
Message-ID: 


On Mon, 11 May 1998, Mordechai Ovits wrote:

> > In the Rivest's paper you transmit, indeed, all the 2^n plaintexts for a
> > n bit length };-).
> 
> Not so. In his paper (before the package tranform stuff), he had the following expansion.

Note that any of the 2^n plaintexts cna be reconstructed from the
following sequence of triples.  (Assuming no knowledge of the MAC.  The
attacker has no idea which of each pair of triples related to each
sequence is correct, so he must search every possibility, which turns  out
to be each of the 2^n plaintexts.)

> Assuming a 32 bit serial number and a 160 bit MAC, n bits would expand to 388n.
> This is because Ron is sending it out like this:
> quote from http://theory.lcs.mit.edu/~rivest/chaffing.txt
> >To make this clearer with an example, note that the adversary 
> >will see triples of the form:
> >        (1,0,351216)
> >        (1,1,895634)
> >        (2,0,452412)
> >        (2,1,534981)
> >        (3,0,639723)
> >        (3,1,905344)
> >        (4,0,321329)
> >        (4,1,978823)



Ryan Anderson 
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9






From die at die.com  Mon May 11 13:55:42 1998
From: die at die.com (die at die.com)
Date: Mon, 11 May 1998 13:55:42 -0700 (PDT)
Subject: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To: 
Message-ID: <19980511165629.B17830@die.com>


On Mon, May 11, 1998 at 10:50:17AM -0400, Sunder wrote:
> Dave Emery wrote:
> 
> >         This is not that uncommon.   We implemented such a backdoor in a
> > router I worked on the design of some years ago.   The magic password
> > was a function of the model and serial number of the machine (not as I
> > remember a very strong hash either), and different for all boxes.  We
> > (or rather the marketing and support people) felt that leaving a
> > customer who forgot his password with no option but reset the router to
> > its factory defaults was more undesirable than providing a potential
> > attack point for  sophisticated hackers and spooks 
> 
> This is still unexcusable.  It would have been just as simple to include a
> hidden reset switch in a pannel somewhere that would zap all the passwords
> on the router without zapping the config, and maybe send some alarms out
> via SNMP incase it wasn't something that was wanted.

	It took a great deal of earnest debate to get any kind of reset
switch implemented at all - they cost some amount of money and room in
the box, and there were those who held that having a switch there could
invite nervous diddlers to reset the machine causing a crash.   So having
several was harder to sell.  We eventually settled on two, one which would
reset to defaults when pressed at the same time as the other which simply
rebooted.   The need to reset a box whose configuration was terminally 
screwed up to factory defaults was acutely felt by the support people, 
who had to pay a lot to swap out or service onsite a box that someone had
misconfigured so it wouldn't talk to its serial ports (which was
unfortunately possible).

	I don't think those of us who were not happy with the backdoor
would have been much happier with a switch that just magicly reset
passwords, since that would have allowed someone with a moments
unguarded physical access to the box in a wiring closet somewhere to get
in (perhaps hours later from a safe haven via the network) without
necessarily causing a  disruption that might be noticed and investigated
(and not everyone back then had reliable SNMP management and alarms
running).  The solution we chose forced someone with that kind of
transient physical accesss to completely take the machine off line for
minutes or hours while restoring the configuration which was much
likelier to be observed (and required the intruder know the old
configuration in the first place).  We felt this made our reset switches
less of a hazard from 30 second quicky attacks - attacks much easier
to pull off than having enough time connected to the box on a terminal
or laptop to restore the old configuration. 

> 
> 
> >         I suspect that a large fraction of alarms, security systems,
> > pbxs and the like incorperate such backdoors for precisely the same
> > kinds of reasons - it is simply too catastrophic to reset everything
> > if someone forgets the password.   I know several commercial Unixes
> > had such backdoors in them for emergency access years ago, and wouldn't
> > be overwhelmingly surprised if some current OS's still have magic backdoors.
> 
> That doesn't mean that the ankle biters won't find them.  For example, I could
> put a sniffer on the network coming into the router and call up tech support
> and say "Hi" I lost my password, here's my IP address, help, help.
> 
	No doubt.   Generally there was some minimal effort to ensure
that the person calling tech support was legit (callbacks, lists of
contact names and so forth) but there is probably little doubt that a
clever social engineer could perhaps have gotten a box password that
way - although there would certainly have been a trail left that could
have been followed.   For the paraniod we encouraged use of dial up
modems on the console port rather than network access.


> I can then do the same thing a week later with the same router incase the
> hash is time dependant, and then later with another router with a different
> serial number, and I'll have much info to get started on how your hash works.
> 
> Piece of cake.
> 
	Calling up for emergency help with lost passwords was
fortunately not a very common occurance, and generally was noted and
investigated. While our hash wasn't wonderful, I don't think it would
have been easy to obtain enough password/router pairs by calling tech
support to break it that way.  Would have been much easier to obtain a box
and disassemble the code.   And that would have left no trail.


-- 
	Dave Emery N1PRE,  die at die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18






From toto at sk.sympatico.ca  Sun May 10 23:20:47 1998
From: toto at sk.sympatico.ca (Toto)
Date: Mon, 11 May 1998 14:20:47 +0800
Subject: [Fwd: A.Word.A.Day--hieroglyphic]A.Word.A.Day--hieroglyphic
Message-ID: <35569417.4972@sk.sympatico.ca>

An embedded message was scrubbed...
From: unknown sender
Subject: no subject
Date: no date
Size: 1707
URL: 

From billp at nmol.com  Mon May 11 14:21:34 1998
From: billp at nmol.com (bill payne)
Date: Mon, 11 May 1998 14:21:34 -0700 (PDT)
Subject: David Felton
Message-ID: <355760D6.1E52@nmol.com>


Monday 5/11/98 1:37 PM

John Young
J Orlin Grabbe

Judge Leroy Hansen has ordered Morales to court [with court reporter] to
answer and probably be sanctioned for taking the 5th on his deposition.

Morales outlined what he planned to do at lunch.

Today I got a CONFIDENTIAL envelope from EEOC Inspector General�s
office in Washington.  No doubt a response to my Privacy Act violation
complaint.

Several years ago a Department of Interior whistleblower gave me number
of
book references.  One was a book written by Felton during the Vietnam
era.

Felton�s book is only available from the University of New Mexico main
Zimmerman library.

The book was usually checked out when I phoned to ask if it was
available.

The �black hole� of government we are encountering in the Court system
and
through administrative appeals prompted me to look up a word.

Here is a dictionary definition.

  a political and economic movement, strongly nationalistic, magnifying
the rights
  of the state as opposed to those of the individual, in which industry,
though
  remaining largely under private ownership, and all administrative
political units, 
  are controlled by a strong central government.

When I asked the librarian about Felton�s book, the response was usually

	You mean, The Rise of Acid Fascism in America.

I responded, yes.

Full title of Felton�s book is seen at 

 
http://www.amazon.com/exec/obidos/quicksearch-query/002-2147604-1106833

I guess what we are seeing with the �black hole� of the court system and
federal government 
with respect to my Privacy Act violation complaint, the WRITTEN felony
perjury complaint on Sandia lawyer Gregory Cone, the dockets we COULD
not get BEFORE

  http://www.jya.com/whp-10usca.htm 

is that while United States of America is only a democracy in name, 

The US is, in fact, operated as a fascist state by bureaucrats.  

Who go totally insane about the subject of cryptography.
  
Citizens should do something about this.  

Some are. http://www.aci.net/kalliste/ 
          http://www.jya.com/crypto.htm
          http://www.us.net/softwar/
          http://www.antionline.com/
          http://jya.com/whpfiles.htm

Later
bill







From nobody at REPLAY.COM  Tue May 12 06:08:02 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 12 May 1998 06:08:02 -0700 (PDT)
Subject: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805121307.PAA21528@basement.replay.com>


Steve Crisp  wrote:

> Hate to tell you this, bucko, but he in no longer listed in the registry
> since Gary is not a convicted sex offender and therefore not subject to
> NC registration.

Now explain how whining to have Gary Lee Burnore's entry removed from the
NC registered sex offenders website makes the underlying offense go away?
I'm sure the victim feels better, right?  And Gary's neighbors can now rest
easier knowing that the sex offender in their neighborhood is no longer
registered.

Sorry, but removing the entry does not alter the fact that Gary Lee Burnore
is still a convicted sex offender -- just an unregistered one.

> Now, why don't you come out of hiding so we can track you down and beat
                                                                     ^^^^
> the living fuck out of you?
     
I hate to tell you this, little Burnorian groupie, but you misspelled
"suck".  And who is this "we" you speak of?  The management of Page Planet?
What are you going to do?  Put on your white sheets and burn a cross on
my lawn?

It's people like you and Gary Burnore who threaten and harass people who
say things you don't like that make anonymous remailers necessary.
Otherwise only loudmouth bullies like you would have any freedom of speech.
Thank you for proving that point with your threatening post.

   PagePlanet (PAGEPLANET-DOM)
   3252 Octavia Street
   Raleigh, NC 27606
   US

   Domain Name: PAGEPLANET.COM

   Administrative Contact:
      Crisp, Steve  (SC2795)  crisp at PAGEPLANET.COM
      919-852-5262 (FAX) 919-233-0816
   Technical Contact, Zone Contact:
      Sullivan, Mikey  (MS5652)  mikey at PAGEPLANET.COM
      919-852-5262 (FAX) 919-852-5261
   Billing Contact:
      Crisp, Valerie  (VC370)  valerie at PAGEPLANET.COM
      919-233-6602 (FAX) 919-852-5261






From toto at sk.sympatico.ca  Tue May 12 11:54:30 1998
From: toto at sk.sympatico.ca (Toto)
Date: Tue, 12 May 1998 11:54:30 -0700 (PDT)
Subject: Clinton's NWO
Message-ID: <355897EF.CB6@sk.sympatico.ca>


Clinton just had to announce Global Law while I was reading:
http://www.nebonet.com/headhome/dadmisc/trojan.htm

I suspect Clinton's speech in regard to nations co-operating in 
making their citizens subject to deportation to face charges in
foreign countries was designed to keep me from fleeing my 
'Dog At Large' charges in Bienfait.
Seiing as how the Queen's Gestapo was wearing Keblar when they
upped the ante for charge to four years in prison, I guess I must
be a desperate ASCII character.

Toto






From announce at zdnetmail.com  Tue May 12 12:31:26 1998
From: announce at zdnetmail.com (announce at zdnetmail.com)
Date: Tue, 12 May 1998 12:31:26 -0700 (PDT)
Subject: Announcing  ZDNet Mail !!
Message-ID: <199805121931.MAA11036@toad.com>


Announcing ZDNet Mail - the best free email on the Web!

ZDNet is pleased to announce the launch of ZDNet Mail, the
best free email on the Web.  Because you're a valued
member of the ZDNet community,  we're providing you with
a free, secure,  email account, that you can access from any
Internet connection, anytime or anywhere.

As a current ZDNet member, your email account is already
set up -- you can start using it today! Just log on to ZDNet Mail at:

http://www.zdnetmail.com

and enter your current ZDNet user name and password
as shown below:

User Name: cypherpunks
Password: cypherpunks

and you'll find a Welcome letter with all the information you'll
need to take start using your new account. ZDNet Mail gives you
easy access, security, and a permanent address (even if
you change ISPs). It's everything you need in an email account
and it's all provided free of charge. Just click below to
get started!

http://www.zdnetmail.com


The ZDNet Mail Team





From StanSqncrs at aol.com  Tue May 12 12:56:57 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Tue, 12 May 1998 12:56:57 -0700 (PDT)
Subject: Nobody's Home!
Message-ID: <6122829a.3558a938@aol.com>


I got only 1 anon. comment worth responding to -
=====
Subj:	 
Date:	5/12/98 2:41:44 PM Central Daylight Time
From:	nobody at nsm.htp.org
To:	stansqncrs at aol.com

"A cultist is one who has a strong belief in the Bible and the Second
Coming of Christ; who frequently attends Bible studies; who has a high
level of financial giving to a Christian cause; who home schools for
their children; who has accumulated survival foods and has a strong
belief in the Second Amendment; and who distrusts big government.  Any
of these may qualify [a person as a cultist] but certainly more than one
[of these] would cause us to look at this person as a threat, and his
family as being in a risk situation that qualified for government
interference."
-Attorney General Janet Reno, Interview on 60 Minutes, June 26, 1994
=====
"One man's religion is another man's cult" - me

Stan,
The 'Wall of Reality'
http/members.aol.com/RealityWal/





From rp at rpini.com  Tue May 12 13:07:43 1998
From: rp at rpini.com (Remo Pini)
Date: Tue, 12 May 1998 13:07:43 -0700 (PDT)
Subject: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To: 
Message-ID: <199805121909.VAA31944@linux.rpini.com>


To my knowledge (and the rather credible statements of several 3Com
representatives), there are:

No undocumented accesses to SS 1000, 1100, 3000,3300.
There is one documented access to the CB7000, but that can easily be
removed (i.e. -> login in with the magic username and change the password).
We did that at our site, as we never ever forgot a password to our
equipment (yet).

So, what's the hype, the "backdoor" is only for clueless users, not serious
companies with a security policy.
-----------------------------------------------------
Fatum favet volenti. (anon)
-----------------------------------------------------
Remo Pini������������������������ T: +41� 1 350 28 88
Pini Computer Trading������������ N: +41 79 216 15 51

http://www.rpini.com/������������ Email: rp at rpini.com
----------------------------------------------------- 





From movits at syndata.com  Tue May 12 13:14:04 1998
From: movits at syndata.com (Mordechai Ovits)
Date: Tue, 12 May 1998 13:14:04 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To: 
Message-ID: <3558ACB7.678309E7@syndata.com>


Ryan Anderson wrote:

> Note that any of the 2^n plaintexts cna be reconstructed from the
> following sequence of triples.  (Assuming no knowledge of the MAC.  The
> attacker has no idea which of each pair of triples related to each
> sequence is correct, so he must search every possibility, which turns  out
> to be each of the 2^n plaintexts.)

OK, but to be technically correct, you arent *transmitting* all 2^n
possibilities.  That would be like saying that when you blowfish encrypt a
64-bit block and send it, you are sending all 2^64 plaintext, because given
all 2^128 possible keys you will cover the entire "plaintext-space".  while
it is crucial to make sure that you leave the possible decryptions
exponential, you are not transmitting all possible plaintests. That would
be .... uhhh... bad.
-- 
o Mordy Ovits
o Programmer / Cryptographer
o SynData Technologies Inc.
o Download A Free Copy Of Our Software At:
o http://www.syncrypt.com





From ptrei at securitydynamics.com  Tue May 12 14:15:24 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Tue, 12 May 1998 14:15:24 -0700 (PDT)
Subject: FW: "... would cause us to look at this person as a threat"
Message-ID: 


The earliest online citation I can find is in the  May 1997 Newsletter of
the 
Melbourne Seventh-day Adventist Church, at 

http://www.spacey.net/bwillard/News0597.html 

Considering it's content, I have no doubt that it is manufactured - it
carefully written to offend millenialist Christians, such as the SDAs.
I've written the page owner to see if I can find out more.

Deja News shows this quote first in alt.war.civil.usa, on March 18 1998.
Since then, it's been banging around various Christian and political
groups. 

It also seems to be on the website 
http://www.sightings.com/political/renowords.htm, but I have not
confirmed this, nor can I tell if this cites an earlier source.

Peter Trei

> -----Original Message-----
> From:	Tim May [SMTP:tcmay at got.net]
> Sent:	Tuesday, May 12, 1998 2:45 PM
> To:	cypherpunks at cyberpass.net
> Subject:	"... would cause us to look at this person as a threat"
> 
> 
> 
> I just saw this on one of the newsgroups:
> 
> 
> "A cultist is one who has a strong belief in the Bible and the Second
> Coming of Christ; who frequently attends Bible studies; who has a high
> level of financial giving to a Christian cause; who home schools for
> their children; who has accumulated survival foods and has a strong
> belief in the Second Amendment; and who distrusts big government.  Any
> of these may qualify [a person as a cultist] but certainly more than one
> [of these] would cause us to look at this person as a threat, and his
> family as being in a risk situation that qualified for government
> interference."
> -Attorney General Janet Reno, Interview on 60 Minutes, June 26, 1994
> 





From banisar at epic.org  Tue May 12 14:57:39 1998
From: banisar at epic.org (David Banisar)
Date: Tue, 12 May 1998 14:57:39 -0700 (PDT)
Subject: EPIC Analysis of E-Privacy Act
Message-ID: 


====================================================================

            EPIC Preliminary Analysis of E-PRIVACY Act
                           May 12, 1998
                          Washington, DC


Senators John Ashcroft (R-MO) and Patrick Leahy (D-VT) today
introduced the "Encryption Protects the Rights of Individuals from
Violation and Abuse in Cyberspace (E-PRIVACY) Act."  The proposed
legislation is the latest in a series of congressional measures
designed to resolve the debate surrounding current U.S. encryption
policy.  Like the SAFE Act (H.R. 695) now pending in the House,
the E-PRIVACY Act seeks to relax existing controls on the export
of encryption products.  Controls would be lifted for encryption
products that are deemed to be "generally available" within the
international market.  Exporters would be given new procedural
rights to obtain expedited determinations on the exportability of
their products.

The bill also contains several provisions that would preserve the
right of Americans to use encryption techniques and that would
enhance the privacy protections currently accorded to personal
communications and stored data.  Among its positive features, the
bill:

* Reiterates the right of Americans to use, develop, manufacture,
sell, distribute, or import any encryption product, regardless of
the algorithm selected, key length, or the existence of key
recovery capabilities;

* Prohibits government-compelled key escrow or key recovery;

* Prohibits government agencies from creating any linkage between
cryptographic methods used for authentication and those used for
confidentiality;

* Prohibits the federal government from purchasing key recovery
encryption systems that are not interoperable with other
commercial encryption products; and

* Provides enhanced privacy protections for stored electronic data
held by third parties, location information generated by wireless
communications services, and transactional information obtained
from pen registers and trap and trace devices;

The bill contains two provisions that raise significant civil
liberties and privacy concerns.

The Criminalization Provision

The bill would make the use of encryption to conceal
"incriminating" communications or information during the
commission of a crime a new and independent criminal offense.

While well-intended, the provision could have several unintended
consequences that would easily undermine the other desirable
features of the bill.

We believe it is a mistake to create criminal penalties for the
use of a particular technique or device. Such a provision tends to
draw attention away from the underlying criminal act and casts a
shadow over a valuable technology that should not be criminalized.
It may, for instance, be the case that a typewritten ransom note
poses a more difficult challenge for forensic investigators than a
handwritten note. But it would be a mistake to criminalize the use
of a typewriter simply because it could make it more difficult to
investigate crime in some circumstances.

Additionally, a provision which criminalizes the use of
encryption, even in furtherance of a crime, would give prosecutors
wide latitude to investigate activity where the only indicia of
criminal conduct may be the mere presence of encrypted data. In
the digital age, where techniques to protect privacy and security
will be widely deployed, we cannot afford to view encryption as
the potential instrumentality of a crime, just as we would not
today view the use of a typewriter with suspicion.

Finally, the provision could also operate as a substantial
disincentive to the widespread adoption of strong encryption
techniques in the communications infrastructure. Given that the
availability of strong encryption is one of the best ways to
reduce the risk of crime and to promote public safety, the
retention of this provision in the legislation will send a mixed
message to users and businesses -- that we want people to be free
to use encryption but will be suspicious when it is used.

If the concern is that encryption techniques may be used to
obstruct access to evidence relevant to criminal investigations,
we submit that the better approach may be to rely on other
provisions in the federal and state criminal codes (including
sections relating to obstruction of justice or concealment) to
address this problem if it arises.

The "NET Center"

The bill creates within the Department of Justice a National
Electronic Technology Center (NET Center) to "serve as a center
for . . . law enforcement authorities for information and
assistance regarding decryption and other access requirements."

The NET Center would have a broad mandate and could spawn a new
domestic surveillance bureaucracy within the Department of
Justice.  Among other powers, the bill authorizes the NET Center
to:

* Examine encryption techniques and methods to facilitate the
ability of law enforcement to gain efficient access to plaintext
of communications and electronic information;

* Conduct research to develop efficient methods, and improve the
efficiency of existing methods, of accessing plaintext of
communications and electronic information;

* Investigate and research new and emerging techniques and
technologies to facilitate access to communications and electronic
information; and

* Obtain information regarding the most current hardware,
software, telecommunications, and other capabilities to understand
how to access digitized information transmitted across networks.

The mission of the NET Center is made more troubling by the bill's
authorization of "assistance" from other federal agencies,
including the detailing of personnel to the new entity.  In light
of the fact that existing federal expertise in the areas of
electronic surveillance and decryption resides at the National
Security Agency (NSA), the bill in effect authorizes unprecedented
NSA involvement in domestic law enforcement activities.  Such a
result would be contrary to a half-century-old consensus that
intelligence agencies must be strictly constrained from engaging
in domestic "police functions."

That consensus arose from the recognition that intelligence
agencies created to operate abroad are ill-suited for domestic
activities, where U.S. citizens enjoy constitutional protections
against governmental intrusions.  In 1975, Sen. Frank Church led a
congressional investigation into the activities of NSA.  He noted
that Congress had a "particular obligation to examine the NSA, in
light of its tremendous potential for abuse. ... The danger lies
in the ability of NSA to turn its awesome technology against
domestic communications."

In 1987, Congress enacted the Computer Security Act, which sought
to vest civilian computer security authority in the Commerce
Department and to limit the domestic role of NSA.  The House
Report on the Computer Security Act cited congressional concern
over a Reagan Administration directive that "gave NSA the
authority to use its considerable foreign intelligence expertise
within this country."  The report noted that such authority was
"particularly troubling" since NSA "has, on occasion, improperly
targeted American citizens for surveillance."

The NET Center proposal, if approved, would constitute a
fundamental re-definition of the relationship between intelligence
agencies and domestic law enforcement.  Such an approach would
ignore 50 years of experience and would pose a serious threat to
the privacy and constitutional rights of Americans.

EPIC looks forward to working with the legislation's sponsors and
other interested parties to address these issues and develop a
national encryption policy that will ensure the widespread
availability of robust encryption products and the preservation of
constitutional rights.  Such a result will be critical for both
our nation's continued leadership of the information industry and
the protection of personal privacy in the next century.







From josh at josh1.weboneinc.com  Tue May 12 15:18:27 1998
From: josh at josh1.weboneinc.com (Josh Schoof)
Date: Tue, 12 May 1998 15:18:27 -0700 (PDT)
Subject: No Subject
Message-ID: <199805122218.SAA26006@josh1.weboneinc.com>


FROM: aj at gaymen.com
SUBJECT: Gay Site

	I just wanted to let you know that GayTV And GayMen.Com have 
	webmaster referral programs that pay you  for every person 
	that signs-up for either site.

	You can signup online and start making money now:)

	Check out our webmaster pages for all the details - you can signup 
	for both sites and make double the money.

	GayTV:      http://www.aj1.com/gaytv/webmasters
	GayMen.Com:    http://www.gaymen.com/webmasters
	
	Thanks,
	
		AJ
		GayMen.com
		aj at gaymen.com





From StanSqncrs at aol.com  Tue May 12 15:58:15 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Tue, 12 May 1998 15:58:15 -0700 (PDT)
Subject: "... would cause us to look at this person as a threat"
Message-ID: <23d07d72.3558d3d9@aol.com>


In a message dated 5/12/98 4:37:47 PM Central Daylight Time,
ptrei at securitydynamics.com writes:

<< ... Considering it's content, I have no doubt that it is manufactured - it
 carefully written to offend millenialist Christians, such as the SDAs.
 I've written the page owner to see if I can find out more. ... >>

Not only that, it seems to be "spam" (the repetitive list type).  You see 2
days ago we welcomed a guest to my list (FreeGroup), and in his first batch,
guess what was there.  Another FreeGroupie had a great response to it, I
include it -
=====
... writes:

> Well howdy 'yall, i'm mighty proud to have someone to chat wdith and share
>  ideas and some news, both good and bad.
>  here's some bad news to start off the day
>  
>  RE: Janet Reno, Attorney General of these United States of America
>  
>  Subject: Janet Reno Quote
>  > Date: Wednesday, May 06, 1998 10:54
>  > 
>  > A friend sent me this...sure would like to see the interview in context,
>  > but at any rate a very scary statement.
>  > 
>  > Subject: Cults and Government? 
>  > 
>  > "Just ran across this quote from AG Janet Reno. From a person of such
>  > high power, these are scary words. --------- "
 


>  > "-Attorney General Janet Reno, Interview on 60 Minutes, June 26,
>  > 1994"
>  > 

Bad *NEWS*???  This purports to be an item that's nearly 4 years old.  What's
the news?  I guess the news is that we're getting this 3rd hand--at a minimum,
with no idea if it's true or not.  But hey!  This is the internet.  So, again,
I ask, *NEWS*????

Bad beginning, Sir Will.  The willingness to pass along material of dubious
authenticity is not a good sign in my book. As Mr. Natural would say, "Check
your source."  So, what *IS* your source?
=====
Thanks for your excellent research on the origins of that, Peter!

Stan,
FreeGroup - "Just Say It!"
http://members.aol.com/WhtsAMetaU/freegroup.html





From mkwan at preston.net  Tue May 12 16:42:35 1998
From: mkwan at preston.net (Matthew Kwan)
Date: Tue, 12 May 1998 16:42:35 -0700 (PDT)
Subject: Bitslice DES S-boxes
Message-ID: <199805122341.JAA18008@preston-gw.preston.net>


After 6 weeks of number crunching, I've finally produced a new set of
bitslice DES S-boxes using non-standard logic gates.

Numbers are as follows -

	S1  S2  S3  S4  S5  S6  S7  S8   Avg
	56  50  53  39  56  53  51  50   51

Details at http://www.cs.mu.oz.au/~mkwan/bitslice

There won't be any more improvements in the foreseeable future, since
I've run out of ideas.

Feel free to use this code in the RSA DES II challenge, but remember to
give credit where it's due.


mkwan





From mrosen at peganet.com  Tue May 12 17:21:50 1998
From: mrosen at peganet.com (Mark Rosen)
Date: Tue, 12 May 1998 17:21:50 -0700 (PDT)
Subject: Chaffing and winnowing
Message-ID: <01bd7e04$5802a820$014ce9c7@markdsk.peganet.com>


    I have just been notified that chaffing and winnowing does, indeed,
violate the export regulations. You can read them for yourself at
http://www.bxa.doc.gov/Encryption/encreg.htm, but here are a few parts


a. Designed or modified to use ``cryptography'' employing digital techniques
to ensure ``information security'';
b. Designed or modified to perform cryptanalytic functions;
c. Designed or modified to use ``cryptography'' employing analog techniques
to ensure ``information security'';
...
Note: 5A002 does not control the following:
b. Equipment containing ``fixed'' data compression or coding techniques;
...
g. Data authentication equipment that calculates a Message
Authentication Code (MAC) or similar result to ensure no alteration of
text has taken place, or to authenticate users, but does not allow for
encryption of data, text or other media other than that needed for the
authentication;

    So it seems 5A002.a  and 5A002.g cover such encryption technologies as
chaffing and winnowing. Interestingly enough, 5A002.b allows such functions
as the package transform (keyless coding), even though it uses encryption
algorithms.


- Mark Rosen
http://www.mach5.com/







From nobody at REPLAY.COM  Tue May 12 18:37:11 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 12 May 1998 18:37:11 -0700 (PDT)
Subject: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805130137.DAA03874@basement.replay.com>


wmcclatc at primenet.com (William J. McClatchie)

> X-Comment: Aw, are you offended?  
> X-no-archive: yes  
 
> [anonymous makes illegal usage of information, as defined by the state he
> got the info from, and then whines] 

And your legal basis for calling the posting of public information from a
public website to usenet "illegal usage" is ???  Presumably if the state
had wanted to keep the info secret, they wouldn't have made it public
available.

The only whining I've seen has been by Gary Burnore who complained that the
state of North Carolina failed to keep his conviction as a sex offender a
secret, and by various DataBasix sock puppets and groupies.

Burnore did the crime, he was convicted, he registered as a sex offender
with the state of NC, the information was made publicly available by the
state, and people found out as they were intended to.  Deal with it!

Maybe you ought to learn a little about remailers before you make such
ridiculous claims, McClatchie.  If I'm the person you say "whined", then
I'm *NOT* the same person who posted the information that Gary whined
about.  Sorry to burst Gary's bubble that all posts which poor little Gary
Burnore doesn't like originate from his one mythical "Anon Asshole ".
In fact, the information is just as likely to have been posted anonymously
by YOU as by me.

> >It's people like you and Gary Burnore who threaten and harass people who
> >say things you don't like that make anonymous remailers necessary.
> 
> >And it is assholes like you who ABUSE remailers that make them go away.  

Let me get this straight...  Someone threatens a remailer user with
physical violence, I comment on it, and now I'm "abusing a remailer" just
because you don't like what I have to say?  Don't you think that's for the
remailer operator to decide?  Do you operate a remailer, McClatchie?





From bill.stewart at pobox.com  Tue May 12 19:08:50 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Tue, 12 May 1998 19:08:50 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <3.0.5.32.19980512180231.008ae790@popd.ix.netcom.com>


By the way, instead of transmitting the first bit for which
MAC(sequence,0) differs from MAC(sequence,1), as Jes�s suggests,
you can get the same effect by transmitting a 0 or 1 depending on
    MAC(sequence,0) < MAC(sequence,1)
(This assumes a big-endian system and unsigned comparisons;
little-endians will have to calculate it the hard way.)  
If you're willing to be wrong 1 time out of 2**33, 
you can just use the top 32 bits.

Earlier in this discussion:
>> In the Rivest's paper you transmit, indeed, all the 2^n plaintexts for a
>> n bit length };-).
>Not so. In his paper (before the package tranform stuff), he had the following expansion.
>Assuming a 32 bit serial number and a 160 bit MAC, n bits would expand to 388n.
>>To make this clearer with an example, note that the adversary 
>>will see triples of the form:
>>        (1,0,351216)
>>        (1,1,895634)
>>        (2,0,452412)
>>        (2,1,534981)

But that _does send the 2^n plaintexts, which are 0 and 1, and n=1.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From jim at smallworks.com  Wed May 13 00:48:08 1998
From: jim at smallworks.com (Jim Thompson)
Date: Wed, 13 May 1998 00:48:08 -0700 (PDT)
Subject: [rivest@theory.lcs.mit.edu: Chaffing question]
Message-ID: <199805130747.CAA18984@hosaka.smallworks.com>



With all of the discussion of C&W, and potential expansion, along with
a sideband discussion of same, I decided to ask 'the man' himself.

The '10K email file' used in the example came from the sideband discussion.

Forwarded for your edification.

 ------- Start of forwarded message -------
 Date: Tue, 12 May 1998 18:24:46 -0400
 From: Ron Rivest 
 Subject: Chaffing question

 Suppose you can start with a 10KB email file.

 Running a package (all-or-nothing) transform on it adds only a small
 amount to the length---say 128 bits total, or less (basically the length
 of a key in your favorite algorithm).

 You can break the result into 128 one-bit blocks and one 10KB block.  MAC
 each block.

 Add 128 bits of chaff, intermingled with the first 128 blocks from above.

 The final result has 128+128+1 packets, and total length 10KB (the
 original email) + 257*64 bits (for the 257 64-bit MAC values) plus 128
 bits (the chaff bits), and assuming that the sequence numbers are
 implicit rather than explicit, you get a total of around 12.3 KB.  

	 Cheers,
	 Ron

 ------- End of forwarded message -------

-- 
Jim Thompson / Smallworks, Inc. / jim at smallworks.com  
      512 338 0619 phone / 512 338 0625 fax
Real, cheap Hardware RNG:  http://www.fringeware.com/nscd/







From eridani at databasix.com  Wed May 13 01:18:03 1998
From: eridani at databasix.com (Belinda)
Date: Wed, 13 May 1998 01:18:03 -0700 (PDT)
Subject: Abusive crossposting by anonymous remailer user (Was: Gary L. Burnore blah blah blah)
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805130820.EAA18605@databasix.com>


In article <199805130137.DAA03874 at basement.replay.com>,
nobody at REPLAY.COM (Anonymous)  wrote:

[who cares what he wrote]

Where's the idiot who was ranting about kooks who crosspost threads
everywhere and called -me- a Usenet abuser?  Take a look at the
references in this one:

References: <199805101850.LAA00114 at sirius.infonex.com>
<3555FA78.7795 at pageplanet.com>
<199805121307.PAA21528 at basement.replay.com>
<6ja344$i2h at nntp02.primenet.com>


<199805101850.LAA00114 at sirius.infonex.com>
 posted to triangle.general only

<3555FA78.7795 at pageplanet.com>
 posted to triangle.general only

<199805121307.PAA21528 at basement.replay.com>
posted to:  alt.fan.gburnore,triangle.general,alt.vigilantes,
alt.netcom.emeritus,alt.cypherpunks,news.admin.censorship,
alt.privacy,alt.privacy.anon-server,misc.kids


And there we have it, folks.  The anonymous stalker who's spent the past
year following Gary Burnore around Usenet found a post in
triangle.general that mentioned him, added a propaganda-filled follow up
to it, and posted it to 9 newsgroups--many of whom have repeatedly
requested that this crap be kept out of said groups.

Oh and lookee what else:  it was mailed to cypherpunks at toad.com,
presumably for archival on the cypherpunks mailing list, where it will
be picked up by WWW search engines.  Since those folks don't seem to
mind having their archives used in personal grudge matches, I'll just
start cc'ing my responses there as well.  I'm sure, as champions of free
speech, they can understand the necessity of making sure both sides of
the story get equal time.

--

Belinda
















From nobody at REPLAY.COM  Wed May 13 06:11:15 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 13 May 1998 06:11:15 -0700 (PDT)
Subject: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC)
In-Reply-To: <3555FA78.7795@pageplanet.com>
Message-ID: <199805131311.PAA05504@basement.replay.com>


eridani at databasix.com (Belinda Bryan) wrote:

> And there we have it, folks.  The anonymous stalker who's spent the past
> year following Gary Burnore around Usenet found a post in
> triangle.general that mentioned him, added a propaganda-filled follow up
> to it, and posted it to 9 newsgroups--many of whom have repeatedly
> requested that this crap be kept out of said groups.

"Anonymous stalker"?  For merely posting a reply to a public post on
Usenet?  What state or country has a statute against that, and what makes
you think the poster falls under its jurisdiction if it does exist?  As for
whether a certain post is "propaganda", that is for the reader to decide,
especially when of the content is independently verifiable.  The
"propaganda" you refer to was apparently intended to refute the fallacious
assertion that since Gary Lee Burnore's entry in the North Carolina
official database of registered sex offenders had apparently been removed,
then the underlying crime for which he was convicted and required to
register somehow automagically never happened.  To make such an assertion
is to invite rebuttal.

The thread you're whining about involved Steve Crisp 
threatening an anonymous poster with "beating the living fuck out of you"
if his/her identity could be determined, a second anonymous poster
challenging the propriety of such a threat, and yet another DataBasix
groupie, William McClatchie , calling the second
anonymous poster a "remailer abuser" for daring to make such a challenge.
So rather than denouncing the threat itself, you choose to call the person
challenging it an "anonymous stalker"?  If you feel no need to "hide"
anything, please feel free to post your street address and home phone
number.  But I imagine that many people with small children would not want
their names, from which their street address can be derived by someone with
the resources available to you and Gary Burnore, to fall into the hands of
a convicted child molester with a history of abusive retaliation.

Being threatened with physical violence for making an unpopular post is
one of the best arguments available as to why anonymity is necessary when
people like Steve Crisp and convicted child molester Gary Lee Burnore are
running around loose making those threats.

> Oh and lookee what else:  it was mailed to cypherpunks at toad.com,
> presumably for archival on the cypherpunks mailing list, where it will
> be picked up by WWW search engines.  Since those folks don't seem to
> mind having their archives used in personal grudge matches, I'll just
> start cc'ing my responses there as well.  I'm sure, as champions of free
> speech, they can understand the necessity of making sure both sides of
> the story get equal time.
 
This, of course, comes from the same Belinda Bryan who impersonated a
lawyer for DataBasix to demand the disclosure of (fortunately non-existant)
user logs from the Huge Cajones remailer in a failed Scientology-esque
attempt to embarass its users.  And that attack, BTW, started because Gary
Burnore was pissed that an anonymous whistle blower used a remailer to tip
of his victim's mother to the molestation.  As is typical of his style,
Burnore denounced that legitimate use of anonymity as "harassment" and
"abuse".  

It was also Burnore who chose to make PUBLIC what had previously been a
private e-mail, thus inviting his critics to factually evaluate the claims.
One of them apparently did so and discovered Gary Burnore's name and mug
shot were published on an official PUBLIC website of registered sex
offenders maintained by the state of North Carolina where Burnore moved
after leaving San Francisco.  Perhaps he should have learned a lesson from
Gary Hart and not have taunted the wrong people to find evidence of his
wrongdoing.

Will the continual harangue against privacy and anonymity by Gary Lee
Burnore, Belinda Bryan, Billy McClatchie, and other staffers and sock
puppets of the DataBasix wrecking crew never end?

BTW, Belinda, cross-posting your whining drivel in the fashion you're
threatening negates your lame attempts to achieve deniability by using the
infamous X-No-Archive header that has become the trademark of DataBasix'
denizens.  IOW, you won't be able to retroactively claim that an
embarassing post from you was "forged" because it's not archived at an
unbiased, third party site.  Can you say "oops"?





From rzz at rzz.sigov.si  Wed May 13 08:25:06 1998
From: rzz at rzz.sigov.si (rzz at rzz.sigov.si)
Date: Wed, 13 May 1998 08:25:06 -0700 (PDT)
Subject: JUST RELEASED!  10 Million!!!
Message-ID: <011297055501222@g_fantasm.com>



IT WAS JUST RELEASED!!
 
INTRODUCING...MILLIONS VOL. 1A

We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in excess of 100+ million addresses
in one huge file.

We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for  those
that use Stealth programs, clogs up servers quickly with trash, etc.

We then ran a program that contained 1800+ keywords to remove
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
.mil, .org, .gov, etc.   After that list was run against the remaining list,
it  reduced it down to near 10 million addresses!

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
 using the 100+ million that we started with, but a lot less money and
alot less time!!

We also purchased Cyber-Promos ($995.00) CD.  We received it just
prior to finishing production work on the new CD.  We had our people
take a random sample of 300,000 addresses  from the touted 2.9 that
they advertised.   We used a program that allows us to take a random
sample of addresses from any list.  We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom.  We cleaned these, and came up with about
100,000 addresses. These are also mixed in.

We also included a 6+ million "Remove/Flamer" file broke into seperate
files for ease of  extracting and adding to your own database of removes.

 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What others are saying:
 
"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"

Dave Buckley
Houston,  TX

"This list is worth it's weight in gold!!  I sent out 100,000 emails for my
product and received over 55 orders!

Ann Colby
New Orleans, LA

****************************************
 
                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 10 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 5,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
 
PLUS you receive a tremendous REMOVE list!
6 Million+ 

>>> NOW ONLY $150.00!

This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
 
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.


***ADDED BONUS***
All our customers will have access to our updates on the CD volume
they purchase.  That's right, we continually work on our CD.  Who 
knows when those other CDs were made. We're constantly adding 
and deleting addresses, removes. Etc.  It all comes back to quality.  
No one else offers that! 

Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere...PERIOD!

If you have any further questions or to place an order by
phone, please do not hesitate to call us at:

                              908-245-1143

To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax and Mail.
 
 _________________
EZ Order Form
 

 _____Yes! I would like to order MILLIONS Vol. 1A email addresses
for only $150.00.
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-908-245-3119
 
CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-908-245-3119

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-908-245-3119
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.

If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
 
JKP Enterprises
700 Boulevard 
Suite 102
Kenilworth, NJ 07033







From billp at nmol.com  Wed May 13 08:27:52 1998
From: billp at nmol.com (bill payne)
Date: Wed, 13 May 1998 08:27:52 -0700 (PDT)
Subject: Hidden US government
Message-ID: <3559B706.F@nmol.com>


Guys

There is a segment in the US government who do whatever they want.

Like stinging Iran.

The segment thinks that they are unaccountable.

We want to change this.

And get our money too!


Wednesday 5/13/98 7:40 AM

Lawyers and netizens

Morales and my last Friday filing seen at
http://www.jya.com/whp050898.htm

is causing comments at http://www.jya.com/mf050998.htm and elsewhere.

One of my neighbors, Bill Moe, is a retired AF officer and now an APD
cop.

Moe commented that no lawyer would ever write a document like the one
we FILED.

Morales is ready to go to the Supreme Court on this case for the reasons
of
Campos dismissing DIR NSA Minihan.

Morales feels that this decision make no one in a federal agency
accountable..

We will also probably have to appeal the dismissal of Morales too.  Bad
precedent.

Now that we have copies of the docket sheets seen at
http://www.jya.com/whp-10usca.htm
we must study them.

We will do this at noon today.

Then we will begin the process of filing criminal complaint affidavits
on Tenth
circuit judges and judge Joseph Weis, of the Third circuit.

Dolores K. Sloviter
Chief Judge, Third Circuit
18614 U.S. Courthouse 
Philadelphia, PA 19106
215-597-1588

also EARNED a criminal complaint affidavit along with clerks Bradford
Baldus
and Toby Slawsky.

Slawsky earned another for sending US Marshals Lester and Lopez to
investigate me,
with no letter of authorization, for �inappropriate communications.�

The matter of Campos� in camera ex parte meeting with NSA is also
causing CONCERN.
http://www.jya.com/whp043098.htm

NM judge John Conway had an ex parte in camera meeting with Sandia/NSA
high tech 
terrorist James Gosler in 1992 in my ADEA lawsuit.

Conway then sealed all of my lawsuit court records and halted discovery.

Then there was the matter in both my and Morales lawsuits of  material
showing up in the
final district decisions which was not in pleadings.

A district federal court spy gave us information that Sandia wrote the
decision for, in 
Morales case, judge Galvan and my case, John Conway.

These actions by judges and court clerks largely prompted Morales and my
genocide 
and crypto incompetence lawsuit.

We know that the federal courts and the legal system are LARGELY
controlled by the 
US federal government.

This is becoming more obvious to all by those who read
http://www.jya.com/whp043098.htm.

The US Hidden government is in reality a fascist government.

  FASCISM -   a political and economic movement, strongly nationalistic,
magnifying the rights
  of the state as opposed to those of the individual, in which industry,
though  remaining largely 
  under private ownership, and all administrative political units,  are
controlled by a strong central   government.

Since Morales and I have both lost money as a result of actions of a
fascist government, we struck at the heart of the US Hidden government
[aka The Great Satan] with our genocide and crypto incompetence lawsuit.

Representative Cynthia McKinney [CYMCK at mail.house.gov ] and Senator
Grassley [chuck_grassley at grassley.senate.gov] are in possession of the
Swiss Radio International audio tape telling the saga of Hans Buehler�s
arrest in Teheran in 1992 for espionage.

Hopefully those who are concerned can share their concerns about
possible consequences of NOT releasing our requested documents on
Internet.  And, too, encourage settlement of this NSA-caused American
tragedy. http://caq.com/cryptogate 
http://www.aci.net/kalliste/speccoll.htm

Morales and I continue to feel that we should settled this unfortunate
matter before it gets WORSE.

Later
bill







From vpuser at u041.oh.vp.com  Wed May 13 09:23:37 1998
From: vpuser at u041.oh.vp.com (ADMIN-Standard VP login)
Date: Wed, 13 May 1998 09:23:37 -0700 (PDT)
Subject: Question reports on Y2K report
Message-ID: 


Hello,

Has anyone read "The McAlvany Intelligence Advisor" of Febuary 1998?

Title:
The millenium Bug: Global cyber-meltdown in the year 2000 PART 1

Mr McAlvany has a very domesday perspective.  Does his report have
alot of Truth or alot of Hype?

Please don't flame me to hard for my ignorance,  I'm just attempting
to seperate the CHAF from the WHEAT.

Thank you for any guidance
Brian

-- 





From gibreel at pobox.com  Wed May 13 09:43:42 1998
From: gibreel at pobox.com (Stephen Zander)
Date: Wed, 13 May 1998 09:43:42 -0700 (PDT)
Subject: Chaffing and winnowing
In-Reply-To: <01bd7e04$5802a820$014ce9c7@markdsk.peganet.com>
Message-ID: <874syut9ld.fsf@wsuse5.mckesson.com>


>>>>> "Mark" == Mark Rosen  writes:
    Mark> Note: 5A002 does not control the following: b. Equipment
    Mark> containing ``fixed'' data compression or coding techniques;
    Mark> ...  g. Data authentication equipment that calculates a
    Mark> Message Authentication Code (MAC) or similar result to
    Mark> ensure no alteration of text has taken place, or to
    Mark> authenticate users, but does not allow for encryption of
    Mark> data, text or other media other than that needed for the
    Mark> authentication;

But wasn't that the gist of Rivest's paper: he's not encrypting the
message, he's just obscuring it really, really well.

All this needs someone with the cash & the time to push it to court...

-- 
Stephen
---
all coders are created equal; that they are endowed with certain
unalienable rights, of these are beer, net connectivity, and the
pursuit of bugfixes...  - Gregory R Block





From whitelaw at ndirect.co.uk  Wed May 13 10:20:42 1998
From: whitelaw at ndirect.co.uk (whitelaw at ndirect.co.uk)
Date: Wed, 13 May 1998 10:20:42 -0700 (PDT)
Subject: Encryption trends and legal issues
Message-ID: <3559D6C3.DF4EBD3@ndirect.co.uk>


I am looking for information on the legal and export issues on
encryption around the world and the current use of different encryption
algorithms today.

If anyone can send me some information or point me to the appropriate
sites I would be most grateful.


Thanks,

Gavin.






From rah at shipwright.com  Wed May 13 11:00:00 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 13 May 1998 11:00:00 -0700 (PDT)
Subject: Philodox Symposium: Digital Bearer Transaction Settlement
Message-ID: 



--- begin forwarded text


X-Sender: rah at pop.sneaker.net
Mime-Version: 1.0
Date: Wed, 13 May 1998 12:54:33 -0400
To: Digital Bearer Settlement List 
From: Robert Hettinga 
Subject: Philodox Symposium: Digital Bearer Transaction Settlement
Sender: 
Precedence: Bulk
List-Subscribe: 
X-Web-Archive: http://www.philodox.com/dbs-archive/


-----BEGIN PGP SIGNED MESSAGE-----

Announcement Date: May 13, 1998


The Philodox Symposium on Digital Bearer Transaction Settlement
The Downtown Harvard Club
Boston, Massachusetts
July 23-24, 1998

Philodox Financial Technology Evangelism, of Boston, Massachusetts, in
association with the Digital Commerce Society of Boston, announces the
first in a series of symposia, conferences and workshops on the subject of
digital bearer transaction settlement.

The first of these gatherings, a symposium examining the technology,
economics, markets and law of digital bearer settlement, will be held at
the Harvard Club of Boston, Thursday and Friday, July 23 and 24, 1998.


What is Digital Bearer Settlement?

A digital bearer transaction is one where a cryptographically secure
value-object, issued and underwritten by a third party, is exchanged
between the two parties in a trade, typically over a public internetwork.
The object, when passed in trade for something else of value, executes,
clears, and settles the transaction instantaneously, securely, and,
usually, anonymously. And, at considerable savings in transaction cost
compared to "book-entry" transactions, such as credit and debit cards,
checks, and modern securities clearing methods.

It is estimated that $100 billion in transactions are being executed on the
internet annually.  40% of all retail stock trades are now executed from
the net, for instance. If it's possible to properly call a credit card
transaction transmitted under Secure Socket Layer to be settled and cleared
on the net itself, then an estimated maximum of $10 billion of those
transactions, 10%, are actually cleared and settled on the net, with
marginal market share to other transaction protocols. By comparison, $3
trillion in foreign exchange transactions are executed, cleared and settled
every day, using standard book-entry processes.

There are electronic check and debit protocols in experimental development,
but, as transaction settlement time tends towards the instantaneous, the
more cost, security, and non-repudiation advantages there are for digital
bearer settlement.

It is not unreasonable to see how transaction costs can be reduced
enormously by digital bearer settlement, possibly by several orders of
magnitude over any analogous book-entry method. It is completely
conceivable that digital bearer transactions, of all kinds and sizes, from
macrobonds to micropayments, will be executed, cleared, and settled on
ubiquitous global internetworks, and will become the dominant transaction
mechanism over time on those networks, and, by extension, in the global
economy in general.

It may happen sooner than we can imagine. Electronic book-entry settlement
itself is only 40 years old at best, and internet financial cryptography
and digital bearer settlement are much more a phenomenon of collapsing
microprocessor prices than electronic book-entry settlement ever was.


The Philodox Digital Bearer Transaction Settlement Events

Towards that end, Philodox has taken it upon itself to focus the attention
of the information technology, financial and legal communities onto the
technology of digital bearer settlement though the following series of
events. First, this initial Symposium of professionals interested in
digital bearer settlement, to be held in Boston. Then, contingent on
interest, a peer-reviewed Financial Research Conference to be held
during the winter of 1998-99 in Manhattan or Washington, followed by a
small Developer's Conference in the spring of 1999, held in more casual
surroundings, and, finally, a teaching Workshop for Financial Professionals
held in the summer of 1999 at a resort location, probably Bretton Woods, New
Hampshire. It is hoped by Philodox that some, or perhaps, all, of these
events will be recurring ones, and of course, that they will increase in
attendance over time.


The Symposium

Each section of the Symposium agenda will consist of a short presentation
on the topic by the most expert symposium participant on the subject
present, followed by discussions led by a moderator. While it is not
expected that everyone will even be conversant on each topic, it is
expected that participants will bring their own particular expertise to
bear on specific elements of the symposium program, and, of course, not
everyone will have to present something.

We have a lot to teach each other, but, fortunately, most of the people who
are interested enough in this topic to come to this first symposium will
know more than enough to have at least some opinions on the topics under
discussion, and will certainly want to share those opinions with everyone
else.  Finally, there are lots of differing opinions this subject, so
expect some animated discussion.

Because of the expected demand and the size of the Harvard Club space we're
using, participation in the symposium will be limited, and advance
registration will be required. See below for details.


The Symposium Agenda

Agenda

The Philodox Symposium on Digital Bearer Transaction Settlement
The Downtown Harvard Club of Boston
July 23-24, 1998


Thursday, July 23, 1998
(Club Dress Code: jacket and tie, no jeans or sneakers)

0730-0830:  Check-in, Breakfast

0830-0845:  Welcome

0845-1015:  History of Bearer Transaction Settlement

            How old is bearer settlement?
            Why should we think about physical bearer settlement?
            What were the market models for underwriting digital bearer
             instruments?
            What sanctions prevented non-repudiation?
            What happened to physical bearer settlement?
            What is digital bearer settlement?
            How was it invented?
            What is the status of digital bearer settlement now?

1015-1030:  Break

1030-1200:  Digital Bearer Settlement Technology Survey and Forecasts

            What are the different digital bearer settlement protocols?
            How do they work?
            Which ones are on the market today?
            What are some of the technical limits of these protocols?
            Can they be overcome and do they need to be?
            What kinds of technology is in the labs?

1200-1300:  Lunch

1300-1500:  Bearer Settlement Legal/Regulatory Survey and Forecasts

            How did we get transaction regulation in the first place?
            What are the legal restrictions on bearer transactions
             in general?
            What are the laws on strong cryptography?
            How do the above laws and regulations effect the prospects
             for digital bearer settlement?
            What effect will cash-settled, and possibly anonymous,
             digital auction markets have on intellectual property rights?

1500-1515:  Break

1515-1715:  Possible Legal/Regulatory Solutions

            What can be done about bearer settlement law and regulation?
            Are there ways that internet digital bearer settlement can
             coexist with book-entry settlement laws?
            Will the potential cost savings overcome the need to regulate?
            What about intellectual property laws?
            Should there be a legislative/regulatory strategy?
            If so, what would it look like?

1730-1930:  Reception, Cocktails and Hors d'Oeurves


Friday, July 23, 1998
(Dress Code: "business casual", no jeans or sneakers)

0800-0830:  Breakfast

0830-0845:  Announcements

0845-1015:  Internet Transaction Settlement Economic/Financial Survey
             and Forecasts

            What is the annual dollar volume of all transactions worldwide?
            How are they broken up by payment mechanism?
            What is the actual and forecasted dollar volume of internet
             transaction execution?
            How will those transactions clear and settle?
            What are the current clearing and settlement costs?
            What are the expected costs of internet digital bearer
             settlement?
            What is the micro- and macroeconomic impact of a digital bearer
             settled economy?

1015-1030:  Break

1030-1200:  Capital Market Applications for Digital Bearer Settlement

            What kinds of securities can you create digital bearer
             instruments for?
            How do they work?
            How do you vote stock, collect dividends, etc.?
            Can you really do limited liability in software, without law?
            What size transactions can be cleared and settled like this?
            How much transaction volume can a digital bearer market handle?

1200-1300:  Lunch

1300-1430:  Other Market Applications for Digital Bearer Settlement

            Just how ubiquitous can the internet be?
            Can you create cash settled pay-per-use utilities? Even roads?
            Digital bearer gambling tokens? "Digital Collectibles"??
            Lions, and tigers, and bears: "Perfect kidnappings",
             "crypto-anarchy", auction markets for force, geodesic warfare,
             the end of civilization as we know it, and other monsters
             under the bed.

1430-1445:  Break

1445-1630:  New Product/Market Ideas for Digital Bearer Settlement

            Who are the entrepreneurs?
            What else can we do with digital bearer instruments?
            When is the transition to digital bearer settlement
             going to happen?
            Where's the most bang for the buck, right now?
            How are we going to make money on this?

1630-1645:  Closing


Symposium Cost and Registration

The cost for the Philodox Symposium on Digital Bearer Transaction
Settlement is $447, payable by company check or personal money order to
"Philodox", and sent to Robert Hettinga, Philodox Financial Technology
Evangelism, 44 Farquhar Street, Boston, MA, 02131, USA. Massachusetts
residents should add 6% sales tax. Please contact Robert Hettinga
, or  for wire
instructions if it is necessary to make your payment by bank wire.

Include the participant(s) name, shirt size, email address, and company
affliation, if applicable, with your check or money order. Confirmation of
your check and your Symposium seat will be sent by email. If you pay by
wire, please notify Mr. Hettinga by email that you intend to do so, and
include in your email the other requested information.

In order to organize the Symposium properly, payment must be received by
Philodox no later than noon, Thursday, July 9th, 1998. Again, attendance to
the Symposium is limited, so please register as soon as possible to assure
your seat.

The Symposium fee goes towards conference room rental, breakfasts,
lunches, a cocktail reception on Thursday night, snacks, audio-visual
rental, internet access on-site, various mementoes of the occasion, and, of
course, Philodox's event management fee.


Scholarships

A small number of scholarship fee-waivers will be available, contingent
upon direct sponsorship and the size of the Symposium, to be selected by
Philodox and based upon the applicant's financial need and ability to
contribute to the symposium. Please contact Robert Hettinga, , or , if you want to request
a fee-waiver.


Sponsorship

In addition to direct event and website sponsorship opportunities,
including the possiblity of exhibition space, there are several in-kind
sponsorship opportunites available, particularly in the areas of
audio-video services and internet services, including internet access,
web-casting and web-page development. Please contact Robert Hettinga,
, or , if you're
interested in in-kind or direct sponsorship of the Symposium.


The Digital Bearer Settlement Email List: dbs at philodox.com

As part of Philodox's ongoing support of the technology of digital bearer
settlement, an email list has been established to discuss the technology
and it's ramifications in an unmoderated, informal setting. Please see
 to see the archives of the Digital Bearer
Settlement discussion list, and its subscription information.  If there is
enough demand, an additional announcement list for the Symposium itself
will be created, but it is hoped that the Symposium's participants will use
dbs at philodox.com as a "watering hole" for their discussions.


Who is Philodox?

Philodox is a new financial technology evangelism company founded by Robert
Hettinga, founder of the Digital Commerce Society of Boston, and founding
moderator and editor of several internet discussion lists and newsletters
on digital commerce and financial cryptography. Mr Hettinga is also the
founder of both the International Conference on Financial Cryptography, and
the International Financial Cryptography Association.

For more information on Philodox, please see . For
more information on Robert Hettinga, please see .
For more information on the Digital Commerce Society see . For more information on the
International Conference on Financial Cryptography, see
.


See You in Boston!

Cordially,
Robert Hettinga

Founder,
Philodox Financial Technology Evangelism
Boston, Massachusetts


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNVnPvMUCGwxmWcHhAQGEDwf6AzFX53KDFRwNieTsU7M19nLf7F88BNWM
bu+ii9aJsrAFlvkllyFuruVMjEWiYpNTfj5xPEJaaIxeHFRR6vNJet7XekAMjg1O
ZeYzs86I9DovtSIpSuSt3uHcPuwPgE9ZvO0parHwUl64uZ1cTldExYPCaquqU1K0
YzOVI+01MNKs/T5Zo68nRhkm1DfzYCE3DjKs4YA2mgA8nmgpqjhbnncOYATgv3Up
H+RRLLVSHD3nKh2RdK49RtGpRg6YvDRI3FP0vPaPTAMNy6A0KREhcnixZp8CZhBC
X510YO4ctlUkcS6esfSL9NyDZNlvLPZ4DdFveFgCurqvrUF5dyHMvQ==
=6min
-----END PGP SIGNATURE-----

-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From jim at mentat.com  Wed May 13 11:18:31 1998
From: jim at mentat.com (Jim Gillogly)
Date: Wed, 13 May 1998 11:18:31 -0700 (PDT)
Subject: Encryption trends and legal issues
Message-ID: <9805131814.AA00340@mentat.com>


Gavin skribis:
> I am looking for information on the legal and export issues on
> encryption around the world and the current use of different encryption
> algorithms today.

For legal/export issues:
http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm

He keeps it up-to-date, and it covers the world.  For current use of
different encryption algorithms, I think TIS has a continuing project
monitoring availability of packages worldwide using different systems.

	Jim Gillogly





From vpuser at u041.oh.vp.com  Wed May 13 12:12:05 1998
From: vpuser at u041.oh.vp.com (ADMIN-Standard VP login)
Date: Wed, 13 May 1998 12:12:05 -0700 (PDT)
Subject: Question reports on Y2K report
Message-ID: 


Declan,


Unfortunately it does not have a URL it is a printed report ( Febuary
1998), & I was given a copy of it.  One paragraph in the report ( that
I have read so far) does reference http://www.garynorth.com 

==========
NOTE:
Have not had the time to look at the Home Page for the report, but
could possibly be at http://www.mcalvany.com
===========

However, the report it self discusses all areas that the Y2K bug could
affect. The Only location, that I have found so far, is at the
subscription office  ( subscription is to high for me )

MIA
P.O. Box 84904
Phoenix, AZ 85071


Brian

> 
> Want to give me a URL?
> 
> -Declan
> 
> 
> 


-- 





From nobody at REPLAY.COM  Wed May 13 12:43:04 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 13 May 1998 12:43:04 -0700 (PDT)
Subject: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC)
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805131942.VAA17993@basement.replay.com>


Steve Crisp  > The thread you're whining about involved Steve Crisp 
> > threatening an anonymous poster with "beating the living fuck out of you"
> > if his/her identity could be determined...
>  
> And it still stands. Come out of hiding and see if you survive the
> night.
>  
> Steve Crisp

Does anyone question the need for the ability to post anonymously with
censorious bullies like him running loose?  Him and Belinda Bryan
 threatening to "make life a living hell" for anyone
who dares to criticize her anonymously, that is.

Someone posts something he didn't like and he threatened that person with
bodily harm.  I criticize him anonymously for making that threat, and now
he threatens me, too.  That sure makes PagePlanet sound like a company I'd
like to do business with:

   PagePlanet (PAGEPLANET-DOM)
   3252 Octavia Street
   Raleigh, NC 27606
   US

   Domain Name: PAGEPLANET.COM

   Administrative Contact:
      Crisp, Steve  (SC2795)  crisp at PAGEPLANET.COM
      919-852-5262 (FAX) 919-233-0816
   Technical Contact, Zone Contact:
      Sullivan, Mikey  (MS5652)  mikey at PAGEPLANET.COM
      919-852-5262 (FAX) 919-852-5261
   Billing Contact:
      Crisp, Valerie  (VC370)  valerie at PAGEPLANET.COM
      919-233-6602 (FAX) 919-852-5261

   Record last updated on 10-Feb-98.
   Record created on 25-Nov-96.
   Database last updated on 13-May-98 03:50:14 EDT.

   Domain servers in listed order:

   DNS.PAGEPLANET.COM		205.152.36.2
   DNS2.PAGEPLANET.COM		205.152.36.3
   DNS3.PAGEPLANET.COM		208.194.157.172







From billp at nmol.com  Wed May 13 12:54:02 1998
From: billp at nmol.com (bill payne)
Date: Wed, 13 May 1998 12:54:02 -0700 (PDT)
Subject: Pottery, Stalingrad , Fascists, Sandinistas, and settlement, of course
Message-ID: <3559F93A.1828@nmol.com>


Wednesday 5/13/98 1:17 PM

John Young
J Orlin Grabbe

Tuesday evening Patty and I journeyed to Placitas, NM.

Patty was going to have some kindergarten student pottery
projects kiln fired.

Karl and Mary Hofmann are fine artists.  Pottery.

Both are graduate school graduates in fine arts.

Karl is German-born.

Karl told me his brother helped build the Russian pipeline system.
And it isn�t buried deep enough.

Karl told me his brother was captured at Stalingrad.

I think that I read that only about 10% who were captured at Stalingrad
lived to return. http://www.semionoff.com/cellular/hacking/phreaking/

Patty and I bought you both identical gifts from Hofmann�s.

I am on the way to mail them.

Thank you both for so much for what you both have done.  Visibility.

http://jya.com/whpfiles.htm
http://www.aci.net/kalliste/

The Hidden US Government was trying to bury us in their invisible grave
yard.

But NOW the WORLD is on to the composition of the US Hidden Government.

  FASCISM -   a political and economic movement, strongly nationalistic,
magnifying the rights
  of the state as opposed to those of the individual, in which industry,
though  remaining largely 
  under private ownership, and all administrative political units,  are
controlled by a strong central   government.

Especially, after all of this, aggrieved Shiite Muslims. 
http://www.wpiran.org/

And now, perhaps, even Sandinistas too.

Carlos brought Swiss Radio International audio tape to Nicaragua this
spring from Moscow ... Idaho,
that is.  http://caq.com/cryptogate

Let�s all hope for prompt PEACEFUL settlement of this HORRIBLE chapter
in US history.

Later
bill







From cons0005 at algnet.algonquinc.on.ca  Wed May 13 14:06:26 1998
From: cons0005 at algnet.algonquinc.on.ca (cons0005 at algnet.algonquinc.on.ca)
Date: Wed, 13 May 1998 14:06:26 -0700 (PDT)
Subject: Email Bot
Message-ID: <199805132105.RAA10590@algnet.algonquinc.on.ca>


I was wondering if anyone knows of such a creature that I could send 
email to with an URL, and I would get a reply of that HTML file?
example I email   bot at somewhere.com with the 
Subject:http://www.hotmail.com

and I will get an email of the HTML file at www.hotmail.com
This would be handy because I don't have a broswer (2 meg RAM (I 
know)) and also for anonymity, cookies etc I couldn't be traced.




When you send mail, do you use a postcard or an envelope?
Get PGP (tm)                        my pgpID@ 0xD0186E85 
http://wabakimi.carleton.ca/~nmarion/pgp.html    -yashy-





From jya at pipeline.com  Wed May 13 14:55:40 1998
From: jya at pipeline.com (John Young)
Date: Wed, 13 May 1998 14:55:40 -0700 (PDT)
Subject: International Crime Control Strategy
Message-ID: <199805132155.RAA03248@dewdrop2.mindspring.com>



                            THE WHITE HOUSE

                    Office of the Press Secretary
________________________________________________________________________
For Immediate Release                                       May 12, 1998



                  INTERNATIONAL CRIME CONTROL STRATEGY


BACKGROUND

International crime is a serious and potent threat to the American
people at home and abroad.  Drug and firearms trafficking, terrorism,
money laundering, counterfeiting, illegal alien smuggling, trafficking
in women and children, advanced fee scams, credit card fraud, auto
theft, economic espionage, intellectual property theft, computer
hacking, and public corruption are all linked to international criminal
activity and all have a direct impact on the security and prosperity of
the American people.

Americans spend billions of dollars annually on cocaine and heroin, all
of which originates abroad; in 1997, there were 123 terrorist attacks
against U.S. targets worldwide, including 108 bombings and eight
kidnappings; each year, approximately one billion dollars worth of
stolen cars are smuggled out of this country; annually, U.S. companies
lose up to $23 billion from the illegal duplication and piracy of films,
compact discs, computer software, pharmaceutical and textile products,
while U.S. credit card companies suffer losses of hundreds of millions
of dollars from international fraud; and several hundred U.S. companies
and other organizations have already suffered computer attacks in 1998,
resulting in millions of dollars of losses and significant threats to
our safety and security.

PURPOSE

The International Crime Control Strategy (ICCS) addresses this
increasing threat by providing a framework for integrating all facets of
the federal government response to international crime.  This first-ever
strategy reflects the high priority accorded international crime by this
Administration and builds on such existing strategies as the National
Drug Control Strategy and the Presidential Directives on alien
smuggling, counter-terrorism and nuclear materials safety and security.

The ICCS is also an important initiative in terms of enhancing the
ability of U.S. law enforcement officials to cooperate effectively with
their overseas counterparts in investigating and prosecuting
international crime cases.  At the upcoming Birmingham Summit, G-8
leaders will discuss international crime as one of the most pressing
issues related to increasing globalization and rapid technological and
economic change.  President Clinton will highlight the new ICCS in
underscoring the U.S. commitment to close cooperation with all nations
who are mobilizing to confront this increasing threat.

OVERVIEW

The ICCS is a plan of action containing eight broad goals with thirty
implementing objectives.  The ICCS expresses President Clinton's resolve
to combat international crime aggressively and substantially reduce its
impact on the daily lives of the American people.

The Strategy's eight goals and related objectives are:

1.   Extend the First Line of Defense Beyond U.S. Borders by 
     (a) preventing acts of international crime planned abroad before 

     they occur, (b) using all available laws to prosecute select 
     criminal acts committed abroad, and (c) intensifying activities 
     of law enforcement, diplomatic and consular personnel abroad.

2.   Protect U.S. Borders by (a) enhancing our land border inspection,
     detection and monitoring capabilities, (b) improving the 
     effectiveness of maritime and air smuggling interdiction efforts, 
     (c) seeking new, stiffer criminal penalties for smuggling 
     activities, and (d) targeting enforcement and prosecutorial 
     resources more effectively against smuggling crimes and 
     organizations.

3.   Deny Safe Haven to International Criminals by (a) negotiating new
     international agreements to create a seamless web for the prompt
     location, arrest and extradition of international fugitives, 
     (b) implementing strengthened immigration laws that prevent 
     international criminals from entering the United States and 
     provide for their prompt expulsion when appropriate, and 
     (c) promoting increased cooperation with foreign law enforcement 
     authorities.

4.   Counter International Financial Crime by (a) combating money
     laundering and strengthening enforcement efforts to reduce inbound 
     and outbound movement of criminal proceeds, (b) seizing the assets 
     of international criminals, (c) enhancing bilateral and 
     multilateral cooperation against all financial crime, and 
     (d) targeting offshore centers of international fraud, 
     counterfeiting, electronic access device schemes and other 
     financial crimes.

5.   Prevent Criminal Exploitation of International Trade by (a)
     interdicting illegal technology exports, (b) preventing unfair and
     predatory trade practices in violation of U.S. criminal law, (c)
     protecting intellectual property rights, (d) countering industrial
     theft and economic espionage of U.S. trade secrets, and (e) 
     enforcing import restrictions on certain harmful substances, 
     dangerous organisms and protected species.

6.   Respond to Emerging International Crime Threats by (a) disrupting 
     new activities of international organized crime groups, 
     (b) enhancing intelligence efforts against criminal enterprises, 
     (c) reducing trafficking in human beings and crimes against 
     children, (d) increasing enforcement efforts against high tech 
     and computer-related crime, and (e) continuing to identify and 
     counter the vulnerabilities of critical infrastructures and new 
     technologies in high tech areas.

7.   Foster International Cooperation and the Rule of Law by 
     (a) establishing international standards, goals and objectives to 
     combat international crime and by actively encouraging compliance, 
     (b) improving bilateral cooperation with foreign governments and 
     law enforcement authorities, and (c) strengthening the rule of law 
     as the foundation for democratic government and free markets in 
     order to reduce societies' vulnerability to criminal exploitation.


8.   Optimize the Full Range of U.S. Efforts by (a) enhancing executive
     branch policy and operational coordination mechanisms to assess 
     the risks of criminal threats and to integrate strategies, goals 
     and objectives to combat those threats, (b) mobilizing and 
     incorporating the private sector into U.S. government efforts, and 
     (c) developing measures of effectiveness to assess progress over 
     time.

ICCS INITIATIVES

Highlighted below are ten Administration initiatives to further our 
efforts to fight international crime.

1.  International Crime Control Act of 1998:  Proposed legislation
containing significant new law enforcement tools for the fight against
international crime.

2.  Comprehensive Threat Assessment:  A comprehensive assessment of the
threat to the American people posed by international crime, to be 
completed within six months.

3.  International Conference on Upholding Integrity Among Justice and
Security Officials:  An international conference to address upholding
integrity among key justice and security officials worldwide, to be
organized by the Vice President within the next six months.

4.  High Tech Crime:  An action plan, building on the work of the G-8
justice and interior ministers and the creation of the U.S. National
Infrastructure Protection Center, to protect interconnected U.S.
communications and information systems from attack by international
criminals.

5.  Border Law Enforcement:  A program to enhance border law enforcement
through deployment of advanced detection technology and investment of 
new resources.

6.  Financial Crimes:  A commitment to employ aggressively new tools to
deny criminals access to U.S. financial institutions and to enhance
enforcement efforts against financial crimes.

7.  International Asset Forfeiture and Sharing:  A U.S. call for new
criminal asset forfeiture regimes worldwide and new asset forfeiture
sharing agreements with our international partners.

8.  OAS Treaty Against Illicit Trafficking in Firearms:  A program to 
work with our OAS partners to implement fully a hemispheric convention 
to combat the illicit manufacturing of and trafficking in firearms, 
ammunition and explosives.

9.  Economic Espionage and Theft of Industrial Property:  A commitment 
to use the Economic Espionage Act to increase U.S. investigations and
prosecutions of individuals and companies who attempt to steal U.S.
proprietary information.

10.  Strategic Communications Plan:  A plan to engage the private 
sector in assessing the impact of international crime on that sector 
and in determining its appropriate role in countering this threat.






From jya at pipeline.com  Wed May 13 15:10:42 1998
From: jya at pipeline.com (John Young)
Date: Wed, 13 May 1998 15:10:42 -0700 (PDT)
Subject: Senate Intel Committee on Crypto
Message-ID: <199805132210.SAA30435@dewdrop2.mindspring.com>


>From Senate Intelligence Committee Report 105-185, on intelligence 
funding for FY1999, May 7, 1998:

Encryption

    The Committee remains concerned about efforts to 
inappropriately ease or remove export restrictions on hardware 
and software encryption products. Export controls on encryption 
and other products serve a clearly defined purpose--to protect 
our nation's security. Therefore, the Committee believes that 
the effects on U.S. national security must be the paramount 
concern when considering any proposed change to encryption 
export policy, and will seek referral of any legislation 
regarding encryption export policy under its jurisdiction 
established under Senate Resolution 400.

    Export restrictions on encryption products assist the 
Intelligence Community in its signals intelligence mission. By 
collecting and analyzing signals intelligence, U.S. 
intelligence agencies seek to understand the policies, 
intentions, and plans of foreign state and nonstate actors. 
Signals intelligence plays an important role in the formation 
of American foreign and defense policy. It is also a 
significant factor in U.S. efforts to protect its citizens and 
soldiers against terrorism, the proliferation of weapons of 
mass destruction, narcotics trafficking, international crime 
and other threats to our nation's security.

    While the Committee recognizes the commercial interest in 
easing or removing export restrictions, it believes the safety 
of our citizens and soldiers should be the predominant concern 
when considering U.S. policy towards the export of any product. 
The Committee supports the continued control of encryption 
products, and believes that a comprehensive strategy on 
encryption export policy can and must be developed that 
addresses national security concerns as well as the promotion 
of American commercial interests abroad. The Committee looks 
forward to working with senior Administration officials in 
developing such a strategy.

-----

Full report: 

   http://jya.com/sr105-185.txt  (94K)





From mgraffam at mhv.net  Wed May 13 15:20:41 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Wed, 13 May 1998 15:20:41 -0700 (PDT)
Subject: Email Bot
In-Reply-To: <199805132105.RAA10590@algnet.algonquinc.on.ca>
Message-ID: 


-----BEGIN PGP SIGNED MESSAGE-----

On Wed, 13 May 1998 cons0005 at algnet.algonquinc.on.ca wrote:

> I was wondering if anyone knows of such a creature that I could send 
> email to with an URL, and I would get a reply of that HTML file?
> example I email   bot at somewhere.com with the 
> Subject:http://www.hotmail.com
> 
> and I will get an email of the HTML file at www.hotmail.com
> This would be handy because I don't have a broswer (2 meg RAM (I 
> know)) and also for anonymity, cookies etc I couldn't be traced.

Uhm.. this service used to exist.. I dont know what the email addy
was though :( 

Another solution is to find a school that has a publicly usable lynx
account. Lynx is a text-based browser for Unix, and is fully usable
from a telnet session. Lynx is a nice browser. I use it all the time
on my local machine in an xterm. Yeah, I could fire up netscape ..
but lynx is better. :)

Try telneting to:

sailor.lib.md.us       login: guest
trfn.clpgh.org         login: trfn 
bob.bob.bofh.org       login: supply your email address
public.sunsite.unc.edu login: lynx
lynx.cc.ukans.edu      login: lynx

Be nice to these machines. 

Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"..the isle is full of noises, sounds and sweet airs that give delight and
hurt not. Sometimes a thousand twangling instruments will hum about mine
ears, and sometimes voices.." Caliban, Shakespeare's "The Tempest"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNVoavgKEiLNUxnAfAQEbDgQAlLpdQL5GgLROhRb03T9P+YNAmhgPHzdX
JIpKx5ZDMn4IfEatfX1VWfNRdVjxAjn0cf1A0bx7ybB0XBjwP6DYR97Vy916ZVzj
LhFzNa0PLDkCbQUZBdicduoPA4LPRiRXFS0+AgFalCcCVpxx/l7bNdi8yAwv+1xp
dOQ2zjAJLvo=
=8E9+
-----END PGP SIGNATURE-----






From mrosen at peganet.com  Wed May 13 15:46:22 1998
From: mrosen at peganet.com (Mark Rosen)
Date: Wed, 13 May 1998 15:46:22 -0700 (PDT)
Subject: Chaffing and winnowing
Message-ID: <01bd7ebe$f2941940$014ce9c7@markdsk.peganet.com>


>    Mark> ...  g. Data authentication equipment that calculates a
>    Mark> Message Authentication Code (MAC) or similar result to
>    Mark> ensure no alteration of text has taken place, or to
>    Mark> authenticate users, but does not allow for encryption of
>    Mark> data, text or other media other than that needed for the
>    Mark> authentication;
>
>But wasn't that the gist of Rivest's paper: he's not encrypting the
>message, he's just obscuring it really, really well.
>
>All this needs someone with the cash & the time to push it to court...
>
    Actually, the first parts I quoted applied to chaffing and winnowing
too:

a. Designed or modified to use ``cryptography'' employing digital techniques
to ensure ``information security'';
b. Designed or modified to perform cryptanalytic functions;
c. Designed or modified to use ``cryptography'' employing analog techniques
to ensure ``information security'';

    Part a. basically prevents any sort of "encryption" technique, whether
that technique uses a normal encryption algorithm, a hash function, or
quantum cryptography -- anything that can be used for "information security"
    I think that the NSA knew about chaffing and winnowing, and they talked
with the people who wrote the EAR and helped them make the legislation cover
chaffing and winnowing.
    Please know that I, in no way, like the EAR; it just seems that
everyone's hopes that chaffing and winnowing gets around the export controls
are invalid. The EAR doesn't care *how* you do the encryption, it only cares
that some sort of "encryption" was performed.
    Are there any legal-types out there that can give a more definitive
answer?

- Mark Rosen
http://www.mach5.com/







From gburnore at netcom.com  Wed May 13 17:02:16 1998
From: gburnore at netcom.com (Gary L. Burnore)
Date: Wed, 13 May 1998 17:02:16 -0700 (PDT)
Subject: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC)
In-Reply-To: <3555FA78.7795@pageplanet.com>
Message-ID: <35613238.439321674@206.214.99.10>


On Wed, 13 May 1998 15:11:11 +0200 (MET DST), in article
<199805131311.PAA05504 at basement.replay.com>, nobody at REPLAY.COM (Anonymous)
wrote:

:eridani at databasix.com (Belinda Bryan) wrote:
:
:> And there we have it, folks.  The anonymous stalker who's spent the past
:> year following Gary Burnore around Usenet found a post in
:> triangle.general that mentioned him, added a propaganda-filled follow up
:> to it, and posted it to 9 newsgroups--many of whom have repeatedly
:> requested that this crap be kept out of said groups.
:
:"Anonymous stalker"?  For merely posting a reply to a public post on
:Usenet?  What state or country has a statute against that, and what makes
:you think the poster falls under its jurisdiction if it does exist?  As for
:whether a certain post is "propaganda", that is for the reader to decide,
:especially when of the content is independently verifiable.  The
:"propaganda" you refer to was apparently intended to refute the fallacious
:assertion that since Gary Lee Burnore's entry in the North Carolina
:official database of registered sex offenders had apparently been removed,
:then the underlying crime for which he was convicted and required to
:register somehow automagically never happened.  To make such an assertion
:is to invite rebuttal.

Only for someone as obsessed in this as you.  Everyone else I've seen post
except those who have a grudge directly against me has said something similar
to "who gives a fuck?"  Your obsession continues.


:
:The thread you're whining about involved Steve Crisp 
:threatening an anonymous poster with "beating the living fuck out of you"
:if his/her identity could be determined, a second anonymous poster
:challenging the propriety of such a threat, and yet another DataBasix
:groupie, William McClatchie , calling the second
:anonymous poster a "remailer abuser" for daring to make such a challenge.
:So rather than denouncing the threat itself, you choose to call the person
:challenging it an "anonymous stalker"?  If you feel no need to "hide"
:anything, please feel free to post your street address and home phone
:number.  But I imagine that many people with small children would not want
:their names, from which their street address can be derived by someone with
:the resources available to you and Gary Burnore, to fall into the hands of
:a convicted child molester with a history of abusive retaliation.


Geesh you ignorant fuck. It's been posted more times than I can count.  You
don't remember posting it right? Oh wait, that was someone else who's obsessed
with me right?  Uh huh.  The same way you posted Steve's info you posted mine.

:
:Being threatened with physical violence for making an unpopular post is
:one of the best arguments available as to why anonymity is necessary when
:people like Steve Crisp and convicted child molester Gary Lee Burnore are
:running around loose making those threats.

If people like you weren't allowed to abuse remailers, people like chris
wouldn't make comments that he knows are not threats to draw you out.  You buy
it hook line and sinker.   You must certianly know that he's not threatning
anyone since you're posting anonymously and he couldn't possibly know who you
are.  But obsessed as you are you can't take it.  

:
:> Oh and lookee what else:  it was mailed to cypherpunks at toad.com,
:> presumably for archival on the cypherpunks mailing list, where it will
:> be picked up by WWW search engines.  Since those folks don't seem to
:> mind having their archives used in personal grudge matches, I'll just
:> start cc'ing my responses there as well.  I'm sure, as champions of free
:> speech, they can understand the necessity of making sure both sides of
:> the story get equal time.
: 
:This, of course, comes from the same Belinda Bryan who impersonated a
:lawyer for DataBasix to demand the disclosure of (fortunately non-existant)
:user logs from the Huge Cajones remailer in a failed Scientology-esque
:attempt to embarass its users.


More lies from the obsessed one as Belinda NEVER impersonated a lawyer for
anyone.  Beating dead horses is your specialty isn't it?

:  And that attack, BTW, started because Gary
:Burnore was pissed that an anonymous whistle blower used a remailer to tip
:of his victim's mother to the molestation.  As is typical of his style,
:Burnore denounced that legitimate use of anonymity as "harassment" and
:"abuse".  


More unproven lies.  If you, the anonymous asshole were really interested in
the truth (rather than your obsession with me) you'd get the court documents
and see that the dates do not support your libelous statements.  Libelous
statements are the best argument for remailers.  If you need to make a
libelous statement, do it from a remailer.  Nothing will happen to you. (Other
than folks will begin to ignore the remailer)


:
:It was also Burnore who chose to make PUBLIC what had previously been a
:private e-mail, thus inviting his critics to factually evaluate the claims.
:One of them apparently did so and discovered Gary Burnore's name and mug
:shot were published on an official PUBLIC website of registered sex
:offenders maintained by the state of North Carolina where Burnore moved
:after leaving San Francisco. 

More lies from the anonymous asshole.  It's not been that long since this
started that people don't remember how and why it was posted to USENet.  It
had nothing to do with an email.

: Perhaps he should have learned a lesson from
:Gary Hart and not have taunted the wrong people to find evidence of his
:wrongdoing.

Perhaps I should continue to improve my tracing skills and find you one day.

:
:Will the continual harangue against privacy and anonymity by Gary Lee
:Burnore, Belinda Bryan, Billy McClatchie, and other staffers and sock
:puppets of the DataBasix wrecking crew never end?


Translation:  If Gary Burnore and Belinda Bryan and Bill McClatchie leave the
internet, the anonymous asshole will stop lying.
:
:BTW, Belinda, cross-posting your whining drivel in the fashion you're
:threatening negates your lame attempts to achieve deniability by using the
:infamous X-No-Archive header that has become the trademark of DataBasix'
:denizens. 

You've never given a valid reason why someone should or should not use an
X-No-Archive header.  You hide behind a remailer and libel and then complain
when someone X-No-Archives.  Typical hypocritical thinking.

: IOW, you won't be able to retroactively claim that an
:embarassing post from you was "forged" because it's not archived at an
:unbiased, third party site.  Can you say "oops"?

Well we'll see about unbiased sites now won't we? 


-- 
        for i in databasix netcom primenet ; do ; gburnore@$i ; done
---------------------------------------------------------------------------
                  How you look depends on where you go.
---------------------------------------------------------------------------
Gary L. Burnore                       |  �۳�ݳ޳�ݳ��ۺݳ޳�ݳݳ޳�ݳ��۳
                                      |  �۳�ݳ޳�ݳ��ۺݳ޳�ݳݳ޳�ݳ��۳
DOH!                                  |  �۳�ݳ޳�ݳ��ۺݳ޳�ݳݳ޳�ݳ��۳
                                      |  �۳ 3 4 1 4 2  ݳ޳ 6 9 0 6 9 �۳
spamgard(tm):  zamboni                |     Official Proof of Purchase
===========================================================================
             PGPprint: C63B CF4E 1B71 4D7E C6F8 AF4E 338D 5CB4
    KeyID: 0x0F7EDBD9 (RSA)     finger gburnore at netcom.com for public key
---------------------------------------------------------------------------





From nobody at base.xs4all.nl  Wed May 13 17:34:46 1998
From: nobody at base.xs4all.nl (Anonymous)
Date: Wed, 13 May 1998 17:34:46 -0700 (PDT)
Subject: No Subject
Message-ID: <9083523aabe2496a001be5b119c0dd35@base.xs4all.nl>


I was looking at my RAM when I noticed several passwords I have 
frequently used were still there, and as I never turn off my comp, I 
was wondering if there is a way you can "clean" your RAM?
I also got errors when installing LILO on my DOS partition, so now I 
*CAN'T* boot without a bootdisk, and I think LILO sticks itself on 
the master boot record, is there an MBR editor?
Where can I get a list of Candian Remailers?
Is there a DOS and/or Winbloze 3.* Email program that I can "forge" 
headers? (ex: Like in Linux fastmail adding: -f billc at whitehouse.gov)
thnx.






From 105263.2354 at compuserve.com  Wed May 13 17:51:36 1998
From: 105263.2354 at compuserve.com (105263.2354 at compuserve.com)
Date: Wed, 13 May 1998 17:51:36 -0700 (PDT)
Subject: Complete Internet Marketing
Message-ID: <199805140051.RAA16848@toad.com>


Complete Internet Marketing
The E-mail Resource Center
toll free.....800-942-7913....toll free
fax 732-367-2229

Targeted E-mail Marketing......
No matter what your target is, we can compile a great list for you of people or 
businesses that may have an interest in what you have to offer.
We can do all of the email for you and have the replies come directly to your email 
address or we can accept the replies for you here and forward the replies to you.  Our 
addresses are compiled fresh for you as per your order. These email addresses can 
even be pulled geographically for you as well.
Address Lists start at $50 per thousand and we can offer you a better price on higher 
quantities.  Our clients are getting great results, so can you.

Bulk Email Programs.....

MAIL PUSHER
Want Your Mail to get in? We Have �Mail Pusher� - 
100% Delivery..State of the art penetration software. A Stealth Type Program on 
Steroids. Fast too, with 12 ports 100,000 per hour, 20 ports 160,000 per hour. 
Functional Demo Available. Price only $295.00

RAPID FIRE MAIL SERVER
This is the next generation of mass mail software. This allows you to turn your own 
computer into a bona fide mail server using a dial-up account or a dedicated ISDN or 
T-1. This program has several unique features. It delivers the mail directly from your 
computer which is now the mail server to the recipients mail server and let's you watch 
each piece of mail get delivered to the recipients mail box. No more guessing and 
seeding It sends at about 50,000 to 80,000 per hour from a 28.8 modem. If that isn't 
enough the program send in color with simple point and click controls to set font 
colors, background colors and make fonts bold, italics as well as align left, right or 
center the message.
Demo Available..Price only $395.00

STEALTH MASS MAILER
Stealth Sending Software - Transmits at 250,000 to 350,000 from a 33 modem with a
modest Pentium with 20 connections. THE INDUSTRY WORKHORSE. We are an 
authorized dealer offering full support 7 days a week. For a limited time Email pro 
(non supported) is included with Stealth at no extra cost, along
with CDS Check by Fax Software for free, plus 9 million addresses.
Demo Available..Price only $295.00

HURRICANE
Extremely fast. This extractor goes to major search engines (you can pick from a list of 
10 of the most popular search engines) and conducts a search by keyword or 
keywords. It then spiders the web pages that come up as search results extracting the 
email addresses and saving them in a plain text format. You can define how deep the 
search is to be. You can filter out addresses such as those with webmaster or admin. 
You can use additional filters to have the software only include url's containing certain 
keywords. It can also eliminate certain url's with specified keywords. This makes for 
some very tight targeting. The cost of Hurricane is $295 but scroll down to see the 
package deal.

GEO SNAKE
This is a targeted list builder that could also be used to collect general addresses. You 
input a city and state and hit the start button, kick back and watch it collect. Quite fast. 
Easy to use. The cost of geo Snake is $295.

NEWS SLEUTH
This software extracts email addresses from newsgroup postings by keyword. It 
targets. Very fast and easy to use. This software has a number of useful options to help 
you get the exact results you want so reading the help file is recommended. The demo 
will allow you to see how fast and easy it is to use but will not allow you to save or use 
the addresses collected. Cost of News Sleuth is $295.

*Special Deal*
Hurricane, Geo Snake & News Sleuth - all for $595.00

CHERRY PICKER
With this super easy to use software you can target addresses based on search engine
 keywords. Examples would be shoe manufacturers, chemical adhesives, retail clothing 
stores, airlines, import/export just to use a few examples. Want to know what the 
potential yield would be go to a major search engine and enter in a keyword(s) and 
see how many hits come up. This multi-threaded software searches seven search 
engines simultaneously, visiting the web sites and extracting the email addresses, 
removing the duplicates and putting them in plain text files, one address to a line. A 
child could learn to use this software in 15 minutes or less. Super easy. It runs in the 
background allowing you to perform other tasks with your computer. The yield will 
vary according to the search keywords, your system, your Internet connectivity, net 
traffic, etc. but the range tends to run from 1000 to 2000 addresses per hour but 
remember these are highly targeted lists that others charge big money for. Cherry 
Picker costs $295.00

BULK MATE
This is the greatest list manager program we know of. Does everything and then some. 
Cost is $199.00 Check out the demo, you'll be glad you did.

We accept Visa/Mastercard/American Express and Check by Fax.
Please call our toll free number for more information on all of our services. You can 
instantly download demos of all of our software.

CALL NOW...800-942-7913  OR FAX US AT 732-367-2229
To be removed from our database, please call us toll free and state your email address 
(please speak slowly and clearly) so that we can be sure to get your address clearly 
and we will honor your request to be removed immediately. We are responsible 
Internet Marketers.
Thank you! 







From StanSqncrs at aol.com  Wed May 13 18:06:39 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Wed, 13 May 1998 18:06:39 -0700 (PDT)
Subject: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is
Message-ID: <4b0c119a.355a436e@aol.com>


In a message dated 5/13/98 7:46:13 PM Central Daylight Time,
gburnore at netcom.com writes:

<< and he couldn't possibly know who you are.  >>

It is my humble opinion, that nobody's cover has been blown, he fucked up.  He
cross-posted the same exact piece of spam (as some would say) to both me
anonomosly, and to the list roughly at the same time.

Stan Rosenthal





From mixmaster at remail.obscura.com  Wed May 13 18:45:01 1998
From: mixmaster at remail.obscura.com (Mixmaster)
Date: Wed, 13 May 1998 18:45:01 -0700 (PDT)
Subject: No Subject
Message-ID: <199805140121.SAA02562@sirius.infonex.com>


[cons0005 at algnet.algonquinc.on.ca wrote:]

I was wondering if anyone knows of such a creature that I could send 
email to with an URL, and I would get a reply of that HTML file?
example I email�� bot at somewhere.com with the 
Subject:http://www.hotmail.com

and I will get an email of the HTML file at www.hotmail.com
This would be handy because I don't have a broswer (2 meg RAM (I 
know)) and also for anonymity, cookies etc I couldn't be traced.

-----

Actually you can do that really very easily. If you are interested in 
such Bot's. I really recommend you get O'Reilly's book: Web Client 
Programming, with Perl. It discusses to a large degree what your wanting 
to do. It has full source code as well, so you can take that and just 
fiddle with a bit until it suits your needs. Provided you or someone you 
know can program in Perl. 

I think one method you could do is to just use a majordomo server and 
tinker with it to suit the reception needs. Or you could on your own 
box, or a friends box. Make an account to the name you want, set up a 
resident program, with nohup or a simple cron job. Or do some script, 
that would serve equally as well. That could handle the reception 
facilities well enough. Then just use the modified bot to handle the 
HTML queries and sending and there you go. 

Although sending things back to the HTTP server in question might... 
interesting. If that place GET and POST methods for CGI scripts and 
dynamic pages, that raises some questions. Particularly, if the bot 
sends you the HTML doc that it requested, you view the page, yadda yadda 
yadda. It depends on how you want to work it and do it, you have to ask 
yourself. Do I want to send my request (whatever that maybe)from my 
machine? The request would go through. But it would be through your 
machine, and that would invalidate your anonymity. So thats a Bad 
Thing(tm) and out of the question. Or in cases like yours, the user 
might not have a browser. So that leaves it to us sending our request 
back to our automated little daemon and it does it for us. It would 
require just a little bit of handling and work to do the GET and POST 
methods for the CGI program your interacting with, but that would be 
minimal I think. I could be wrong however. In effect your using the bot 
as a kind of proxy for HTTP requests. 

If your really, REALLY desperate I might be able to quickly just put 
something together for you and post it here for you(or if another 
cypherpunk thats into Perl wants to do it, or if anyone else has any 
ideas). But you should be able to modify the code to suit whatever you 
want it to do. I've been experimenting with something similar, only on a 
slightly different note. If your patient, you can just subscribe to a 
majordomo "admin-help" list. Where the details of running such a thing 
are discussed by people that do. I'm sure one quite possibly exists 
somewhere. Then log on to a Bot mailing list and after hanging out on 
both for a while, asking a few questions perhaps you should be able to 
put something together I expect.

Or as mgraffam at mhv.net suggests you could log into those machines and do 
it that way. Which gives me another idea, you could have the bot run 
lynx remotely and then pipe the output from that to the letter it would 
send you and visa versa. But that makes things more complicated as well 
too. I question the value of doing that as well, I think the overhead 
would be a bit much, as well as being a slight hassle. I think over all, 
the easiest thing to do would be to possibly follow mgraffam's 
suggestion and just do that. Those are my thoughts on things at least. I 
hope they help.

I think the security possibilities of such a bot could be useful and 
could make a interesting discussion perhaps. There was one thread 
earlier that was discussing one such robot. From a government location, 
that was keeping tabs on crypto related sources. Crawling from link to 
link, from behind a firewall etc, etc, etc. If theres any more news 
relating to that thread, thats been uncovered I'd be interested in 
hearing more on it. 



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com






From 144tt4 at msn.com  Wed May 13 18:48:47 1998
From: 144tt4 at msn.com (144tt4)
Date: Wed, 13 May 1998 18:48:47 -0700 (PDT)
Subject: No Subject
Message-ID: <19943672.886214@relay.comanche.denmark.eu>


Authenticated sender is <144tt4 at msn.com>
Subject:  1 44 t
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

EMAIL MARKETING WORKS!!

Bull's Eye Gold is the PREMIER email address collection tool.
This program allows you to develop TARGETED lists of email
addresses.  Doctors, florists, MLM, biz opp,...you can collect
anything...you are only limited by your imagination!  You can
even collect email addresses for specific states, cities, and
even countries!  All you need is your web browser and this program.
Our software utilizes the latest in search technology called
"spidering". By simply feeding the spider program a starting
website it will collect for hours. The spider will go from website
to targeted website providing you with thousands upon thousands of
fresh TARGETED email addresses. When you are done collecting,  the
spider removes duplicates and saves the email list in a ready to
send format. No longer is it necessary to send millions of ads to
get a handful of responses...SEND LESS...EARN MORE!!!

A terrific aspect of the Bull's Eye software is that there is
no difficult set up involved and no special technical mumbo-jumbo
to learn. All you need to know is how to search for your targeted
market in one of the many search engines and let the spider do the
rest! Not familiar with the search engines? No problem, we provide
you with a list of all the top search engines. Just surf to the
location of a search engine on your browser then search for the
market you wish to reach...it's that easy!

For instance if you were looking for email addresses of Doctors
in New York all you would do is:

1) Do a search using your favorite search engine by typing in
the words doctor(s) and New York
2) Copy the URL (one or more)...that's the stuff after the
http://...  for instance it might look like
http://www.yahoo.com/?doctor(s)/?New+York
3) Press the START button

THAT's IT!!!  The Bull's Eye spider will go to all the websites
that are linked, automatically extracting the email addresses
you want.

The spider is passive too! That means you can let it run all
day or all night while you are working on important things or
just having fun on your computer. There is no need to keep a
constant watch on it, just feed it your target market and give
it praise when it delivers thousands of email addresses at
the end of the day!

Features of the Bull's Eye Software:

* Does TARGETED searches of websites collecting the email
  addresses you want!
* Collects Email addresses by City, State, even specific
  Countries
* Runs Automatically...simply enter the Starting information,
  press The Start Button, and it does the rest
* Filters out duplicates
* Keeps track of URLs already visited
* Can run 24 hours per day, 7 days per week
* Fast and Easy List Management
* Also has built in filtering options...you can put in words
  that it "Must" have while searching,...you can even put in
  criteria that it  "Must NOT Have"...giving you added flexibility
* Also imports email addresses from any kind of files (text
  files, binary files, database files)
* List editor handles Multiple files to work on many lists
  simultaneously
* Has a Black-Book feature... avoid sending emails to people
  who do not want to receive it
* Built-in Mail program...send email directly on the internet
  with just a click of your mouse
* Personalized Emails...if the email address has the user's
  name when it is collected,..you can send Personalized emails!!!
* Sort by Location, Server, User Name, Contact Name
* Advanced Operations:
� Email address lists export in many different formats
  (HTML, Comma delimited, text file)
� Advanced editing...Transfer, Copy,  Addition, Delete, Crop,
  Move to Top/Bottom
� Operations between lists...Union, Subtraction, Comparison
* Program is Passive,...meaning you can run other programs at
  the same time

CALL FOR MORE INFORMATION   213-980-7850
CALL FOR MORE INFORMATION   213-980-7850

ORDERING INFORMATION

Customer Name
Company Name
Address
City
State                       Zip
Phone                                       Fax
Email Address

______ BULL'S EYE SOFTWARE   $259.00
Includes Software, Instructions, Technical Support

______ Shipping & Handling  (2-3 Day Fedex)  $10.00
                           (Fedex Overnite) $20.00

______  TOTAL
                 (CA Residents add applicable sales tax)

*All orders are for Win 95 and Win NT

                *****CREDIT CARDS ACCEPTED*****
                   MASTERCARD   VISA   AMEX

   PLEASE CALL 213-980-7850 to process your order
                        9am-5pm Pacific Time
                Checks or Money Orders send to:
                      WorldTouch Network Inc.
5670 Wilshire Blvd.  Suite 2170 Los Angeles, CA 90036
Please note:  Allow 5 business days for all checks to
clear before order is shipped.







From R2wjEAy94 at msn.com  Wed May 13 22:28:17 1998
From: R2wjEAy94 at msn.com (R2wjEAy94 at msn.com)
Date: Wed, 13 May 1998 22:28:17 -0700 (PDT)
Subject: Are you curious about WHERE your family roots originate?
Message-ID: <199805140527.OAA04410@ns.joy.or.jp>


Discover Your Family History - Rated "Cool Site of the Week"

                Come visit our website at,
http://207.93.198.221/culture2.htm
(if the above link is busy please use...)
http://209.67.53.232/culture2.htm

        Do you know WHO your ancestors are and WHAT they did?
        Do you know WHEN your surname first appeared?
        Are you curious about WHERE your family roots originate?

Now you can fill in the missing pieces of this puzzle.  Join the satisfied multitudes who have discovered their complete Family Surname History.

All Nationalities. It's easy. Just key your last name into our online index, and in seconds we will tell you it's origin and much MORE.  See if we've researched your complete family name history during our 25 years of professional research.

Read a sample history, plus - FREE Coat of Arms keychain with your family's most ancient coat of arms & crest. All in full color. Your family name history parchment is 11 x 17", approximately 1700 words. It is beautifully ILLUMINATED by your most ancient Coat of Arms in full authentic Heraldic Colors.  Over 500 URLs on family and heraldic history.

Please come visit our website at,
http://207.93.198.221/culture2.htm
(if the above link is busy please use...)
http://209.67.53.232/culture2.htm

Hall of Names International Inc.
1-888-My-Roots  (1-888-697-6687)


For questions regarding our service, use the contact information in this letter. The return email address does not respond to incoming email. If you are not interested in this offer,  you can be removed from our mailing list by sending an email to: p-jerry at usa.net    Simply send it and your email address  will be automatically removed from our mailing list.






From toto at sk.sympatico.ca  Wed May 13 23:27:57 1998
From: toto at sk.sympatico.ca (Toto)
Date: Wed, 13 May 1998 23:27:57 -0700 (PDT)
Subject: [On Topic]
In-Reply-To: <199805122218.SAA26006@josh1.weboneinc.com>
Message-ID: <355A6D62.29C4@sk.sympatico.ca>


Josh Schoof wrote:
> 
> FROM: aj at gaymen.com
> SUBJECT: Gay Site
> 
>         I just wanted to let you know that GayTV And GayMen.Com have
>         webmaster referral programs that pay you  for every person
>         that signs-up for either site.

Dimitri? Is that you, Dimitri...?







From tcmay at got.net  Wed May 13 23:28:05 1998
From: tcmay at got.net (Tim C. May)
Date: Wed, 13 May 1998 23:28:05 -0700 (PDT)
Subject: "... would cause us to look at this person as a threat"
In-Reply-To: <23d07d72.3558d3d9@aol.com>
Message-ID: <355A796B.5741@got.net>


StanSqncrs wrote:
> >  > Subject: Cults and Government?
> >  >
> >  > "Just ran across this quote from AG Janet Reno. From a person of such
> >  > high power, these are scary words. --------- "
> 
> 
> 
> >  > "-Attorney General Janet Reno, Interview on 60 Minutes, June 26,
> >  > 1994"

> Bad beginning, Sir Will.  The willingness to pass along material of dubious
> authenticity is not a good sign in my book. As Mr. Natural would say, "Check
> your source."  So, what *IS* your source?

This qualifies as an Official News Story Quote under the guidelines 
released by 'True Lies On The InterNet Coommiittee' which was formed
on Oct. 3, 1954.
To meet these guidelines, a quote must:
1. Be attributed to a species with the capacity for speech.
2. Be consistent with something 'everyone knows' the one quoted 'could 
have said'.
3. Be an attempt at misinformation which does not exceed the magnitude
of the average MainStream Press 'lean' on the Truth (TM).
4. Provide a means for those reading the quote to check the veracity
of the source and/or the accurateness of the quote, regardless of
whether or not the message headers are forged.
5. Not be from a 'cocksucker'.

If you check the CypherPunks archives, you will find that a Great
American and True CypherPunk with a humungous schlong once sent a
post to the list, titled, "Forgeries are your Friend."
Think about it...

"The tree of tyranny must be watered periodically with the piss of citizens...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Proctologist       | black markets, collapse of governments.







From nobody at REPLAY.COM  Wed May 13 23:31:59 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 13 May 1998 23:31:59 -0700 (PDT)
Subject: NoT
Message-ID: <199805140631.IAA04681@basement.replay.com>


Fly Windows NT:
All the passengers carry their seats out onto the tarmac, placing the 
chairs
in the outline of a plane. They all sit down, flap their arms and make 
jet
swooshing sounds as if they are flying.






From alt1 at snowhill.com  Thu May 14 00:41:31 1998
From: alt1 at snowhill.com (Al Thompson)
Date: Thu, 14 May 1998 00:41:31 -0700 (PDT)
Subject: 
Message-ID: <199805140741.CAA16138@frost.snowhill.com>


At 02:35 AM 5/14/98 +0200, Anonymous wrote:
>I was looking at my RAM when I noticed several passwords I have 
>frequently used were still there, and as I never turn off my comp, I 
>was wondering if there is a way you can "clean" your RAM?
>I also got errors when installing LILO on my DOS partition, so now I 
>*CAN'T* boot without a bootdisk, and I think LILO sticks itself on 
  
Use LOADLIN instead.  It's much nicer, and a LOT faster than LILO, and
doesn't require a boot floppy.
 
I would have replied only to you, except for the fact that you posted
anonymously.







From postmaster at xxxmail.net  Thu May 14 01:10:43 1998
From: postmaster at xxxmail.net (XXX Mail Service)
Date: Thu, 14 May 1998 01:10:43 -0700 (PDT)
Subject: Are you getting traffic for free?
Message-ID: <3.0.3.32.19980513172010.00a0b168@208.15.12.231>



If you are not getting traffic for FREE, the check out Sex Button;

http://www.sexbutton.com

The #1 way to generate fresh traffic to your site at no cost to yourself
when you use EXIT mode.  Unlike other programs Sex Button does not send all
*your* traffic to sponsors and click thru programs, it goes back to you.

 - Fresh traffic
 - More uniques
 - No sponsors
 - No banners
 - Traffic increase for free
 - Three different modes

Thanks for your time.


----------------------------------


Looking for content?

Then check out the #1 content on the 'net;

http://www.scarlett.net/starter







From StanSqncrs at aol.com  Thu May 14 01:14:09 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Thu, 14 May 1998 01:14:09 -0700 (PDT)
Subject: A 'Nobody' Out From 'Obscura'
Message-ID: <1cbf5f47.355aa786@aol.com>


In a message dated 5/14/98 1:28:03 AM Central Daylight Time, tcmay at got.net
writes:

<< > Bad beginning, Sir Will.  The willingness to pass along material of
dubious
 > authenticity is not a good sign in my book. As Mr. Natural would say,
"Check
 > your source."  So, what *IS* your source?
 
 This qualifies as an Official News Story Quote under the guidelines 
 released by 'True Lies On The InterNet Coommiittee' which was formed
 on Oct. 3, 1954. >>

Maybe so, but does something 4 years old qualify as "news"?  Only to a
victim(/perpertrator) of a anti-reality campaign.

Stan





From nobody at REPLAY.COM  Thu May 14 04:33:30 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 14 May 1998 04:33:30 -0700 (PDT)
Subject: Anymous twit dealing in hypocracy
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805141133.NAA13097@basement.replay.com>


wmcclatc at primenet.com (William J. McClatchie) wrote:

> X-Comment: Aw, are you offended?

[...]

> > Do you operate a remailer, McClatchie?
>  
> Do you? Which one?
>
> Personally, too many people use them for abusive purposes these days to
> feel like making the effort.  Just look in triangle.general for posts from
> nobody at replay.com for an example of someone using a remailer to harrass
> someone else.

Perhaps you ought to reread your own header line, if you don't like what is
being posted:  "Aw, are you offended>".  Many remailer users utilize them
to avoid retaliation for hypersensitive netcops like you, Gary Burnore, and
Steve Crisp.

If everyone posted strictly politically correct content that wouldn't offend
anyone, there would be little need for anonymity.  But threatening to
"beat the living fuck out of" someone because he disagreed with what someone
posted is ample reason to withhold one's name and e-mail address.

If you don't like to read anonymous posts, please feel free to learn the
proper use of a killfile, McClatchie.  BTW, only one of us is using a
proper, RFC-compliant e-mail address in the From: line.





From markt at harlequin.co.uk  Thu May 14 05:08:33 1998
From: markt at harlequin.co.uk (Mark Tillotson)
Date: Thu, 14 May 1998 05:08:33 -0700 (PDT)
Subject: Chaffing and winnowing
In-Reply-To: <874syut9ld.fsf@wsuse5.mckesson.com>
Message-ID: <199805141207.NAA00226@spike.long.harlequin.co.uk>


Stephen Zander  wrote:
| 
| But wasn't that the gist of Rivest's paper: he's not encrypting the
| message, he's just obscuring it really, really well.

His point is that the message packets start out readable, and then by
adding other packets (not altering the originals) you gain security,
whether intentional or not - apparently encryption is performed by
accident and without a key.

So he argues that since this technique transforms a cleartext stream
to a secure one without use of any cryptographic technique or
algorithm, no act of encryption has happened.

However it is not that simple - for a start to gain real security you have
to be careful to mingle streams in very precise ways, to lose the
temporal statistics that give away the origins of each packet - you
have to match wheat to chaff on a packet by packet basis to get good
security.  Furthermore you have to use a CSRNG or true random source
to generate fake MACs, or have another MAC key for the complementary
stream(s) - It is not so easy to say that these precautions could be an
accidental act, or that they are entirely non-cryptographic.

However I view the process rather differently.  There are two channels
- the message is carried in the MAC and in the plaintext bits.
Chaffing simply serves to obliterate the plaintext channel.  The
recipient doesn't need to get the plaintext bits at all - they can
simply try the MAC against both 0 and 1, and choose the correct one.
(although this doubles the workload)

Furthermore an "attacker" can't tell, without breaking the MAC scheme,
whether the plaintext is genuine or a blind, and so this makes
chaffing/winnowing an ideal carrier of steganography.  It's like
sending a plaintext file and a ciphertext file together, with an
assertion that they correspond - unless you can prove this assertion
how can an outsider be convinced you are not hiding information in the
ciphertext file?  How can you prove this assertion without giving away
your MAC key?  How can you demonstrate you are using a MAC and not
simply triple-DES?


__Mark
[ markt at harlequin.co.uk | http://www.harlequin.co.uk/ | +44(0)1954 785433 ]






From banisar at epic.org  Thu May 14 05:17:36 1998
From: banisar at epic.org (Dave Banisar)
Date: Thu, 14 May 1998 05:17:36 -0700 (PDT)
Subject: 1998 EPIC Crypto Conference - Last week for Reduced Registration
Message-ID: 




   Top Government Officials, Industry Leaders, Cryptography Experts
      and Public Interest Advocates to Discuss Encryption Policy

                 *** Last week for Early Registration ***

                     *** CLE Credit Application Filed ***

                             Washington, DC
                          Monday, June 8, 1998

                  http://www.epic.org/events/crypto98/

Top government officials -- including Senator John Ashcroft (R-MO),
William Reinsch (Undersecretary of Commerce for Export Administration)
and Robert Litt (Principal Associate Attorney General) -- will discuss
current U.S. encryption policy at the largest policy conference on
cryptography ever held in Washington, D.C.  Other leading experts from
government, industry, the public interest community and academia will
also debate important legal, political and technical issues. If you are
interested in cryptography policy, this is the one meeting you must
attend!

The 1998 EPIC Cryptography and Privacy Conference is organized by the
Electronic Privacy Information Center, in cooperation with the Harvard
University Information Infrastructure Project and the Technology
Policy Research Group of the London School of Economics.


- THE 1998 EPIC CRYPTOGRAPHY AND PRIVACY CONFERENCE -

HIGHLIGHTS

   o Meet the technical experts, industry leaders, litigators, and
     policy makers who are shaping the global debate over encryption
     and privacy.

   o Get the latest news, reports, legislative information, and
     technical results.

   o Receive the 1998 edition of the highly-acclaimed EPIC Cryptography
     and Privacy Sourcebook.

   o Receive Continuing Legal Education Credits (CLE).


THE PANELS

   o Top U.S. government officials will debate top industry
     representatives on current U.S. policy on domestic restrictions,
     export controls, and pending legislation.

   o A panel of senior government officials from France, England,
     Canada, Germany and the European Union will describe encryption
     policies in their countries and future trends.

   o Leading cryptographers and technical experts will discuss the
     dangers and benefits of key escrow and key recovery systems and
     other important technical issues.

   o Attorneys representing the plaintiffs and the U.S. Government in
     the pending legal challenges to the constitutionality of export
     controls will discuss and debate the cases and their outcomes.


FEES:

Register before May 15 for reduced fee.

   Standard

       o $300.00 (before May 15) / $400.00 (after May 15)

   Academic/Govt/501(c)(3)

       o $150.00 (before May 15) / $200.00 (after May 15)


MORE INFORMATION, FULL AGENDA AND ONLINE REGISTRATION:

     http://www.epic.org/events/crypto98/

-------
David Banisar (Banisar at epic.org)                *    202-544-9240 (tel)
Electronic Privacy Information Center           *    202-547-5482 (fax)
666 Pennsylvania Ave, SE, Suite 301             *    HTTP://www.epic.org
Washington, DC 20003 * PGP Key  http://www.epic.org/staff/banisar/key.html








From tcmay at got.net  Thu May 14 09:07:25 1998
From: tcmay at got.net (Tim May)
Date: Thu, 14 May 1998 09:07:25 -0700 (PDT)
Subject: A 'Nobody' Out From 'Obscura'
In-Reply-To: <1cbf5f47.355aa786@aol.com>
Message-ID: 


At 1:12 AM -0700 5/14/98, StanSqncrs wrote:
>In a message dated 5/14/98 1:28:03 AM Central Daylight Time, tcmay at got.net
>writes:
>
><< > Bad beginning, Sir Will.  The willingness to pass along material of
>dubious
> > authenticity is not a good sign in my book. As Mr. Natural would say,
>"Check
> > your source."  So, what *IS* your source?
>
> This qualifies as an Official News Story Quote under the guidelines
> released by 'True Lies On The InterNet Coommiittee' which was formed
> on Oct. 3, 1954. >>

Stan ("and the Sequencers") quotes me as saying things I never said.


--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.








From jya at pipeline.com  Thu May 14 09:12:57 1998
From: jya at pipeline.com (John Young)
Date: Thu, 14 May 1998 09:12:57 -0700 (PDT)
Subject: Public Key Royalties
Message-ID: <199805141609.MAA22580@camel8.mindspring.com>


In a recent GAO report on governmental funding of university research
there is this note:

   In fiscal year 1996, the commercialization of the public key encryption 
   method, which was developed under grants from the Navy and NSF, 
   resulted in $271,875 in royalties to MIT.

Does this refer to RSA or PGP? Did the Navy underwrite RSA's PK work?
If so does the USG have a secret stake in PGP, Network Associates
and RSA?

More: did the Navy guide PK researchers based on the secret UK PK work 
before Diffie-Hellman?

The full report:

   http://jya.com/rced-98-126.txt  (184K)







From bill.stewart at pobox.com  Thu May 14 10:08:21 1998
From: bill.stewart at pobox.com (bill.stewart at pobox.com)
Date: Thu, 14 May 1998 10:08:21 -0700 (PDT)
Subject: Chaffing and winnowing
In-Reply-To: <874syut9ld.fsf@wsuse5.mckesson.com>
Message-ID: <3.0.5.32.19980514092316.008c21f0@popd.ix.netcom.com>


[Is this still appropriate for coderpunks?]

At 01:07 PM 5/14/98 +0100, Mark Tillotson wrote:
>However I view the process rather differently.  There are two channels
>- the message is carried in the MAC and in the plaintext bits.
>Chaffing simply serves to obliterate the plaintext channel.  The

But it _doesn't_ obliterate the plaintext channel;
it just obfuscates it a lot.

>recipient doesn't need to get the plaintext bits at all - they can
>simply try the MAC against both 0 and 1, and choose the correct one.
>(although this doubles the workload)

Depending on how sequence numbers are managed, it doesn't 
need to double it - if you try the MAC for 0, it either
succeeds or fails, and in either case you don't need to 
check the MAC for 1.  If you're using a shorter MAC which
might have collisions (e.g. 8 bits of a real MAC), you need to
check both, since both 0 and 1 could pass, trashing the bit,
and if you're using the "First different bit in MAC(0) and MAC(1)"
technique you obviously need to calculate both.

>Furthermore an "attacker" can't tell, without breaking the MAC scheme,
>whether the plaintext is genuine or a blind, and so this makes
>chaffing/winnowing an ideal carrier of steganography.  It's like
>sending a plaintext file and a ciphertext file together, with an
>assertion that they correspond - unless you can prove this assertion
>how can an outsider be convinced you are not hiding information in the
>ciphertext file?  How can you prove this assertion without giving away
>your MAC key?  How can you demonstrate you are using a MAC and not
>simply triple-DES?

It's easy to demonstrate that the wheat channel is using real MACs -
if you're hauled into court for some violation or lawsuit,
you can probably be ordered to deliver the key (if you kept it),
since it's "not" being used to keep the message secret,
"only" to authenticate it.  

For the chaffing techniques that can use random chaff, though, 
you really can't prove that the "random" numbers are random 
as opposed to stegotext without giving up the stegotext
unless they're generated by a pseudo-random algorithm
which uses a key you can reproduce (as opposed to a 
session key from /dev/random.)

Will the real use of chaffing/winnowing be to send
uninteresting cover traffic and carry stegotext as chaff?
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From StanSqncrs at aol.com  Thu May 14 10:26:19 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Thu, 14 May 1998 10:26:19 -0700 (PDT)
Subject: A 'Nobody' Out From 'Obscura'
Message-ID: <41a646f.355b28e4@aol.com>


In a message dated 5/14/98 11:07:23 AM Central Daylight Time, tcmay at got.net
writes:

<< At 1:12 AM -0700 5/14/98, StanSqncrs wrote:
 >In a message dated 5/14/98 1:28:03 AM Central Daylight Time, tcmay at got.net
 >writes:
 >
 ><< > Bad beginning, Sir Will.  The willingness to pass along material of
 >dubious
 > > authenticity is not a good sign in my book. As Mr. Natural would say,
 >"Check
 > > your source."  So, what *IS* your source?
 >
 > This qualifies as an Official News Story Quote under the guidelines
 > released by 'True Lies On The InterNet Coommiittee' which was formed
 > on Oct. 3, 1954. >>
 
 Stan ("and the Sequencers") quotes me as saying things I never said. >>

Look, nobody (IMHO), I quoted another FreeGroupie.  Then I quoted YOU involved
in a 'red-herring' (unless someone forged your address) - "This qualifies as
an Official News Story Quote under the guidelines released by 'True Lies On
The InterNet Coommiittee' which was formed on Oct. 3, 1954."

Keep it up, Tim.

Stan





From StanSqncrs at aol.com  Thu May 14 11:50:12 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Thu, 14 May 1998 11:50:12 -0700 (PDT)
Subject: A 'Nobody' Out From 'Obscura'
In-Reply-To: <41a646f.355b28e4@aol.com>
Message-ID: <355B3D07.605D@aol.com>


StanSqncrs wrote:
> In a message dated 5/14/98 11:07:23 AM Central Daylight Time, tcmay at got.net
> writes:

>>  Stan ("and the Sequencers") quotes me as saying things I never said. >>

> Look, nobody (IMHO), I quoted another FreeGroupie.  Then I quoted YOU involved
> in a 'red-herring' (unless someone forged your address) - "This qualifies as
> an Official News Story Quote under the guidelines released by 'True Lies On
> The InterNet Coommiittee' which was formed on Oct. 3, 1954."
> 
> Keep it up, Tim.

Boy, do I feel like an idiot!!!

I got my head out of my ass and checked out the headers on some
of the messages coming from the list and discovered that many
of them, including the one I am referring to above, are forgeries
by Ulf Moller (who has those two 'eyes' over the 'o' in his name,
just like the eye in the pyramid on the US dollar-bill, which 
means he must be a Bavarian Illuminati shill).

Received: (from cpunks at localhost) by einstein.ssz.com (8.6.12/8.6.9) id UAA02347 for 
cypherpunks at algebra.com; Wed, 13 May 1998 20:33:59 -0500
Received: from public.uni-hamburg.de (public.uni-hamburg.de [134.100.41.1]) by 
einstein.ssz.com (8.6.12/8.6.9) with ESMTP id UAA02311 for 
; Wed, 13 May 1998 20:33:32 -0500
Received: from paris.public.uni-hamburg.de (max2-145.public.uni-hamburg.de 
[134.100.45.145])
Received: by ulf.mali.sub.org (Smail3.1.28.1 #1)
Message-Id: 
Date: Thu, 14 May 98 03:15 +0200
From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
To: cypherpunks at einstein.ssz.com, mix-l at jpunix.com
Subject: Re: "... would cause us to look at this person as a threat"


I would like to apologize to Tim, and to all of the other
cypherpunks that I have offended by my stupid, ignorant posts
and attitude on the list.
I'm not really a CypherPunk. I don't even suck cock!
(OK, I sucked my brother's cock a little, when I was younger,
 but that was just 'experimentation', OK? By the time I was
 nine, I had started fucking my little sister, so that *proves*
 I'm straight, eh?)

Anyway, I don't think we should put up with this shit from Ulf
(DoubleEye Illuminati) Moller. Let's all spam him.

Stan Guildenstern
http://A(h)OL(e).commie/Boy_Am_I_Stupid!!!.html






From StanSqncrs at aol.com  Thu May 14 12:33:24 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Thu, 14 May 1998 12:33:24 -0700 (PDT)
Subject: A 'Nobody' Out From 'Obscura'
Message-ID: 


Obviously, this is a forgery, it isn't me, my guess is, it's our 'nobody' -

<< Boy, do I feel like an idiot!!!
 
 I got my head out of my ass and checked out the headers on some
 of the messages coming from the list and discovered that many
 of them, including the one I am referring to above, are forgeries
 by Ulf Moller (who has those two 'eyes' over the 'o' in his name,
 just like the eye in the pyramid on the US dollar-bill, which 
 means he must be a Bavarian Illuminati shill).
 
 Received: (from cpunks at localhost) by einstein.ssz.com (8.6.12/8.6.9) id
UAA02347 for 
 cypherpunks at algebra.com; Wed, 13 May 1998 20:33:59 -0500
 Received: from public.uni-hamburg.de (public.uni-hamburg.de [134.100.41.1])
by 
 einstein.ssz.com (8.6.12/8.6.9) with ESMTP id UAA02311 for 
 ; Wed, 13 May 1998 20:33:32 -0500
 Received: from paris.public.uni-hamburg.de (max2-145.public.uni-hamburg.de 
 [134.100.45.145])
 Received: by ulf.mali.sub.org (Smail3.1.28.1 #1)
 Message-Id: 
 Date: Thu, 14 May 98 03:15 +0200
 From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
 To: cypherpunks at einstein.ssz.com, mix-l at jpunix.com
 Subject: Re: "... would cause us to look at this person as a threat"
 
 
 I would like to apologize to Tim, and to all of the other
 cypherpunks that I have offended by my stupid, ignorant posts
 and attitude on the list.
 I'm not really a CypherPunk. I don't even suck cock!
 (OK, I sucked my brother's cock a little, when I was younger,
  but that was just 'experimentation', OK? By the time I was
  nine, I had started fucking my little sister, so that *proves*
  I'm straight, eh?)
 
 Anyway, I don't think we should put up with this shit from Ulf
 (DoubleEye Illuminati) Moller. Let's all spam him.
 
 Stan Guildenstern
 http://A(h)OL(e).commie/Boy_Am_I_Stupid!!!.html >>





From protozoa at gwyn.tux.org  Thu May 14 13:50:48 1998
From: protozoa at gwyn.tux.org (K. M. Ellis)
Date: Thu, 14 May 1998 13:50:48 -0700 (PDT)
Subject: EPIC Crypto Conference - last week for reduced registration (fwd)
Message-ID: 




   Top Government Officials, Industry Leaders, Cryptography Experts
      and Public Interest Advocates to Discuss Encryption Policy

                 *** Last week for Early Registration ***

                     *** CLE Credit Application Filed ***

                             Washington, DC
                          Monday, June 8, 1998

                  http://www.epic.org/events/crypto98/

Top government officials -- including Senator John Ashcroft (R-MO),
William Reinsch (Undersecretary of Commerce for Export Administration)
and Robert Litt (Principal Associate Attorney General) -- will discuss
current U.S. encryption policy at the largest policy conference on
cryptography ever held in Washington, D.C.  Other leading experts from
government, industry, the public interest community and academia will
also debate important legal, political and technical issues. If you are
interested in cryptography policy, this is the one meeting you must
attend!

The 1998 EPIC Cryptography and Privacy Conference is organized by the
Electronic Privacy Information Center, in cooperation with the Harvard
University Information Infrastructure Project and the Technology
Policy Research Group of the London School of Economics.


- THE 1998 EPIC CRYPTOGRAPHY AND PRIVACY CONFERENCE -

HIGHLIGHTS

   o Meet the technical experts, industry leaders, litigators, and
     policy makers who are shaping the global debate over encryption
     and privacy.

   o Get the latest news, reports, legislative information, and
     technical results.

   o Receive the 1998 edition of the highly-acclaimed EPIC Cryptography
     and Privacy Sourcebook.

   o Receive Continuing Legal Education Credits (CLE).


THE PANELS

   o Top U.S. government officials will debate top industry
     representatives on current U.S. policy on domestic restrictions,
     export controls, and pending legislation.

   o A panel of senior government officials from France, England,
     Canada, Germany and the European Union will describe encryption
     policies in their countries and future trends.

   o Leading cryptographers and technical experts will discuss the
     dangers and benefits of key escrow and key recovery systems and
     other important technical issues.

   o Attorneys representing the plaintiffs and the U.S. Government in
     the pending legal challenges to the constitutionality of export
     controls will discuss and debate the cases and their outcomes.


FEES:

Register before May 15 for reduced fee.

   Standard

       o $300.00 (before May 15) / $400.00 (after May 15)

   Academic/Govt/501(c)(3)

       o $150.00 (before May 15) / $200.00 (after May 15)


MORE INFORMATION, FULL AGENDA AND ONLINE REGISTRATION:

     http://www.epic.org/events/crypto98/

-------
David Banisar (Banisar at epic.org)                *    202-544-9240 (tel)
Electronic Privacy Information Center           *    202-547-5482 (fax)
666 Pennsylvania Ave, SE, Suite 301             *    HTTP://www.epic.org
Washington, DC 20003 * PGP Key  http://www.epic.org/staff/banisar/key.html








From jackson at usenix.ORG  Thu May 14 14:11:03 1998
From: jackson at usenix.ORG (Jackson Dodd)
Date: Thu, 14 May 1998 14:11:03 -0700 (PDT)
Subject: Announcing the Call for Papers - USENIX 1999 Annual Conference
Message-ID: <199805142113.OAA00295@usenix.ORG>



The Program Chair, Avi Rubin of AT&T Labs - Research, and the Program
Committee announce the availability of the Call for Papers for:

1999 USENIX ANNUAL TECHNICAL CONFERENCE
June 7-11, 1999
Monterey Conference Center, Monterey, California

Sponsored by USENIX, the Advanced Computing Systems Association

================================================
Call for Papers at
    http://www.usenix.org/events/usenix99/cfp.html

Paper submissions due:  December 2, 1998
================================================

The Program Committee seeks original and innovative papers on the
applications, architecture, implementation, and performance of modern
computing systems. Papers that analyze problem areas and draw important
conclusions from practical experience are especially welcome. Some
particularly interesting application topics are:

               Availability
               Distributed caching and replication
               Embedded systems
               Extensible operating systems
               File systems and storage systems
               Interoperability of heterogeneous systems
               Mobile code
               Mobile computing
               Multimedia
               New algorithms and applications
               Personal digital assistants
               Quality of service
               Reliability
               Security and privacy
               Ubiquitous computing and messaging
               Web technologies

Invited Talk and tutorial suggestions and proposals are also very 
welcome.
====================================================================
USENIX is the Advanced Computing Systems Association.  Its members 
are the computer technologists responsible for many of the innovations 
in computing we enjoy today.  To find out more about USENIX, visit its 
web site: http://www.usenix.org.






From hugh at road.toad.com  Thu May 14 14:57:25 1998
From: hugh at road.toad.com (Hugh Daniel)
Date: Thu, 14 May 1998 14:57:25 -0700 (PDT)
Subject: ANNOUNCE:  FreeS/WAN IPSEC & IKE version 0.8 released & useful!
Message-ID: <199805142156.OAA24052@road.toad.com>


  I would like to announce for the FreeS/WAN software team that they
now have a freeswan-0.8 release available for download from the
FreeS/WAN home page at:
	  http://www.xs4all.nl/~freeswan

  The 0.8 (and target 1.0 in June) runs only in a VPN (tunnel) mode,
protecting and encrypting net traffic for a subnet behind the SG.
This setup is called a SG for Security Gateway.  We plan on
implementing the rest of the IPSEC and IKE draft standards in our 2.0
release later this summer for the 2.1.xxx and 2.2.xx series Linux
kernels.

  There is some useful documentation for the current FreeS/WAN done by
Kai Martius at:
    http://www.imib.med.tu-dresden.de/imib/Internet/index.html

  The 0.8 release has been tested extensively in the hand keyed
ESP-3DES-HMAC-MD5-96 tunnel mode and is quite robust.  On a 150Mhz 586
Clone PC TCP throughput is over 320 Kbytes/second sustained as
measured by netperf.
  The IKE daemon pluto has been tested only a very little and
sometimes works and sometimes does not.  It will work for the simple
VPN case before 1.0.

  Feedback, new features, documentation, scripts and bug fixes &
reports are especially useful in the next few weeks before we start in
on the 0.9x series of release working up to a stable 1.0 release in
June.  Don't wait for the last minute to submit that neat feature or
bug fix, as we might not have time to include it!

  If you have questions about the project please see our home page
where you will find a mail list, list archives, FTP directory's etc.
  Thanks to everyone who made this release possible, but mostly the
people who coded it up!

  Please post all bugs, fixes, code etc. to the public email list at
.

		||ugh Daniel
		hugh at toad.com
			Systems Testing & Project mis-Management
			The Linux FreeS/WAN Project
			http://www.xs4all.nl/~freeswan






From jya at pipeline.com  Thu May 14 15:03:40 1998
From: jya at pipeline.com (John Young)
Date: Thu, 14 May 1998 15:03:40 -0700 (PDT)
Subject: SecureOffice Challenge
Message-ID: <199805142203.SAA11962@camel8.mindspring.com>


Kathleen Ellis has announced on Cryptography that
she has put a copy of SecureOffice on her Web site
in support of Charles Boother and against the BXA 
subponea of his records concerning export of his
168-bit encryption program:

    http://www.filesafety.com/

We are pleased to join Kathleen by putting SecureOffice
on our site, with the thread on civil disobedience at:

   http://jya.com/bxa-syncsys.htm







From gburnore at netcom.com  Thu May 14 16:22:56 1998
From: gburnore at netcom.com (Gary L. Burnore)
Date: Thu, 14 May 1998 16:22:56 -0700 (PDT)
Subject: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC)
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <355c7cd1.523967461@206.214.99.10>


On 14 May 1998 12:03:51 GMT, in article <6jemj7$6km at news1.cheetah.net>,
mefisto at ns1.cheetah.net () wrote:

:9AD67.6649 at pageplanet.com> <199805131942.VAA17993 at basement.replay.com>
:Distribution: 
:
:Anonymous (nobody at REPLAY.COM) wrote:
:: Steve Crisp  And it still stands. Come out of hiding and see if you survive the
:: > night.
:: >  
:: > Steve Crisp
:
:: Does anyone question the need for the ability to post anonymously with
:[--]
::    PagePlanet (PAGEPLANET-DOM)
:
:What's the big deal.  Anyone doing a whois can find this and any other
:address.  They ARE published openly and UN-ANONYMOUSLY.	 You think you
:invented something?

My guess is that PagePlanet is his next target.  He did the same thing to
DataBasix (and me).

-- 
        for i in databasix netcom primenet ; do ; gburnore@$i ; done
---------------------------------------------------------------------------
                  How you look depends on where you go.
---------------------------------------------------------------------------
Gary L. Burnore                       |  �۳�ݳ޳�ݳ��ۺݳ޳�ݳݳ޳�ݳ��۳
                                      |  �۳�ݳ޳�ݳ��ۺݳ޳�ݳݳ޳�ݳ��۳
DOH!                                  |  �۳�ݳ޳�ݳ��ۺݳ޳�ݳݳ޳�ݳ��۳
                                      |  �۳ 3 4 1 4 2  ݳ޳ 6 9 0 6 9 �۳
spamgard(tm):  zamboni                |     Official Proof of Purchase
===========================================================================
             PGPprint: C63B CF4E 1B71 4D7E C6F8 AF4E 338D 5CB4
    KeyID: 0x0F7EDBD9 (RSA)     finger gburnore at netcom.com for public key
---------------------------------------------------------------------------





From wcoile at home.atlantech.net  Thu May 14 17:44:34 1998
From: wcoile at home.atlantech.net (wcoile at home.atlantech.net)
Date: Thu, 14 May 1998 17:44:34 -0700 (PDT)
Subject: ignore
Message-ID: <199805150044.UAA27560@home.atlantech.net>


only a test..





From goodnews4u at mailexcite.com  Thu May 14 19:04:27 1998
From: goodnews4u at mailexcite.com (goodnews4u at mailexcite.com)
Date: Thu, 14 May 1998 19:04:27 -0700 (PDT)
Subject: El Nino !!!
Message-ID: <199805150204.TAA14141@cygint.cygnus.com>



                                            El Nino

Learn how to be an informed investor and how a $1.00 realized 
gain in your
grain option value could return as much as $25,000 on a minimum 
investment
of $5,000.

Why Invest Now?


The 1982-1983 El Nino was the strongest of the century spreading 
drought,
floods and extreme weather across the vast stretches of the 
globe.  Total
combined losses to property and agriculture from weather related
catastrophes are estimated to have exceeded $10 billion.  The 
current El
Nino  has already surpassed the 1982-1983 event in magnitude and 
is expected
to have major impacts on world weather through the summer of 
1998.


How realistic is it that the grain option prices will move one 
dollar?


1982-1983 El NINO IMPACT ON AGRICULTURAL PRODUCTS FUTURES PRICES

corn:        Nov. 1982-$2.165/bushel (low)      Aug. 1983-  
3.76/bushel
(high)     $1.59 increase

soybeans:    Oct. 1982 $5.18/ bushel  (low)     Sep. 1983-  
$9.60/ bushel
(high)    $4.42 increase


That's the past.  What does the future hold?


It remains to be seen if the 1997-1998 El Nino will duplicate the 
severe
weather conditions that affected agriculture production around 
the globe in
1982-1983.  However, given the historically tight supplies and 
record demand
for corn and sobeans repectively, combined with the strength of 
the current
El Nino event along with grain prices starting out from 
multi-year lows,  it
is our opinion that there is the potential for dramatic price 
increases in
the futures and options prices of agricultural products.


How do I receive my free information on the corn and soybean 
markets?
Call Us at 1-800-526-4922, 24 Hrs. a day, seven days a week ,
Please include: (no packages can be
sent without the following)

*NAME

*ADDRESS

*PHONE#

*BEST TIME TO CALL



An American Research & Trading, Inc., Series 3 registered 
commodity broker
will call to confirm the request for information.  All American 
Research &
Trading, Inc. brokers are registered with the National Futures 
Association
(NFA) and the Commodity Futures Trading Commission (CFTC).

Please only serious inquiries.

Past performance is not necessarily indicative of future results. 
 You could
lose part or all of your investment.  However, when purchasing 
options, your
risk is predetermined to the amount you invest.  Commission and 
fees will
impact the total amount Returned to the client. Options do not 
move dollar
for dollar with the underlying futures contract until expiration 
date. No
implication is being made that any American Research & Trading, 
Inc. client
has or will obtain such a profit.

To remove your name from our mailing list, please send an e-mail 
to:
jcooley245 at aol.com

put the word "remove" along with your e-mail address.  We will 
immediately
remove your name.











ns
BD
p-g-d
58-n+t
9-1
c#d
d
 
 
 
 
 
 
 
 
 
 





From nobody at REPLAY.COM  Thu May 14 19:15:40 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 14 May 1998 19:15:40 -0700 (PDT)
Subject: Non-anonymous remailers
Message-ID: <199805150215.EAA08803@basement.replay.com>


Recently a new technology has been proposed: non-anonymous remailers.

A non-anonymous remailer separates the two traditional functions of the
remailer network: anonymity and avoiding traffic analysis.  Because the
network provides both of these features, some people may not be aware
that they are distinct.

Anonymity means that no one can tell who sent a message.  Neither the
recipient, the remailers, or an eavesdropper can know the source of
a message.

Avoiding traffic analysis means making it impossible for the path a
message takes through the network to be traced, either by the remailers
or by third parties.

A non-anonymous remailer avoids traffic analysis but does not provide
anonymity.  The recipient can tell who the sender of a message is,
but no one else can, neither the remailers nor eavesdroppers.

There are several ways to achieve this cryptographically.  The general
idea is that the sender of the message must sign it with a valid public
key (one signed by a CA trusted by the remailer network).  This signature
is hidden from everyone but the recipient because the message is encrypted
for the recipient.  However the sender can use variants of zero knowledge
proofs to demonstrate that inside the encryption there is a signature
which satisfies the requirements.

The remailer net will only deliver a message to an end user if it is able
to verify that the message, when decrypted, will be properly signed.
This assures that the end user will be able to determine who sent the
message, while no one else will.

Non-anonymous remailers would be suitable for cases where people do
not want eavesdroppers to know with whom they are communicating, but
where they don't need to be anonymous to their communication partners.
A financial house's merger and acquisitions department, for example,
would not want third parties to know with whom they are exchanging
email.  A surveillance target will want to hide the identities of his
co-conspirators.  An employee who is considering changing jobs will
not want his employer to know that he is sending email to a competitor.
Many similar examples exist.

Non-anonymous remailers would also have the advantage that they would be
much less prone to abuse than anonymous remailers.  Sending a harrassing
message or commercial spam through a non-anonymous remailer would be
pointless.  It might as well have been sent directly, since the remailer
does not hide the sender's identity from the recipient.

In summary, non-anonymous remailers prevent traffic analysis without
providing anonymity.  This more limited functionality renders the remailer
less vulnerable to abuse and misuse, while providing protection which
will be adequate for many situations, and which may be especially
appropriate for the business environment.

25BA1A9F5B9010DD8C752EDE887E9AF3 [Cantsin Protocol No. 2]
092AA1EC9926D468F8964B8EF537DDC1782A1281
5838A82465D8E6D05769B3A837D8C43CBF2C5500
-AE8 AE8
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
2CD5E0D37250DE32D9A1A7229DB8D9DC5F3CA35BFD7E3F7F09612F4444ABE4FAB47097F9BF4D82DDD2FD5FF7770B1F80369EEBC9703265DE03B24ABEA9E584839569156638A5D21005CF06550392B45076B3026E25104F91B59FB994E89B4F15A168790CAC3ADD030EBC06E5C96086FBF7B17369E4D102725FA779784BACD67812B39E71003FE4741B57ECF814A1053F290F46FD07F48E5DA586FECCA62D3ABC54C15D8652F1FFDCE8D7C312486BC643F9AFE70518084644293643DF638172545B08D93CF6E2664211330A4555E8774B665C9CA344ABB698B6C709E767F9ECB8F78DB4B12F2271D15DC8D5A9E355A9C0F6CC413906E188A52B1AEB6009BAC5EA





From sendoff6 at hotmail.com  Thu May 14 20:21:51 1998
From: sendoff6 at hotmail.com (sendoff6 at hotmail.com)
Date: Thu, 14 May 1998 20:21:51 -0700 (PDT)
Subject: Find out what "They" don't want you to know!
Message-ID: <031297055501222@g_fantism.com>



Dear Friend:
 
 If you have already responded to the following announcement a few 
 days ago, that means your package is already on its way and it 
 should be arriving soon! If you have not responded to this before, 
 please pay attention to it now. This is very important!!!
 
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!
 
 IMPORTANT ANNOUNCEMENT
 IMPORTANT ACCOUNCEMENT
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 '''''''''''''''''''''''''''
 Your future May Depend on it !
 
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!
 
 Before you know about this 'Important Announcement', you must 
 first read the following 'Editorial Excerpts' from some important 
 publications in the United States:
 
 NEW YORK TIMES: "In concluding our review of Financial 
 organizations to effect change in the 90's, special attention 
 should be called to a California based organization, 'WORLD 
 CURRENCY CARTEL'. Members of this organization are amassing 
 hundred of millions of dollars in the currency market using a very 
 LEGAL method which has NEVER been divulged to the general public. 
 While their purpose is not yet known, their presence has most 
 certainly been felt".
 
 NBC NIGHTLY NEWS: "Members of 'World Currency Cartel', who always 
 keep a low profile, are considered to be some of the most 
 wealthiest people in North America".
 
 More excerpts later, but first let us give you this very 
 'IMPORTANT ANNOUNCEMENT":
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 '''''''''
 We are glad to announce that for the first time and for a very 
 short period of time, WORLD CURRENCY CARTEL will instruct a 
 LIMITED number of people worldwide on 'HOW TO CONVERT $25 INTO ONE 
 HUNDRED OF LEGAL CURRENCY'. We will transact the first conversion 
 for you, after that you can easily and quickly do this on your own 
 hundreds or even thousands of times every month.
 TAKE ADVANTAGE OF THIS "SECRET FLAW" !
 ******************************************************************
 ******************************************************************
 ***
 
 It is even more explosive than we have yet disclosed. While 
 currency does fluctuate daily, we can show you 'HOW TO CONVERT $99 
 INTO $588 AS MANY TIMES AS YOU WANT'. That means, you will be able 
 to EXCHANGE $99, AMERICAN LEGAL CURRENCY DOLLARS, FOR $580 OF THE 
 SAME. You can do this as many times as you wish, every day, every 
 week, every month. All very LEGAL and effortlessly!
 
 It takes only 5 to 10 minutes each time you do this. You can do 
 this from home, office or even while traveling. All you need is 
 an access to a phone line and an address. Best of all, you can do 
 this from ANY CITY ON THIS EARTH!!!
 
 Again, we must reiterate, anyone can do this and the source is 
 NEVER-ENDING. For as long as the global financial community 
 continues to use different currencies with varying exchange rates, 
 the "SECRET FLAW" will exist.
 >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
 >>>>>>>>>>>>>>>>>>
 As we said earlier , we will do the first transaction for you and 
 will show you exactly how to do this on your own, over and over 
 again!
 
 The amount of exchange you would do each time is entirely up to 
 you. Working just 2 to 10 hours a week, you can soon join the list 
 of Millionaires who do this on a daily basis many times a day. The 
 transaction is so simple that even a high school kid can do it!
 
 We at the World Currency Cartel would like to see a uniform global 
 currency backed by Gold. But, until then, we will allow a LIMITED 
 number of individuals worldwide to share in the UNLIMITED PROFITS 
 provided for by the world currency differentials.
 
 We will espouse no more political views nor will we ask you to do 
 so. We can say however, that our parent organization, NDML, 
 benefits greatly by the knowledge being shared, as we 
 ourselves, along with YOU, benefit likewise. Your main concern 
 surely will be, how you will benefit.
 
 As soon as you become a member, you will make transactions from 
 your home, office, by telephone or through the mail. You can 
 conduct these transactions even while traveling.
 
 Don't believe us? Experience it for yourself!
 ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; 
 Unlike anyone else, we will assure you great financial freedom and 
 you will add to our quickly growing base of supporters and join 
 the list of MILLIONAIRES being created using this very "SECRET 
 FLAW" in the world currency market.
 ******************************************************************
 ******************************************************************
 ***
 
 DON'T ENVY US, JOIN US TODAY!!!
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 '''''''''
 There is a one time membership fee of only $195. BUT, if you join 
 us by June 9, 1998 date, you can join us for only $25 administrative 
 cost. Your  important documents, instructions, contact name/address, 
 phone number and all other pertinent information will be mailed to 
 you  immediately. So take advantage of our Anniversary date and join 
 us today.
 
 (If you are replying after June 9, you must pay $195.00 for 
 the membership fee. NO EXCEPTIONS, and no more E-mail inquiries 
 please).
 
 Upon becoming a member, you promise to keep all infos 
 CONFIDENTIAL!
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 ~~~~~~~~~~~~~~~~~~
 Should you choose to cancel your membership for any reason, you 
 must return all papers/documents for a refund within 60 days.
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 ~~~~~~~~~~~~~~~~~~
 
 IMPORTANT:
 ****************
 
 1...Please write your name & mailing address VERY CLEARLY on a 
 paper
 2...Below your mailing address, please write your E-mail address 
 (optional)
 3...At the top left hand corner, please write the words "NEW 
 MEMBER"
 4...Attach a CHECK or MONEY ORDER for $25 + $3 for the shipping of 
 documents (TOTAL = $28.00) PAYABLE TO      
      "NDML" and mail to:
 
                NDML
                PO BOX 311
                MILFORD, NJ 08848

*If outside US add an additional $10 (TOTAL + $38.00)
 
 }}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
 }}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
 }}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
 
 Here are some more 'Editorial Excerpts':
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 WALL STREET: "A discreet group of Americans, operating under the 
 guise of World Currency Cartel have recently begun making rumbles in 
 world finance market. While at this time, their game is not completely 
 known, they certainly will be watched by those making major moves in the 
 currency contracts".
 
 FINANCIAL WEEK: "Watch them, monitor them, extract their knowledge 
 and try to become one of them. That is the soundest financial 
 advice we could give to anyone".
 
 NATIONAL BUSINESS WEEKLY: "While this reporter has been left in 
 the cold as to its method of operation, we have been able to 
 confirm that 'World Currency Cartel' and its members are literally 
 amassing great fortunes overnight".
 
 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$END$$$$$$$$$$$$$$$$$$
 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
 We thankfully credit DIAMOND INT. for the content of this 
 IMPORTANT ANNOUNCEMENT.
 
 
 
 
  >>






From mixmaster at remail.obscura.com  Thu May 14 20:52:27 1998
From: mixmaster at remail.obscura.com (Mixmaster)
Date: Thu, 14 May 1998 20:52:27 -0700 (PDT)
Subject: test
Message-ID: <199805150331.UAA29933@sirius.infonex.com>


don't answer this.






From WEBMASTER at successads.com  Thu May 14 21:05:53 1998
From: WEBMASTER at successads.com (WEBMASTER at successads.com)
Date: Thu, 14 May 1998 21:05:53 -0700 (PDT)
Subject: MASTER MARKETER RESOURCE CD....
Message-ID: <199805150305.FAA04154@netsurf-pe.peine.netsurf.de>


Hello Fellow Marketer,

We have everything you need to promote your online
business and target your advertising!!

The "Master Marketers Resource CD."

This CD has over 20 Million categorized, targeted and
general email addresses! Targeted email addresses are 
by far the most expensive... but for a limited time, we 
are including them on the Master Marketers Resource CD.

Do not be mistaken... this offer is not like any other
you have ever received. We have seen randomly gathered
email address CD's selling for as much as $249.00 
Just one I received today was offering 15 million AOL 
addresses for $189.95!! They were not targeted, categorized,
or nothing! Just 15 million AOL addresses of who knows what.

We also have AOL addresses on the Master Marketers
Resource CD; 4,000,000... We also have addresses of
Business Opportunity Seekers; 1,000,000... Adult Web Site 
Subscribers; 135,000 (we sell this list alone for $250.00 - 
but it is included on this Resource CD). 

Investor oriented addresses; 300,000... E-Mail addresses 
sorted by city; 200,000... General consumer lists; 290,000 
Email addresses of those interested in Health; 230,000... 
and over 150,000 Food Enthusiasts!! Make no mistake!!... 
this is by far the best collection of email addresses available 
anywhere. 

In all... there are 11 categories (over 2,500,000 of targeted 
email addresses) and over 20,000,000 addresses from the top
three internet/online providers. We have also included a 
remove/undeliverable list that's over 100 meg in size!! We 
have already cleaned the addresses on the Master Marketer 
Resource CD using this massive remove file... they are ready to
mail right now.


As A Special Bonus...

In addition to the email addresses... we have also included
on the CD over 30 CGI Scripts (one will hide where your
mail is being sent to on your order forms - must have for 
taking orders). There are forum scripts, chat scripts and
just about any other cgi script you will ever need.

We have also included over 50 java scripts! Many are
scripts for adding rotating banners to your site, adding
scrolling ticker and marque messages and scripts that password
protect a page on your web site.

We have also included demos of over 15 of the top bulk
email programs on the Internet. Stealth, Rapid Fire, NetContact
and many more! We have also included demo's of email address
harvesters like Hurricane, Grabber and Atomic Harvestor that
let you extract fresh email addresses out of forums and
right out of web pages. 

There is much more on the CD than we can go into on a short
letter like this one (there is over 10 html editors, over
200 marketing reports and more). In all... in addition to
the bulk email and html editors... there is over 20 of the
top software programs on the Internet. From programs that
keep you connected to the Internet... to programs that let
you accept checks online (this one is a registered version)! 

You will save hours (if not weeks) in download time as we have
included the top shareware and freeware programs available
anywhere. 

If you are serious about making money on the Internet... you
must have the Master Marketers Resource Cd! There is nothing
like it currently available! 

If you are ready to target your advertising... you can order
the Master Marketers Resource CD by completing the form
below. Don't miss out... we are only selling a limited number
of the Master Marketer Resource CD's. In order to preserve the
responsiveness of the addresses, this offer may be withdrawn 
at anytime.

------------------------------------------------------------
Please note: Most of the software on the CD is shareware. If
you like it... buy it. We have included the programs because
we feel most are pertinent to Internet marketing.
-----------------------------------------------------------


"You can buy from the REST or you can buy from the BEST."   Your choice. 


>>> NOW ONLY $199.00!   

This price is effective for the next seven days, thereafter the price will be $249.00 so ORDER NOW!

To order our email package, simply print out the EZ ORDER FORM 
below and fax or mail it to our office today.

We accept Visa, Mastercard, Discover, Amex and  Checks by Fax and Mail.

_________________
EZ Order Form 
 

_____Yes! I would like to order the Master Marketers Resource CD
     Email addresses and much, much more for only $199.00.
 

*Please select one of the following for shipping..

____I would like to receive my package OVERNIGHT. I'm including 
$15 for shipping. (outside US add an additional $25 for shipping)

____I would like to receive my package 2 DAY delivery. I'm including 
$10 for shipping.  (outside US add an additional $25 for shipping)


DATE_____________________________________________________

NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________

PHONE NUMBERS__________________________________________

FAX NUMBERS_____________________________________________

EMAIL ADDRESS___________________________________________



TYPE OF CREDIT CARD: 

______VISA _____MASTERCARD ______AMEX______DISC

CREDIT CARD# __________________________________________

EXPIRATION DATE________________________________________

NAME ON CARD___________________________________________

AMOUNT $____________________
 

(Required) SIGNATURE:x________________________

DATE:x__________________


You may fax your order to us at:   1-704-784-5595

CHECK BY FAX SERVICES!

If you would like to fax a check, paste your check below and fax it to 
our office along with all forms to: 1-704-784-5595

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR 

CHECK HERE AND FAX IT TO US AT 1-704-784-5595


*******************************************************

If You fax a check, there is no need for you to send the original check. We will draft up a new check, with the exact information from your original check. All checks will be held for bank clearance.

If you feel more comfortable sending payment through the mail, 
please send all forms and Check or Money Order to:

CONSUMER CONNECTIONS
10223-B UNIV. CITY BLVD. #197 
CHARLOTTE, NC  28213








From bill.stewart at pobox.com  Thu May 14 21:57:04 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Thu, 14 May 1998 21:57:04 -0700 (PDT)
Subject: Non-anonymous remailers
In-Reply-To: <199805150215.EAA08803@basement.replay.com>
Message-ID: <3.0.5.32.19980514215643.007dfcc0@popd.ix.netcom.com>


At 04:15 AM 5/15/98 +0200, some allegedly anonymous person wrote:
>Recently a new technology has been proposed: non-anonymous remailers.

Feh - anybody who wants non-anonymous remailers should include his name :-)
On the other hand, perhaps the allegedly anonymous author didn't
believe the purported name of the alleged proposer, or chose to
phrase the proposal in the exculpatory passive voice.

>A non-anonymous remailer separates the two traditional functions of the
>remailer network: anonymity and avoiding traffic analysis.  Because the
>network provides both of these features, some people may not be aware
>that they are distinct.

Good point.  

>A non-anonymous remailer avoids traffic analysis but does not provide
>anonymity.  The recipient can tell who the sender of a message is,
>but no one else can, neither the remailers nor eavesdroppers.
>
>There are several ways to achieve this cryptographically.  The general
>idea is that the sender of the message must sign it with a valid public
>key (one signed by a CA trusted by the remailer network).  This signature
>is hidden from everyone but the recipient because the message is encrypted
>for the recipient.  However the sender can use variants of zero knowledge
>proofs to demonstrate that inside the encryption there is a signature
>which satisfies the requirements.

Overkill, and inadequate.  Let's start with overkill:
- If you require all outgoing email to be encrypted,
  you don't have constructive knowledge that your system
  is being abused.  Legally, that should be significant protection;
  rules about not being liable for things you don't know you did
  are much harder to change than rules about things you know.
- Posting a big sign requiring conformance with policies,
  backed up by occasional action against violators,
  helps establish your presumption of good character.
- Requiring all outgoing mail to be encrypted makes spamming
  much more difficult (today), though in the Great Cryptographic Future,
  when everybody has at least one easily-located public key,
  that's less effective - but even then it significantly increases
  the workload for the spammer (though Moore's Law makes that less
  relevant, and good Crypto APIs make development of spamware easy.)
  It doesn't stop harassers, but it does reduce spam.
- A few Supreme Court cases, such as Talley and McIntyre,
  protect the right to anonymous speech, including commercial,
  so the proposed law has a high bogosity index.

For inadequacy, there are a variety of problems:
- Zero-knowledge proofs can at most verify that there's an identifier
  in some defined format or from some accessible list of keys.
  They can't verify that the message really came from
  the homeless person who allegedly sent the mail, nor that the
  address, phone number, or email named can locate a real body.
  They also tend to need special forms for the data, which may not
  work for CA-format key signatures.
- ZKPs aren't very useful for identifying the insides of 
  multiply-encrypted data - so they only give you one hop at a time,
  and only for cooperative remailers in cooperative jurisdictions.
- Protocols that provide information about the insides of
  an encrypted message are notoriously hard to make both
  secure and useful.

>Non-anonymous remailers would be suitable for cases where people do
>not want eavesdroppers to know with whom they are communicating, but
>where they don't need to be anonymous to their communication partners.

Distinctly true, though the easiest way to achieve that is to
separate the two problems, providing solid privacy protection
outside and letting the users sign the inside message if they want.

				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From SeeInfoBelow at yahoo.com  Thu May 14 22:25:19 1998
From: SeeInfoBelow at yahoo.com (SeeInfoBelow at yahoo.com)
Date: Thu, 14 May 1998 22:25:19 -0700 (PDT)
Subject: 2 x 2 = $1,100                                                    (S1)
Message-ID: <199805150523.XAA15935@sparky.i-link.net>



===============================================================
           The New ABC Math: 2 x 2 = $1,100 Per Cycle!
===============================================================

  Fast-Cycling 2 X 2 Company Matrix Means Great Commissions!

  How many $1,100 checks would you like to receive... DAILY?

        For the Serious Entrepreneur or Business Person:
                  Tools to Help Your Business
                    By a 9-year old Company

               * Business Opportunity Seeker Leads
               * 7.9 cents/min Long Distance
               * Virtual Office

               2 Minute Overview:  (415) 273-6063

                  Ask yourself these questions:
         Are you willing to invest in your own success?
        How many times would you like to cycle in a day?

                        IT'S THAT SIMPLE!

            http://www.fontaineonline.com/cyberedge

===============================================================
 To be REMOVED from our list, type REMOVE is the subject area
         of a new email and send to: B2998 at yahoo.com
===============================================================






From billp at nmol.com  Fri May 15 06:58:08 1998
From: billp at nmol.com (bill payne)
Date: Fri, 15 May 1998 06:58:08 -0700 (PDT)
Subject: Ruby Ridge and jury trial
Message-ID: <355C479A.28DD@nmol.com>


Friday 5/15/98 7:17 AM	

J Orlin Grabbe
John Young

ABQ J 5/15/98

 Charges Dismissed in Ruby Ridge Case
  BOISE, Idaho  -  A federal judge on Thursday dismissed an involuntary
manslaughter
  charge against an FBI sharpshooter for the death of white separatist
Randy Weaver�s
  wife during the siege at Ruby Ridge.
    U.S. District Judge Edward Lodge ruled that Lon Horiuchi was acting
within the 
  scope of his authority and was honestly discharging his duties when he
fired the shot
  that killed Vicki Weaver on Aug. 22, 1992.
    The U.S. Justice Department decided in 1994 against prosecuting
Horiuchi, or any of
  his FBI superiors and reaffirmed the decision last year.

1  It was NOT a jury which made the determination Horiuchi was acting
within the scope
   of his authority, but a FEDERAL JUDGE.
2  The Justice Department did not prosecute FBI agents

  FASCISM -   a political and economic movement, strongly nationalistic,
magnifying the rights
  of the state as opposed to those of the individual, in which industry,
though remaining largely 
  under private ownership, and all administrative political units, are
controlled by a strong central     
  government.

Morales and I were unable to meet on Thursday.  Today we will study the
docket sheets view at
http://www.jya.com/whp-10usca.htm today.  And open the letter I received
from EEOC Inspector
General Office.

The above Ruby Ridge article emphasizes the importance of a jury trial
in matters of federal 
government misconduct.  http://www.jya.com/whp043098.htm

This matter should get settled before it gets WORSE.

Later
bill







From brjones at ucsd.edu  Fri May 15 07:47:24 1998
From: brjones at ucsd.edu (Brian)
Date: Fri, 15 May 1998 07:47:24 -0700 (PDT)
Subject: (no subject)
Message-ID: <355C576B.184D@ucsd.edu>







From vanessa_107 at mailexcite.com  Fri May 15 12:54:05 1998
From: vanessa_107 at mailexcite.com (vanessa_107 at mailexcite.com)
Date: Fri, 15 May 1998 12:54:05 -0700 (PDT)
Subject: Free Access to the Best Adult Site!!!
Message-ID: <199805154002DAA51087@post.finmin.lt>



Come to a site that you'll never get tired of with:
 FREE...Over THOUSANDS of Live Hardcore Sex Channels from Hustler!!!!
 FREE...LIVE 1-on-1 Video Sex with AUDIO!!! Just tell her what you want to see and she'll do it!!!!
 FREE...THOUSANDS of Pictures in our Galleries from American Blondes to Asian Beautys!!!! You name it we got it!!!
 FREE...XXX Games, & so much more!!!

What are you waiting for its free!!!! 

http://209.203.84.3
 click here! 





From billp at nmol.com  Fri May 15 14:53:29 1998
From: billp at nmol.com (bill payne)
Date: Fri, 15 May 1998 14:53:29 -0700 (PDT)
Subject: FOIA appeal, again
Message-ID: <355CB7C1.25A@nmol.com>

Friday 5/15/98 2:55 PM

E-mail Federico.F.Pena at hq.doe.gov and mail

Federico F. Pena
The Secretary of Energy
United States Department of Energy
Washington, D.C. 20585

Dear Secretary Pena:

Purposes of this letter are to

 1 protest an improper Freedom of Information Act dismissal by
Thomas O. Mann , Deputy Director, Office of Hearings and Appeals
Thomas.Mann at hq.doe.gov

2 appeal a denial of a Freedom of Information Act (FOIA) Request.

I attach a copy of my 3/10/98 appeal letter to you.

DOE/ALOO failed to respond with time allotted by law to my FOIA request,
as you can read in my appeal letter.

On March 30, 1998 Barfield finally did respond.  But late.

APR 28 Mann writes me,

  We learned that AOO issued a determination concerning your request on
March
  30, 1998.  Because your appeal was based on the Department�s failure
to respond,
  and because the Department has responded you appeal is now moot.

I follow the law.

If Mann feels that there is law or federal regulation to support is
claim that the
time-out clause in the FOIA no longer applies because of a late agency
response,
then he should report this to you. 

Mann adds in the final paragraph of his APR 28 letter

  Accordingly, the appeal dated march 10, 1998, that you filed under the
Freedom of
  Information Act, is hereby dismissed.

My appeal is not, as Mann concluded, moot.  My appeal is active.

Mann, however, writes

  You may, however, file an appeal with the Office based on the March 30
determination.

Man also writes

  Please note that, as stated in the determination letter, appeals under
the Freedom of
  Information Act should be addressed to the Director of the Office of
Hearings and Appeals.

And Barfield writes

  Such an appeal must be made in writing within 30 calendar days after
receipt of this letter,
  addressed to the Director, Office of Hearing and Appeals, ...

Secretary Pena, your employees are apparently trying to invent their own
FOIA rules instead
of complying with federal law.

  Whenever a FOIA request is denied, the agency must inform
  the requester of the reasons for the denial and the requester's
  right to appeal the denial to the head of the agency.

I am appealing to you, not
http://www.hr.doe.gov/htbin/callup?name=breznay&SYNONYM=YES,
George.Breznay at hq.doe.gov

I ask that your office takes WRITTEN corrective action to educate or
perhaps reprimand
both Mann and Barfield for not following the law.

Barfield writes in her Mar 30 letter

  The Kirtland Area Office (KAO), oversight for the Sandia National
Laboratories (SNL),
  conducted a search but could not locate any responsive documents.  The
KAO also made
  the determination that the documents you are seeking are contained in
procurement files
  in possession and control of SNL and are, therefore, not �agency
records� subject to
  provision of the FOIA.

Secretary Pena, Barfield�s statement appears to be an attempt for
bureaucrats to hide,
perhaps in the case of RSA and VP Al Gore, possibly incriminating
records from the public.

Therefore, I assert that the requested documents are or should be part
of DOE agency documents,
if DOE is doing a proper job of managing its contractors.

Therefore, I add this clause to my previous appeal.  And ask that your
respond within the
time limit allowed you by law.

Of course, I continue to feel that we should settle this unfortunate
matter seen on Internet
at

http://www.jya.com/whp050898.htm
http://www.jya.com/whp-10usca.htm
http://www.jya.com/whp043098.htm
http://www.jya.com/mf050998.htm
http://jya.com/whpfiles.htm
http://www.jya.com/crack-a5.htm
http://caq.com/cryptogate
http://www.aci.net/kalliste/speccoll.htm
http://www.aci.net/kalliste/nukearse.htm

before it gets even more serious and eventually costly to the taxpayer.

Sincerely,



William H. Payne 
13015 Calle de Sandias 
Albuquerque, NM 87111


Tuesesday 3/10/98 8:10 PM

E-mail Federico.F.Pena at hq.doe.gov and mail

Federico F. Pena
The Secretary of Energy
United States Department of Energy
Washington, D.C. 20585

Dear Secretary Pena:

Purpose of this letter is to appeal a denial of a Freedom of 
Information Act (FOIA) Request.

I wrote on Tuesday February 17, 1999 15:11

  e-mail and mail

  Ms. Elva Barfield
  Freedom of Information Office
  U. S. Department of Energy
  Albuquerque Operations Office/OIEA
  POB 5400
  Albuquerque, NM 87185-5400
  EBARFIELD at DOEAL.GOV

  Dear Ms. Barfield:

  VP Al Gore is in the crypto business.

    Information SuperSpyWay 
    Al Gore Approved
    Encryption for China
    in Return for
    Campaign Donations
    by Charles R. Smith

  Portions of the above document posted on Internet at 
  http://www.us.net/softwar/ and  http://www.aci.net/kalliste/ 
  states

  1.	Gore charged with encryption policy according to PDD-5 and 
              PRD-27 on April 16, 1993. 

  2.	Government officials represent themselves on Al Gore's behalf for 
      RSA patent purchase negotiations in Feb. 1994. 
  3.	RSA chairman Bidzos meets with Chinese officials at the same 
      time as Ron Brown in Oct. 1995. 

  4.	RSA Chairman Bidzos enters into merger negotiations with Security 
	Dynamics, a company backed by Sanford Robertson, in Nov. 1995. 

  5.	VP Gore calls Sanford Robertson from the White House for a 
      donation in Nov. 1995. 

  6.	Robertson delivers $100,000 donation ($80,000 soft - $20,000 
	directly into the Clinton/Gore campaign) in Jan. 1996. 
  7.	RSA signs deal with China in Feb. 1996. The administration 
	previously prosecuted similar deals but this time does nothing. 
  8.	Justice Dept. approves RSA merger with Security Dynamics in 
	April 1996 for $280 million dollars, netting Sanford Robertson's 
	company a cool $2 million just to write the deal. 



  In 1991 I was in involved with Sandia National Laboratories
  Comprehensive Test Ban Treaty seismic data authenticator.

  At that time Sandia director Tommy A Sellers had assumed 
  responsibility for directorship from Robert Clem.

  Sandia supervisor Tom Wright replaced my supervisor, John Holovka, 
  who was the supervisor for the CTBT seismic data authenticator.

  Wright brought in Ph.D. Steven Goldsmith to supervise me.

  Sellars, Wright, and Goldsmith were new to crypto-type projects.

  Much of this is documented at http://www.jya.com/whp021598.htm.

  This is evidenced by Sellar's attached SEP 24 1991 memorandum,
  which Goldsmith help author, addressed to Dr James J Hearn at 
  the National Security Agency.

  The SEP 24 memorandum contained a number of technical errors.

  I corrected these errors in my attached December 20, 1991 memorandum.

  Department of Energy and it predecessors have a well-documented
  history of not requiring technical expertise for pursuit of interests.

  Stewart Udall, The Myths of August, writes,

      Any cover-up must be implemented and enforced by designated
    agents, and one man emerged in 1953 as the quarterback of the 
    AEC's damage-control effort.  His name was Gordon Dunning.
    Although the personnel charts of the 1950s list him as a low-level 
    "rad-safe" official in the Division of Biology and Medicine,           
    documents demonstrate that he was clothed with authority to    
    manage and suppress information about the radiation released
    by the testing of nuclear weapons. ...

  About the time Sellers and Sandia Ombudsman gave me a directed
  transfer to break electronic locks for the FBI/ERF [engineering
  research facility], Goldsmith and Wright, certainly with the approval
  of Sellers, placed a contract with RSA Inc [http://www.rsa.com/], 
  I was told.

  Ms Barfield, we think the American public needs to know more about
  RSA's work with Sandia National Laboratories.

  Therefore, Under the provision of the Freedom of Information Act, 
  5 USC 552, I am requesting access to: 

    1 ALL purchase requisitions, including any attached statement of
       work, issued by Sandia National Laboratories, Los Alamos     
       National Laboratories, or DOE/ALOO between January 1, 1991
       and February 17, 1998 to RSA Inc.

    2  Copies of all invoices from RSA Inc received by Sandia National   
        Laboratories, Los Alamos National Laboratories, or DOE/ALOO 
        between January 1, 1991  and February 17, 1998

  If there are any fees for searching for, or copying, the records 
  I have requested, please inform me before you fill the request.

  As you know, the Act permits you to reduce or waive the fees 
  when the release of the information is considered as "primarily 
  benefiting the public."  I believe that this requests fits that 
  category and I therefore ask that you waive any fees.

  Your office agreed to waive fees before.  This request is surely 
  of "public interest."

  December 13, 1994 DOE/AL FOIA officer Gwen Schreiner waived fees
  for the reason,

        "We have considered your request and have determined that
        release of the requested records is in the public interest,
        that disclosure of this information is likely to contribute
        significantly to public understanding of the operations or
        activities of the government, that you or the organization
        you represent have little or no commercial interest in the
        material contained in the records, that you or the
        organization you represent have the qualifications and
        ability to use and disseminate the information, and that the
        records are not currently in the public domain.  A waiver of
        fees is therefore granted."

  This waiver of fees was, undoubtedly, issued as a result of former
  Energy Secretary Hazel O'Leary's Openness initiative.

  Heart of America paid my way to hear Secretary O'Leary's celebrated
  whistleblower speech.

  If all or any part of this request is denied, please cite the 
  specific exemption(s) which you think justifies your refusal to 
  release the information and inform me of your agency's 
  administrative appeal procedures available to me under the law.

  I would appreciate your handling this request as quickly as 
  possible, and I look forward to hearing from you within 20 
  working days, as the law stipulates.

I received no response to the above FOIA. 

Therefore I appeal as a result of non-response.

As you may be aware

      (6)(A) Each agency, upon any request for records made under  
       paragraph (1), (2), or (3) of this subsection, shall--
            (i) determine within ten days \1\ (excepting
        Saturdays, Sundays, and legal public holidays) after
        the receipt of any such request whether to comply with
        such request and shall immediately notify the person
        making such request of such determination and the
        reasons therefor, and of the right of such person to
        appeal to the head of the agency any adverse
        determination; and

And you may also be aware

  -------------------------------------------------------------------------
      \1\ Under section 12(b) of the Electronic Freedom of Information
  Act Amendments of 1996 (Pub. L. 104-231; 110 Stat. 3054), the amendment
  made by section 8(b) of such Act striking ``ten days'' and inserting
  ``20 days'' shall take effect on October 3, 1997.
  -------------------------------------------------------------------------
            (ii) make a determination with respect to any
        appeal within twenty days (excepting Saturdays,
        Sundays, and legal public holidays) after the receipt
        of such appeal. If on appeal the denial of the request
        for records is in whole or in part upheld, the agency
        shall notify the person making such request of the
        provisions for judicial review of that determination
        under paragraph (4) of this subsection

So I expect a response to this appeal within the time allotted to you 
by law.

Much of this unfortunate matter is appearing on Internet.

 http://www.jya.com/whp021598.htm

 http://www.jya.com/cylinked.htm

 Letter from Bill Payne Regarding Cryptography at Sandia
 http://www.aci.net/kalliste/

 Crypto AG: The NSA's Trojan Whore?
 http://caq.com/CAQ/caq63/caq63madsen.html
  
 NSA, Crypto AG, and the Iraq-Iran War
 http://www.aci.net/kalliste/speccoll.htm

 How Secure is America's Nuclear Arsenal?
 http://www.aci.net/kalliste/nukearse.htm

And, of course, we continue to seek settlement.

Sincerely,



William H. Payne 
13015 Calle de Sandias 
Albuquerque, NM 87111 





From billp at nmol.com  Fri May 15 15:40:26 1998
From: billp at nmol.com (bill payne)
Date: Fri, 15 May 1998 15:40:26 -0700 (PDT)
Subject: foia fee denial appeal and settlement letter
Message-ID: <355CC320.2CC1@nmol.com>

Friday 5/15/98 3:48 PM

By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF

Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  appeal a FOIA fee waiver denial.
2  continue to explore settlement possibilities of our current 
lawsuit.

30 March Joann H. Grube, Deputy Director of Policy, NSA, wrote
in response to my Friday February 27, 1998 attached letter to you

  There are 706 cases ahead of your in our processing queue. ..

  Please be advised that your request for a waiver of fees has been
  denied.

Public knowledge of how much taxpayer NSA has likely squandered 
ATTEMPTING to build public key crypto chips certainly in
the public interest.

Therefore, I appeal Grube�s denial.

Grube wrote

  Any person notified on an adverse determination may, within 60
  days after notification of the determination, file an appeal to the
  NSA/CSS Freedom of Information Act Appeal Authority.  The
  appeal shall be in writing and addressed to the NSA/CSS FOIA 
  Appeal Authority, ...

General Minihan,  Grube apparently is attempting to invent her
own FOIA appeal rules instead of follow federal law.  

  Whenever a FOIA request is denied, the agency must inform
  the requester of the reasons for the denial and the requester's
  right to appeal the denial to the head of the agency.

I ask that you educate and possibly reprimand Grube for her failure
to properly state law.

As you may be aware

      (6)(A) Each agency, upon any request for records made under  
       paragraph (1), (2), or (3) of this subsection, shall--
        (i) determine within ten days \1\ (excepting
        Saturdays, Sundays, and legal public holidays) after
        the receipt of any such request whether to comply with
        such request and shall immediately notify the person
        making such request of such determination and the
        reasons therefor, and of the right of such person to
        appeal to the head of the agency any adverse
        determination; and

And you may also be aware

 
-------------------------------------------------------------------------
      \1\ Under section 12(b) of the Electronic Freedom of Information
  Act Amendments of 1996 (Pub. L. 104-231; 110 Stat. 3054), the
amendment
  made by section 8(b) of such Act striking ``ten days'' and inserting
  ``20 days'' shall take effect on October 3, 1997.
 
-------------------------------------------------------------------------
            (ii) make a determination with respect to any
        appeal within twenty days (excepting Saturdays,
        Sundays, and legal public holidays) after the receipt
        of such appeal. If on appeal the denial of the request
        for records is in whole or in part upheld, the agency
        shall notify the person making such request of the
        provisions for judicial review of that determination
        under paragraph (4) of this subsection

So I expect a response to this appeal within the time allotted to you 
by law.

Our lawsuit has attracted international attention on Internet.

http://www.jya.com/whp050898.htm
http://www.jya.com/whp-10usca.htm
http://www.jya.com/whp043098.htm
http://www.jya.com/mf050998.htm
http://jya.com/whpfiles.htm
http://www.jya.com/crack-a5.htm
http://caq.com/cryptogate
http://www.aci.net/kalliste/speccoll.htm
http://www.aci.net/kalliste/nukearse.htm

Partially, perhaps, as the result of the about .5 million dead Iranian
Shiite Muslims.
Or maybe judicial misconduct?

Morales and I plan to appeal to the Tenth in event that Morales�
dismissal is upheld.

Further, we feel that YOU must be held accountable.  Therefore we will
appeal your
removal from our lawsuit.

But this is sure to cost the taxpayer much more money.  

And failure to fairly settle these unfortunate matters raises the
possibility of a understandable, or opportunistic, retaliatory attack
for NSA�s bungled spy sting on Iran
by the aggrieved or their enemies.  

Innocent people may be harmed.

Both alternatives are unpleasant to think about.

Therefore, Morales and I continue to offer to engage in settlement talks
with YOU.

I cannot find your e-mail address

Therefore I will forward the e-mail copy of this FOIA appeal /settlement
letter to 
Ray Kammer of NIST [http://www.nist.gov so that Kammer can possibly
forward an e-mail to you.

I am not reading e-mail. 

Sincerely,



William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037


Friday February 27, 1998 3:15 PM


By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF

Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  request information under the Freedom of Information Act
2  explore settlement possibilities of our current lawsuit.

In about 1986 Sandia National Laboratories assigned me the 
task of  design and construction of a Comprehensive Test Ban 
Treaty seismic data authenticator.

In the initial stages of the project, Sandia cryptographer 
Gustavus Simmons attempted to convince both Sandia 
management and NSA employees Tom White, Mark Unkenholtz,
and Ed Georgio that a form of public key authentication should 
replace NSA employee Ronald Benincasa's National Seismic
Station/Unmaned Seismic Observatory 11-bit data authentication
algorithm.

My Sandia supervisor John Holovka and project leader H B [Jim]
Durham ordered me to write a paper explaining public key 
cryptography.

This paper,  RSA ENCRYPTION, along with my SAND report
describing my implementation of Benincasa's algorithm and
filings in our lawsuit, now appear on Internet at
http://www.jya.com/index.htm, click CRYPTOME, then OpEd,
then http://www.jya.com/whprsa.htm.

Sandia explored the merits of switching from Benincasa's
algorithm to a public key-based authentication method suggested
by Simmons.

For Sandia's evaluation of the merits of public key, electronic tagging,
and Bureau of Engraving and Printing projects ,  I bought for Sandia 
samples both the Cylink CY1024 and AT&T A & B two chip sets for
modulo m arithmetic computations.

NSA employee Tom White sent me a copy of the SECRET classified
NSA report on IBM's hardware public key chip FIREFLY.

I wrote in my tutorial paper

  RSA hardware computations

  The slow speed of software RSA computations plus the potential
  wide use prompted several companies to build chips which compute
  modular arithmetic to at least several hundred bits.  Most of
  these chips "cascade" to compute with a larger number of bits.

  Corporations involved in building these chips are

     1  IBM  Firefly

     2  AT&T

     3  Motorola (apparently a three chip set)

     4  Cylink   Pittway-First alert

     5  Sandia Labs (Algorithm M and predecessor chip)

  Details of the IBM chip is classified.  AT&T as of July 1987 has
  not released details of their chip.  Little information is
  available on the Motorola chip set.

  The Cylink chip is commercially available.  Its price dropped
  from $1,500 to $600 each in June 1987.  Data is transferred to
  and from the chip with serial shift register communication.

  The early Sandia chip was limited in speed.  The replacement
  chip is cascadeable, communicates with 8 or 16 bits parallel,
  matches the speed of the Cylink chip, but is not out of
  fabrication.

  Rumors circulate that there is about an order of magnitude
  performance difference between some of these chips.

  These hardware chips improve exponentiation speed about 3 orders
  of magnitude over software implementation benchmarked on an Intel
  8086 family microcomputer.

Whitfield Diffie writes about both the Cylink and Sandia chips.  And
is quoted at  http://www.aci.net/kalliste/nukearse.htm.

Sandia had terrible luck with its public key chips.  

I reported SOME of the troubles to Electronic Engineering Times editor 
Loring Wirbel [http://techweb.cmp.com/eet/823/] on March 23, 1994.

        Dr. John Wisniewski was a supervisor at Sandia's Center for
        Radiation-hardened Microelectronics.  Wisniewski was a graduate
        student at Washington State University in about 1975.  I was a
        professor at WSU.

        Wisniewski knows all about the failing Sandia chips in the nuclear
        arsenal.  I took notes on February 13, 1993.  Wisniewski reviewed
        the problems again for me.

             1    No quality initiative.  Each chip lot had a different
                  process.
             2    Overall yield - 40-50%.  Down to 10% after packaging.
             3    Metalization problems.  No planarization.  No flow of
                  glass.  Couldn't use high temperature.  Step coverage
                  problems.  Layed down over tension.  100% field returns
                  over several years.
             4    Sandia would store lots of parts for replacements.

        Sandia management made the decision to place low yield parts in
        the nuclear arsenal.  Sandia must meet DOD schedules management
        reasoned.  Hundreds of millions spent on CRM.  Sandia must show
        productivity.

        Wisniewski told me that low yield chip test survivors are those   
        whichthe tests failed to detect failures.  Wisniewski will talk.  
        503-625-6408.  Wisniewski now works for Intel in Oregon.  Have 
        Wisniewski tell you about the fire in the CRM clean room!

Sandia supervisor Jerry Allen later told me it cost $300,000 each to remove
Sandia's failing chips at Pantex from a nuclear bomb.

NSA apparently is biased toward hardware implementations of cryptographic
and authentication algorithms.  As opposed to software implementation.

NSA representatives and Sandia management decided not to use a public
key authentication scheme for its CTBT seismic data authenticator because
of all of the problems with implementing public key algorithms.

But NSA surely has spent MUCH MONEY on public key chip implementations.

NSA is promoting its Clipper crypto chips as described at 
http://cpsr.org/dox/clipper.html.

And we get some information about technical specifications of NSA's Clipper
chip at http://www.us.net/softwar/http://www.us.net/softwar/clip.html

  Clipper Chip Information

  MYK-78 CLIPPER CHIP ENCRYPTION/DECRYPTION  ON A CHIP 

     1 micron double level metal CMOS technology 
     0.35 watts power 
     28 pin plastic leaded chip carrier (PLCC) package 
     Transistor to transistor logic (TTL) interface 
     Chip ID, family key and device unique key are installed at 
     programming. 
     Chip ID, family key and device unique key are installed at programming           
     facility and are completely transparent to the user.

Therefore, Under the provision of the Freedom of Information Act, 
5 USC 552, I am requesting access to: 

1  Copies of all invoices from

	A   AT&T
	B   Motorola
	C   IBM
	D  Sandia National Laboratories

to NSA for payments for developing ANY public key-related chips between 
January 1, 1980 and February 27, 1998.

2  Copies of all invoices to NSA from ANY corporation involved in 
development
of ANY Clipper chip-related hardware between January 1, 1980 and 
February 27, 1998.

The public has a right to know how much NSA spent on TRYING monoploize the 
crypto business.

If there are any fees for searching for, or copying, the records I have 
requested, please inform me before you fill the request.

As you know, the Act permits you to reduce or waive the fees when the 
release of the information is considered as "primarily benefiting the 
public."
  
I believe that this requests fits that category and I therefore ask that 
you waive any fees.

If all or any part of this request is denied, please cite the specific 
exemption(s) which you think justifies your refusal to release the information and inform me of your agency's administrative appeal procedures available to me under the law.

I would appreciate your handling this request as quickly as possible, and I 
look forward to hearing from you within 20 working days, as the law stipulates.

With respect to our current FOIA lawsuit, I feel that we should settle this
unfortunate matter.

I see from your biography at  http://www.nsa.gov:8080/ and
http://www.nsa.gov:8080/dirnsa/dirnsa.html that you are

         1979   Distinguished Graduate
         Master of Arts degree in National Security Affairs 
         Naval Postgraduate School 
         Monterey, California

One of my former M.S. and Ph.D students in Computer Science,
Ted Lewis, is currently the chairman of Computer Science at
Naval Postgraduate School [http://www.friction-free-economy.com/].

Small world.

But I think that this emphasizes that WE SHOULD all be on the same side.
Not engaged in a conflict in US federal court.  Or on Internet.

NSA attempts to withhold requested information are possibly unwise.  

In our wired world the aggrieved know what happened to them.
[http://www.aci.net/kalliste/speccoll.htm]. http://www.wpiran.org/,
http://www.netlink.co.uk/users/impact/namir/namirm.html

And moderates in Iran, [http://persia.org/khatami/biography.html], appear 
want settlement too.

My family and I have been damaged by these crypto wars.

I ask you that consider fair settlement of damages caused by the National
Security Agency.

I cannot find your e-mail address on Internet.

Therefore I will forward the e-mail copy of this FOIA/settlement letter to 
Ray Kammer of NIST [http://www.nist.gov/], who along with the FBI 
[http://www.fbi.gov/, http://www.fbi.gov/fo/nyfo/nytwa.htmand], and NSA 
are trying to control the crypto business so that Kammer can possibly
forward an e-mail copy of the FOIA/Settlement letter to you.

Sincerely,

bill

William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037 [I am not reading e-mail]





From billp at nmol.com  Fri May 15 16:48:39 1998
From: billp at nmol.com (bill payne)
Date: Fri, 15 May 1998 16:48:39 -0700 (PDT)
Subject: Government misconduct
Message-ID: <355CD34C.75E8@nmol.com>

Friday 5/15/98 5:36 PM

Senator Grassley

I sent you a copy of the criminal complaint affidavit I sent to judge
Hug.

Our NSA lawsuit was mostly done as practice for an upcoming Privacy Act
violation/defamation lawsuit.

John Young kindly posted 

greene.htm         National Security Abuse: Greene v. McElroy       
April 8, 1998

I was NEVER interviewed by Sandia's Disciplinary Review Committee.

The charges made against me are FALSE.

I did nothing wrong.  http://jya.com/whpfiles.htm

Please help get this matter should be settled before it gets worse.

bill payne


Tuesday April 28, 1998 4:05 PM


Tom Spellman
Criminal Investigator
Inspector General
U.S. Equal Employment Opportunity Commission
POB 18858
Washington, D.C. 20036-8858
202-663-4375
800-849-4230

Dear Mr. Spellman:

March 18, 1998 I phoned the Inspector General's hotline.

I filed a verbal criminal Privacy Act violation complaint with Wanda.

Wanda told me you were going to be the investigator.

Monday March 23 you phoned me to leave your office number.

You phoned several days later.

I told you about the false and defaming documents both Sandia National Laboratories and EEOC Phoenix employees Burtner and Larry Trujillo released without my written permission.

You asked that I send you a copy of these documents.

I mailed them to you the same day.

You told me that you had been reading about this case on  Internet at jya.com and aci.net/kalliste.

On April 3 I phoned to inform your office that a criminal complaint affidavit was filed with judge Hug on Monday April 1 naming those involve in the release of the documents and those who did not properly prosecute those involved..

I mailed a copy of the criminal complaint affidavit to you.

I have not heard from you either in writing or by phone since our initial contact.

Therefore, I ask that you write me and tell me about the status of your investigation.

And, of course, I feel that this unfortunate matter should be promptly settled.  I invite settlement negotiations of the civil aspects of this criminal release of documents.

Sincerely,



William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111






From StanSqncrs at aol.com  Fri May 15 17:50:56 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Fri, 15 May 1998 17:50:56 -0700 (PDT)
Subject: A 'Nobody' Out From 'Obscura'
Message-ID: 


In a message dated 5/15/98 7:33:42 PM Central Daylight Time,
mixmaster at remail.obscura.com writes:

<< > Obviously, this is a forgery, it isn't me, my guess is, it's our 'nobody'
-
 
 You're really out of your league here - lost and clueless.  
 
 Get a clue ... and get lost >>

You'd really like that wouldn't you!  Come on, admit it, I'm fun to have
around!  ;-)

Oh, and BTW:  You're failure to deny the (tacit) charge sure looks like a
(tacit) admission that it's true.  I nailed your ass (IMHO.)

Stan





From 33606886 at compuserve.com  Fri May 15 22:16:31 1998
From: 33606886 at compuserve.com (33606886 at compuserve.com)
Date: Fri, 15 May 1998 22:16:31 -0700 (PDT)
Subject: No Subject
Message-ID: <458734865234.GBB21218@compuserve.com>



   
                   LET'S ALL CELEBRATE SEINFELD!


   Friends, every so often that rare show comes along that captures 
the essence and feeling of the decade. The 70's had 'All In The 
Family'. The 80's had 'Cheers'. And the 90's gave us... 'Seinfeld'!

   Well, we're certainly going to miss Jerry, George, Kramer and 
Elaine, but we can *still* hang on to a little bit of them: To 
celebrate this classic show, we are proud to offer a very rare 
and very funny collection of never-before-seen outtakes and 
footage of Jerry and the gang!

   Some of these clips will definitely surprise you!


   This video comes in VHS format and is a full 81 minutes in length.


Why not visit our site at:

http://www.seinfeld-salute.com/thatsashame.htm


http://www.seinfeld-salute.com/thatsashame.htm


..or

http://205.152.190.230/thatsashame.htm



(*** These are NOT the same outtakes that were shown just before the 
final episode! ***)




Please note: This is a one-time mailing. You have already been placed on
             our remove list.









From 92640856 at bellsouth.net  Sat May 16 07:22:55 1998
From: 92640856 at bellsouth.net (92640856 at bellsouth.net)
Date: Sat, 16 May 1998 07:22:55 -0700 (PDT)
Subject: Ball Caps for Father's Day
Message-ID: <199234233019.GAA08423@qqeioweisssiiie.com>


You procrastinated over Mothers Day so don't wait for Father's Day to get here
and not have anything for him.

Father's Day Hat's with worlds greatest father on them. 100% cotton, white,
super adjustable, fit's large sizes. Great for all summer in the hot sun, on
the golf course or any outside activity. Visit our Web page and see the hat at
WePrintAny's Home Page
  Another spot is here http://members.aol.com/WePrintAny/index.html

Visit the web page then return here, this is your order Page.  Order now
before we're over booked.  Orders are already comming in.

1 hat is $10.00
2 hats for $18.00
This includes postage and handling (USA only).
Send cash, check or Money Order (sorry no credit cards) to:

GDH
P.O. Box 2092
Orange Park, Fl. 32067-2092

No checks after 1 June 1998.  Not enough time for check to clear and hat to be
mailed and received by Fathers Day.

Print this page, this is your order form.
Include your e-mail address________________________________
In case we need to contact you.

This is your mailing Label.

From
WePrint Any
P.O. Box 2092
Orange Park, Fl 32067

                     Name_______________________________________
                     Add._______________________________________
                     City__________________State_____ Zip_______

Don't wait, order now.  Cash and Money Orders mailed the same day.

Order:
1 Hat  $10.00                 $10.00
__ add. Hat's  $8.00           _____
Fl. residents add 7% tax       _____

TOTAL                         $_____

Check back after Fathers Day for full Product line.










From ichudov at algebra.com  Sat May 16 11:04:13 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Sat, 16 May 1998 11:04:13 -0700 (PDT)
Subject: Gunpowder taggant solution
Message-ID: <199805161802.NAA21718@manifold.algebra.com>


I think that the gunpowder taggants are not as bad as it seems at first
sight. EVen if all gunpowders are sold with taggants, and if there is
enough people wishing to defeat them, they can simply organize gunpowder
mixing parties at gun shows. After several such parties, the taggants
might become completely useless.

	- Igor.





From jim at mentat.com  Sat May 16 11:48:30 1998
From: jim at mentat.com (Jim Gillogly)
Date: Sat, 16 May 1998 11:48:30 -0700 (PDT)
Subject: Gunpowder taggant solution
Message-ID: <9805161844.AA05715@mentat.com>


Igor said:
> I think that the gunpowder taggants are not as bad as it seems at first
> sight. EVen if all gunpowders are sold with taggants, and if there is
> enough people wishing to defeat them, they can simply organize gunpowder
> mixing parties at gun shows. After several such parties, the taggants
> might become completely useless.

I'm woefully ignorant about reloading, but would this really work?
Would you mix your high-quality smokeless with Tim's homebrew black
powder, Toto's pebble-ground Canada Red Doobie Mix, and Bell's
stinkbomb components and take away the average?  Or are different types
of powder visually distinct enough or similar enough in effect to mix
and match effectively?

	Jim Gillogly





From ichudov at algebra.com  Sat May 16 12:56:19 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Sat, 16 May 1998 12:56:19 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: <9805161844.AA05715@mentat.com>
Message-ID: <199805161952.OAA22508@manifold.algebra.com>


Jim Gillogly wrote:
> Igor said:
> > I think that the gunpowder taggants are not as bad as it seems at first
> > sight. EVen if all gunpowders are sold with taggants, and if there is
> > enough people wishing to defeat them, they can simply organize gunpowder
> > mixing parties at gun shows. After several such parties, the taggants
> > might become completely useless.
> 
> I'm woefully ignorant about reloading, but would this really work?
> Would you mix your high-quality smokeless with Tim's homebrew black
> powder, Toto's pebble-ground Canada Red Doobie Mix, and Bell's
> stinkbomb components and take away the average?  Or are different types
> of powder visually distinct enough or similar enough in effect to mix
> and match effectively?

I am perhaps even more ignorant, but I think that if you mix the same
kind of gunpowder (XYZ's BLAH # 123 gunpowder for example), then there
is no problem. But of course mixing different kinds may be asking for
trouble -- I have no clue about that.

Also, a gun owner could simply buy gnu powder in various places and
mix the batches.

	- Igor.





From jya at pipeline.com  Sat May 16 13:20:52 1998
From: jya at pipeline.com (John Young)
Date: Sat, 16 May 1998 13:20:52 -0700 (PDT)
Subject: Idaho v. Horiuchi
Message-ID: <199805162020.QAA26245@dewdrop2.mindspring.com>


We offer the U.S. District Court's decision in Idaho v. Horiuchi 
to dismiss state charges against the FBI sniper/killer of Vicki 
Weaver.

   http://jya.com/id-lth.htm

Grim reading of succinct description of the killing and gun
battle, and how the feds carefully protect their own from 
harm for punishing those foolish to challenge national might. 

The judge wisely notes his decision does not preclude
the possibility that other, federal, charges may be brought 
against Horiuchi and his supervisors. Some chance.

These are HTML conversions of scanned images from the 
Idaho District Court's impressive Web page at:

   http://www.id.uscourts.gov

All the documents filed in the case are online.





From jya at pipeline.com  Sat May 16 14:16:34 1998
From: jya at pipeline.com (John Young)
Date: Sat, 16 May 1998 14:16:34 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: <9805161844.AA05715@mentat.com>
Message-ID: <199805162116.RAA14343@dewdrop2.mindspring.com>


ATF published on May 1 its annual "1998 List of Explosive
Materials" subject to regulation under 18 U.S.C. Chapter 40,
Importation, Manufacture, Distribution and Storage of Explosive 
Materials:

   http://jya.com/atf050i98.txt

This list of ingredients might be used to mis-tag home 
mixes -- or ID the mixers' traces on implements.







From jya at pipeline.com  Sat May 16 14:35:03 1998
From: jya at pipeline.com (John Young)
Date: Sat, 16 May 1998 14:35:03 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: <199805161952.OAA22508@manifold.algebra.com>
Message-ID: <199805162134.RAA13996@dewdrop2.mindspring.com>


Correct URL for the ATF list of explosive materials is:

   http://jya.com/atf050198.txt






From tcmay at got.net  Sat May 16 20:57:55 1998
From: tcmay at got.net (Tim May)
Date: Sat, 16 May 1998 20:57:55 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: <9805161844.AA05715@mentat.com>
Message-ID: 


At 12:52 PM -0700 5/16/98, Igor Chudov @ home wrote:
>Jim Gillogly wrote:
>> Igor said:
>> > I think that the gunpowder taggants are not as bad as it seems at first
>> > sight. EVen if all gunpowders are sold with taggants, and if there is
>> > enough people wishing to defeat them, they can simply organize gunpowder
>> > mixing parties at gun shows. After several such parties, the taggants
>> > might become completely useless.
>>
>> I'm woefully ignorant about reloading, but would this really work?
>> Would you mix your high-quality smokeless with Tim's homebrew black
>> powder, Toto's pebble-ground Canada Red Doobie Mix, and Bell's
>> stinkbomb components and take away the average?  Or are different types
>> of powder visually distinct enough or similar enough in effect to mix
>> and match effectively?
>
>I am perhaps even more ignorant, but I think that if you mix the same
>kind of gunpowder (XYZ's BLAH # 123 gunpowder for example), then there
>is no problem. But of course mixing different kinds may be asking for
>trouble -- I have no clue about that.
>
>Also, a gun owner could simply buy gnu powder in various places and
>mix the batches.

I don't know the particular details of the "taggant" proposal (in terms of
which problem it's trying to solve). But here are some generally true
comments:

* For smokeless powders, i.e., _not_ black powder, the powders are
semi-visually recognizable. So Bullseye is noticeably different from Unique
and 2400, for example.

* However, smokeless powders are worthless for bombs. (Black powder is
almost worthless, by modern standards. Much easier to make your own
plastique.)

* If the goal  is to trace shootings, as oppose to bombings, then the focus
would be on smokeless powders. However, very few Bad Guys are into
reloading, so....

* The only way such a law can be useful is to crack down strongly on
ammunition resales, loans, gifts, etc. And a monstrous nightmare of
traceability, identity checks, etc.

(And what to do with those of us who have several cases (1000 rounds/case)
of various kinds of ammo? (I surmise dimbulbs like Diane Feinstein, Sarah
Brady, and Barbara Boxer think they can "outlaw" this old ammo, or cause a
gang banger in LA to shoot only freshly-purchased ammo.)

And so it goes.

--Tim May


"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.








From ichudov at algebra.com  Sat May 16 21:32:15 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Sat, 16 May 1998 21:32:15 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: 
Message-ID: <199805170431.XAA01850@manifold.algebra.com>


Tim May wrote:
> * For smokeless powders, i.e., _not_ black powder, the powders are
> semi-visually recognizable. So Bullseye is noticeably different from Unique
> and 2400, for example.

Is mixing them dangerous?

> * However, smokeless powders are worthless for bombs. (Black powder is
> almost worthless, by modern standards. Much easier to make your own
> plastique.)

I thought that plastic explosives were hard to make. Is that wrong?

	- Igor.





From bill.stewart at pobox.com  Sun May 17 01:06:15 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sun, 17 May 1998 01:06:15 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: <9805161844.AA05715@mentat.com>
Message-ID: <3.0.5.32.19980516224219.008b7510@popd.ix.netcom.com>


At 02:52 PM 5/16/98 -0500, Igor Chudov @ home wrote:
>> I'm woefully ignorant about reloading, but would this really work?
>> Would you mix your high-quality smokeless with Tim's homebrew black
>> powder, Toto's pebble-ground Canada Red Doobie Mix, 

	... and Bill's Delaware Punch black powder.
...
>Also, a gun owner could simply buy gnu powder in various places and
>mix the batches.

Is "gnu powder" available from the Free Explosives Foundation?


				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From jya at pipeline.com  Sun May 17 07:22:36 1998
From: jya at pipeline.com (John Young)
Date: Sun, 17 May 1998 07:22:36 -0700 (PDT)
Subject: More Tools for ILEA
Message-ID: <199805171422.KAA23491@dewdrop2.mindspring.com>


NYT, May 17, 1998, on the Birmingham Summit:

G8 leaders spent considerable time discussing arrangements
for international cooperation in fighting cross-border crimes 
like money-laundering, computer fraud and arms smuggling.

In a communique, the leaders endrosed efforts to negotiate
a United Nations agreement to provide law enforcement
officials with more tools to fight international organized
crime.

They called for talks with the business community on an
international legal framework for obtaining computer data
as evidence in criminal cases, while preserving privacy
protections.

-----

A pointer to the communique or other G8 reports from this
session would be welcomed.





From eureka-help at eureka.abc-web.com  Sun May 17 13:52:24 1998
From: eureka-help at eureka.abc-web.com (eureka-help at eureka.abc-web.com)
Date: Sun, 17 May 1998 13:52:24 -0700 (PDT)
Subject: Now we need your reply!
Message-ID: <895438334.21977.ezmlm@eureka.abc-web.com>


We  have  received a  subscription  request  for the Eureka!
Adult  Newsletter  to be  sent to  your  email  address.  To
confirm this request,  please use the Reply function on your
email program to send this email back to us.

If you do  not reply  to this email we will  assume you have
changed your mind, or may have been the victim of a 'prank'.
If you did not  enter your email address  at one of our web-
sites then somebody else has done so for you. If you  do not
wish to  receive the  newsletters just ignore this email. Or
you can click below to  have your email  address permanently
blocked  from ever  receiving  any of  our future  mailings.
Block me -----> http://eureka.abc-web.com/eureka/blockme.htm

- The Eureka! Adult Newsletter Team.


The following lines identify the source of this subscription
request,  including date/time,  IP number and  browser used.

HEADER1=13:52 Pacific Time Sunday May 17 1998
HEADER2=199.203.203.194 Mozilla/3.0Gold (Win95; I)





From MAILER-DAEMON at www.video-collage.com  Sun May 17 14:40:15 1998
From: MAILER-DAEMON at www.video-collage.com (Mail Delivery Subsystem)
Date: Sun, 17 May 1998 14:40:15 -0700 (PDT)
Subject: Returned mail: User unknown
Message-ID: <199805172139.RAB15707@www.video-collage.com>

The original message was received at Sun, 17 May 1998 17:39:44 -0400 (EDT)
from uucp at localhost

   ----- The following addresses had permanent fatal errors -----
eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com at eureka.abc-web.com

   ----- Transcript of session follows -----
... while talking to eureka.abc-web.com.:
>>> RCPT To:
<<< 553 sorry, your envelope sender is in my badmailfrom list (#5.7.1)
550 eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com at eureka.abc-web.com... User unknown


Reporting-MTA: dns; www.video-collage.com
Arrival-Date: Sun, 17 May 1998 17:39:44 -0400 (EDT)

Final-Recipient: RFC822; eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com at eureka.abc-web.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; eureka.abc-web.com
Diagnostic-Code: SMTP; 553 sorry, your envelope sender is in my badmailfrom list (#5.7.1)
Last-Attempt-Date: Sun, 17 May 1998 17:39:45 -0400 (EDT)


To: eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com at eureka.abc-web.com
Subject: Now we need your reply! (fwd)bc-web.com
From: cypherpunks at toad.Com
Date: Sun, 17 May 1998 16:36:27 -0500 (CDT)

eureka-help at eureka.abc-web.com wrote:
> From owner-cypherpunks at Algebra.Com  Sun May 17 16:24:16 1998
> Mailing-List: contact eureka-help at eureka.abc-web.com; run by ezmlm
> Date: 17 May 1998 20:52:14 -0000
> Message-ID: <895438334.21977.ezmlm at eureka.abc-web.com>
> From: eureka-help at eureka.abc-web.com
> To: cypherpunks at toad.com
> Reply-To: eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com at eureka.abc-web.com
> Delivered-To: responder for eureka at eureka.abc-web.com
> Subject: Now we need your reply!
> Sender: owner-cypherpunks at Algebra.Com
> Precedence: bulk
> X-Mailing-List: cypherpunks at algebra.com
> X-List-Admin: ichudov at algebra.com
> X-Loop: cypherpunks at algebra.com
> 
> 
> We  have  received a  subscription  request  for the Eureka!
> Adult  Newsletter  to be  sent to  your  email  address.  To
> confirm this request,  please use the Reply function on your
> email program to send this email back to us.
> 
> If you do  not reply  to this email we will  assume you have
> changed your mind, or may have been the victim of a 'prank'.
> If you did not  enter your email address  at one of our web-
> sites then somebody else has done so for you. If you  do not
> wish to  receive the  newsletters just ignore this email. Or
> you can click below to  have your email  address permanently
> blocked  from ever  receiving  any of  our future  mailings.
> Block me -----> http://eureka.abc-web.com/eureka/blockme.htm
> 
> - The Eureka! Adult Newsletter Team.
> 
> 
> The following lines identify the source of this subscription
> request,  including date/time,  IP number and  browser used.
> 
> HEADER1=13:52 Pacific Time Sunday May 17 1998
> HEADER2=199.203.203.194 Mozilla/3.0Gold (Win95; I)
> 







From shamrock at cypherpunks.to  Sun May 17 17:43:48 1998
From: shamrock at cypherpunks.to (Lucky Green)
Date: Sun, 17 May 1998 17:43:48 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: <199805170431.XAA01850@manifold.algebra.com>
Message-ID: 


On Sat, 16 May 1998, Igor Chudov @ home wrote:

> Tim May wrote:
> > * For smokeless powders, i.e., _not_ black powder, the powders are
> > semi-visually recognizable. So Bullseye is noticeably different from Unique
> > and 2400, for example.
> 
> Is mixing them dangerous?

Taggants in gun powder are inherently dangerous. They frequently cause a
loss of stability of the powder.
> > * However, smokeless powders are worthless for bombs. (Black powder is
> > almost worthless, by modern standards. Much easier to make your own
> > plastique.)
> 
> I thought that plastic explosives were hard to make. Is that wrong?

Making plastic explosives is easy. No, I am not going to post the recipe.

-- Lucky Green  PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"






From ichudov at algebra.com  Sun May 17 18:00:26 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Sun, 17 May 1998 18:00:26 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: 
Message-ID: <199805180056.TAA00480@manifold.algebra.com>


Lucky Green wrote:
> > I thought that plastic explosives were hard to make. Is that wrong?
> 
> Making plastic explosives is easy. No, I am not going to post the recipe.

If _I_ knew the recipe, I would have posted it, at least anonymously.

I respect you a lot, Lucky, but in this case you are behaving like
an asshole.

	- Igor.





From eureka-help at eureka.abc-web.com  Sun May 17 19:28:41 1998
From: eureka-help at eureka.abc-web.com (eureka-help at eureka.abc-web.com)
Date: Sun, 17 May 1998 19:28:41 -0700 (PDT)
Subject: Successful Subscription
Message-ID: <895458516.7940.ezmlm@eureka.abc-web.com>


WELCOME TO EUREKA!
==================
Congratulations,  your free subscription to the Eureka!
newsletter is now set up. We hope you enjoy every copy.
As promised,  while you wait  for your first newsletter
here are the links to  the FREE videos and FREE photos!

BIENVENUE � EUREKA!
===================
F�licitations,  votre abonnement  libre �  l'Eureka! le
bulletin  est  maintenant install�.  Nous esp�rons  que
vous  appr�ciez chaque copie.  Comme promis,  alors que
vous attendez votre premier bulletin ici sont les liens
aux videos LIBRES et aux photos LIBRES!

WILLKOMMEN ZU EUREKA!
=====================
Gl�ckw�nsche,   Ihre  freie  Subskription  zum  Eureka!
Rundschreiben wird jetzt oben eingestellt.  Wir hoffen,
da� Sie jedes  Exemplar genie�en.  Wie, w�hrend Sie Ihr
erstes Rundschreiben hier warten, sind die Links zu den
FREIEN videos und zu den FREIEN Fotos versprochen! 

RECEPCI�N A EUREKA!
===================
Felicitaciones,  su  suscripci�n  libre  al  Eureka! el
bolet�n  de   noticias  ahora  se  fija   para  arriba.
Esperamos  que  usted  goce  de  cada  copia.  Seg�n lo
prometido,  mientras que usted espera su primer bolet�n
de noticias aqu� son las conexiones a los videos LIBRES
y a las fotos LIBRES!

BENVENUTO A EUREKA!
===================
Congratulazioni,   il  vostro  abbonamento   libero  al
Eureka!  il bollettino  ora � installato.  Speriamo che
godiate ogni copia.  Come promesso, mentre aspettate il
vostro primo bollettino qui sono i collegamenti ai vid-
eos LIBERI ed alle foto LIBERE!

BOA VINDA A EUREKA!
===================
Felicita��es, sua subscri��o livre ao Eureka! o boletim
de not�cias � ajustado  agora acima.  N�s esperamos que
voc� aprec�e cada c�pia.  Como prometidas,  quando voc�
esperar seu  primeiro boletim  de not�cias aqui  s�o as
liga��es aos videos LIVRES e �s fotos LIVRES!

=======================================================
FREE hardcore videos ........ http://www.slutorama.com/
FREE hardcore photos .... http://209.50.232.36/desires/
=======================================================

The following lines identify the source of this subscription
request,  including date/time,  IP number and  browser used.






From eureka-help at eureka.abc-web.com  Sun May 17 20:02:30 1998
From: eureka-help at eureka.abc-web.com (eureka-help at eureka.abc-web.com)
Date: Sun, 17 May 1998 20:02:30 -0700 (PDT)
Subject: Successful Subscription
Message-ID: <895460543.21135.ezmlm@eureka.abc-web.com>


WELCOME TO EUREKA!
==================
Congratulations,  your free subscription to the Eureka!
newsletter is now set up. We hope you enjoy every copy.
As promised,  while you wait  for your first newsletter
here are the links to  the FREE videos and FREE photos!

BIENVENUE � EUREKA!
===================
F�licitations,  votre abonnement  libre �  l'Eureka! le
bulletin  est  maintenant install�.  Nous esp�rons  que
vous  appr�ciez chaque copie.  Comme promis,  alors que
vous attendez votre premier bulletin ici sont les liens
aux videos LIBRES et aux photos LIBRES!

WILLKOMMEN ZU EUREKA!
=====================
Gl�ckw�nsche,   Ihre  freie  Subskription  zum  Eureka!
Rundschreiben wird jetzt oben eingestellt.  Wir hoffen,
da� Sie jedes  Exemplar genie�en.  Wie, w�hrend Sie Ihr
erstes Rundschreiben hier warten, sind die Links zu den
FREIEN videos und zu den FREIEN Fotos versprochen! 

RECEPCI�N A EUREKA!
===================
Felicitaciones,  su  suscripci�n  libre  al  Eureka! el
bolet�n  de   noticias  ahora  se  fija   para  arriba.
Esperamos  que  usted  goce  de  cada  copia.  Seg�n lo
prometido,  mientras que usted espera su primer bolet�n
de noticias aqu� son las conexiones a los videos LIBRES
y a las fotos LIBRES!

BENVENUTO A EUREKA!
===================
Congratulazioni,   il  vostro  abbonamento   libero  al
Eureka!  il bollettino  ora � installato.  Speriamo che
godiate ogni copia.  Come promesso, mentre aspettate il
vostro primo bollettino qui sono i collegamenti ai vid-
eos LIBERI ed alle foto LIBERE!

BOA VINDA A EUREKA!
===================
Felicita��es, sua subscri��o livre ao Eureka! o boletim
de not�cias � ajustado  agora acima.  N�s esperamos que
voc� aprec�e cada c�pia.  Como prometidas,  quando voc�
esperar seu  primeiro boletim  de not�cias aqui  s�o as
liga��es aos videos LIVRES e �s fotos LIVRES!

=======================================================
FREE hardcore videos ........ http://www.slutorama.com/
FREE hardcore photos .... http://209.50.232.36/desires/
=======================================================

The following lines identify the source of this subscription
request,  including date/time,  IP number and  browser used.






From eureka-help at eureka.abc-web.com  Sun May 17 21:07:55 1998
From: eureka-help at eureka.abc-web.com (eureka-help at eureka.abc-web.com)
Date: Sun, 17 May 1998 21:07:55 -0700 (PDT)
Subject: Successful Subscription
Message-ID: <895464469.18392.ezmlm@eureka.abc-web.com>


WELCOME TO EUREKA!
==================
Congratulations,  your free subscription to the Eureka!
newsletter is now set up. We hope you enjoy every copy.
As promised,  while you wait  for your first newsletter
here are the links to  the FREE videos and FREE photos!

BIENVENUE � EUREKA!
===================
F�licitations,  votre abonnement  libre �  l'Eureka! le
bulletin  est  maintenant install�.  Nous esp�rons  que
vous  appr�ciez chaque copie.  Comme promis,  alors que
vous attendez votre premier bulletin ici sont les liens
aux videos LIBRES et aux photos LIBRES!

WILLKOMMEN ZU EUREKA!
=====================
Gl�ckw�nsche,   Ihre  freie  Subskription  zum  Eureka!
Rundschreiben wird jetzt oben eingestellt.  Wir hoffen,
da� Sie jedes  Exemplar genie�en.  Wie, w�hrend Sie Ihr
erstes Rundschreiben hier warten, sind die Links zu den
FREIEN videos und zu den FREIEN Fotos versprochen! 

RECEPCI�N A EUREKA!
===================
Felicitaciones,  su  suscripci�n  libre  al  Eureka! el
bolet�n  de   noticias  ahora  se  fija   para  arriba.
Esperamos  que  usted  goce  de  cada  copia.  Seg�n lo
prometido,  mientras que usted espera su primer bolet�n
de noticias aqu� son las conexiones a los videos LIBRES
y a las fotos LIBRES!

BENVENUTO A EUREKA!
===================
Congratulazioni,   il  vostro  abbonamento   libero  al
Eureka!  il bollettino  ora � installato.  Speriamo che
godiate ogni copia.  Come promesso, mentre aspettate il
vostro primo bollettino qui sono i collegamenti ai vid-
eos LIBERI ed alle foto LIBERE!

BOA VINDA A EUREKA!
===================
Felicita��es, sua subscri��o livre ao Eureka! o boletim
de not�cias � ajustado  agora acima.  N�s esperamos que
voc� aprec�e cada c�pia.  Como prometidas,  quando voc�
esperar seu  primeiro boletim  de not�cias aqui  s�o as
liga��es aos videos LIVRES e �s fotos LIVRES!

=======================================================
FREE hardcore videos ........ http://www.slutorama.com/
FREE hardcore photos .... http://209.50.232.36/desires/
=======================================================

The following lines identify the source of this subscription
request,  including date/time,  IP number and  browser used.






From pleontks at hotmail.com  Sun May 17 23:11:23 1998
From: pleontks at hotmail.com (John C)
Date: Sun, 17 May 1998 23:11:23 -0700 (PDT)
Subject: Newsletter
Message-ID: <19980518061036.7570.qmail@hotmail.com>


I'm getting ready to put out another newsletter.  But I can only do it 
with ya'll's help.  if possible, could everyone send me an article or 
anything at all for the newsletter?

Thanks

John
pleontks at hotmail.com
http://members.tripod.com/~pleontks

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From MAILER-DAEMON at netcom.com  Sun May 17 23:59:02 1998
From: MAILER-DAEMON at netcom.com (Mail Delivery Subsystem)
Date: Sun, 17 May 1998 23:59:02 -0700 (PDT)
Subject: Returned mail: User unknown
Message-ID: <199805180658.XAA18423@netcomsv.netcom.com>


The original message was received at Sun, 17 May 1998 23:58:55 -0700 (PDT)
from pax-ca11-11.ix.netcom.com [204.30.66.171]

   ----- The following addresses had permanent fatal errors -----


   ----- Transcript of session follows -----
... while talking to eureka.abc-web.com.:
>>> RCPT To:
<<< 553 sorry, your envelope sender is in my badmailfrom list (#5.7.1)
550 ... User unknown

   ----- Original message follows -----

Return-Path: 
Received: from ca07b8bl (pax-ca11-11.ix.netcom.com [204.30.66.171])
	by netcomsv.netcom.com (8.8.5-r-beta/8.8.5/(NETCOM v1.01)) with SMTP id XAA18419;
	Sun, 17 May 1998 23:58:55 -0700 (PDT)
Message-Id: <3.0.5.32.19980517235334.008e0210 at popd.ix.netcom.com>
X-Sender: stewarts at popd.ix.netcom.com
X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
Date: Sun, 17 May 1998 23:53:34 -0700
To: eureka-help at eureka.abc-web.com, abuse at abc-web.com
From: Bill Stewart 
Subject: unsubscribe
In-Reply-To: <895458516.7940.ezmlm at eureka.abc-web.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

unsubscribe
end
cypherpunks is a list with several hundred subscribers.
Some spammer has been trying to subscribe the list
to your service.  Earlier today I connected to the
web site and found that somebody else had
permanently removed most of the list aliases,
but you seem to be sending out this announcement anyway.

At 02:28 AM 5/18/98 -0000, you wrote:
>WELCOME TO EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Congratulations,  your free subscription to the Eureka!
>newsletter is now set up. We hope you enjoy every copy.
>As promised,  while you wait  for your first newsletter
>here are the links to  the FREE videos and FREE photos!
>
>BIENVENUE =C0 EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>F=E9licitations,  votre abonnement  libre =E0  l'Eureka! le
>bulletin  est  maintenant install=E9.  Nous esp=E9rons  que
>vous  appr=E9ciez chaque copie.  Comme promis,  alors que
>vous attendez votre premier bulletin ici sont les liens
>aux videos LIBRES et aux photos LIBRES!
>
>WILLKOMMEN ZU EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Gl=FCckw=FCnsche,   Ihre  freie  Subskription  zum  Eureka!
>Rundschreiben wird jetzt oben eingestellt.  Wir hoffen,
>da=DF Sie jedes  Exemplar genie=DFen.  Wie, w=E4hrend Sie Ihr
>erstes Rundschreiben hier warten, sind die Links zu den
>FREIEN videos und zu den FREIEN Fotos versprochen!=20
>
>RECEPCI=D3N A EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Felicitaciones,  su  suscripci=F3n  libre  al  Eureka! el
>bolet=EDn  de   noticias  ahora  se  fija   para  arriba.
>Esperamos  que  usted  goce  de  cada  copia.  Seg=FAn lo
>prometido,  mientras que usted espera su primer bolet=EDn
>de noticias aqu=ED son las conexiones a los videos LIBRES
>y a las fotos LIBRES!
>
>BENVENUTO A EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Congratulazioni,   il  vostro  abbonamento   libero  al
>Eureka!  il bollettino  ora =E8 installato.  Speriamo che
>godiate ogni copia.  Come promesso, mentre aspettate il
>vostro primo bollettino qui sono i collegamenti ai vid-
>eos LIBERI ed alle foto LIBERE!
>
>BOA VINDA A EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Felicita=E7=F5es, sua subscri=E7=E3o livre ao Eureka! o boletim
>de not=EDcias =E9 ajustado  agora acima.  N=F3s esperamos que
>voc=EA aprec=EDe cada c=F3pia.  Como prometidas,  quando voc=EA
>esperar seu  primeiro boletim  de not=EDcias aqui  s=E3o as
>liga=E7=F5es aos videos LIVRES e =E0s fotos LIVRES!
>
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D
>FREE hardcore videos ........ http://www.slutorama.com/
>FREE hardcore photos .... http://209.50.232.36/desires/
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D
>
>The following lines identify the source of this subscription
>request,  including date/time,  IP number and  browser used.
>
>
>






From rob at www.usachat.com  Mon May 18 00:04:52 1998
From: rob at www.usachat.com (Robin Nixon)
Date: Mon, 18 May 1998 00:04:52 -0700 (PDT)
Subject: unsubscribe
Message-ID: <003501bd822a$89a26300$d3add9cf@webchat.earthlink.net>


Please give me the exact address to block - we already blocked all we know
of yours.

- Robin.

-----Original Message-----
From: Bill Stewart 
To: eureka-help at eureka.abc-web.com ;
abuse at abc-web.com 
Date: Monday, May 18, 1998 12:05 AM
Subject: unsubscribe


>unsubscribe
>end
>cypherpunks is a list with several hundred subscribers.
>Some spammer has been trying to subscribe the list
>to your service.  Earlier today I connected to the
>web site and found that somebody else had
>permanently removed most of the list aliases,
>but you seem to be sending out this announcement anyway.
>
>At 02:28 AM 5/18/98 -0000, you wrote:
>>WELCOME TO EUREKA!
>>==================
>>Congratulations,  your free subscription to the Eureka!
>>newsletter is now set up. We hope you enjoy every copy.
>>As promised,  while you wait  for your first newsletter
>>here are the links to  the FREE videos and FREE photos!
>>
>>BIENVENUE � EUREKA!
>>===================
>>F�licitations,  votre abonnement  libre �  l'Eureka! le
>>bulletin  est  maintenant install�.  Nous esp�rons  que
>>vous  appr�ciez chaque copie.  Comme promis,  alors que
>>vous attendez votre premier bulletin ici sont les liens
>>aux videos LIBRES et aux photos LIBRES!
>>
>>WILLKOMMEN ZU EUREKA!
>>=====================
>>Gl�ckw�nsche,   Ihre  freie  Subskription  zum  Eureka!
>>Rundschreiben wird jetzt oben eingestellt.  Wir hoffen,
>>da� Sie jedes  Exemplar genie�en.  Wie, w�hrend Sie Ihr
>>erstes Rundschreiben hier warten, sind die Links zu den
>>FREIEN videos und zu den FREIEN Fotos versprochen!
>>
>>RECEPCI�N A EUREKA!
>>===================
>>Felicitaciones,  su  suscripci�n  libre  al  Eureka! el
>>bolet�n  de   noticias  ahora  se  fija   para  arriba.
>>Esperamos  que  usted  goce  de  cada  copia.  Seg�n lo
>>prometido,  mientras que usted espera su primer bolet�n
>>de noticias aqu� son las conexiones a los videos LIBRES
>>y a las fotos LIBRES!
>>
>>BENVENUTO A EUREKA!
>>===================
>>Congratulazioni,   il  vostro  abbonamento   libero  al
>>Eureka!  il bollettino  ora � installato.  Speriamo che
>>godiate ogni copia.  Come promesso, mentre aspettate il
>>vostro primo bollettino qui sono i collegamenti ai vid-
>>eos LIBERI ed alle foto LIBERE!
>>
>>BOA VINDA A EUREKA!
>>===================
>>Felicita��es, sua subscri��o livre ao Eureka! o boletim
>>de not�cias � ajustado  agora acima.  N�s esperamos que
>>voc� aprec�e cada c�pia.  Como prometidas,  quando voc�
>>esperar seu  primeiro boletim  de not�cias aqui  s�o as
>>liga��es aos videos LIVRES e �s fotos LIVRES!
>>
>>=======================================================
>>FREE hardcore videos ........ http://www.slutorama.com/
>>FREE hardcore photos .... http://209.50.232.36/desires/
>>=======================================================
>>
>>The following lines identify the source of this subscription
>>request,  including date/time,  IP number and  browser used.
>>
>>
>>






From brownrk1 at texaco.com  Mon May 18 02:39:58 1998
From: brownrk1 at texaco.com (Brown, R Ken)
Date: Mon, 18 May 1998 02:39:58 -0700 (PDT)
Subject: Gunpowder taggant solution
Message-ID: <896C7C3540C3D111AB9F00805FA78CE20279C0@MSX11002>


> ichudov at algebra.com[SMTP:ichudov at algebra.com]  wrote: 
> 
> Also, a gun owner could simply buy gnu powder in various places and
> mix the batches.

We call it Wildebeeste Powder in this neck of the woods.

If you mix Blue Wildebeeste and Black Wildebeeste you get a virtual
Serengeti. There's a good one in the Natural History Museum in
Kensington. Just next to the Horese Evolution quiz.





From jya at pipeline.com  Mon May 18 04:28:05 1998
From: jya at pipeline.com (John Young)
Date: Mon, 18 May 1998 04:28:05 -0700 (PDT)
Subject: Crypto Under Digital Copyright Act
Message-ID: <199805181127.HAA16402@camel8.mindspring.com>


Congressional Record: May 15, 1998 (Senate)

                    DIGITAL MILLENNIUM COPYRIGHT ACT

  Mr. KYL. Mr. President, I rise today to speak about a section in the
Digital Millennium Copyright Act that I am particularly proud of, and
that is the law enforcement exception in the bill. At the Judiciary
Committee markup, Senator Grassley and I, along with the assistance of
Chairman Hatch and Senator Ashcroft worked to strengthen the law
enforcement exception in the bill. We received input on the language
from the copyright community and the administration: the National
Security Agency (NSA), the Central Intelligence Agency (CIA), the
Departments of Commerce and Justice, and the Office of Management and
Budget (OMB).

  The law enforcement exception ensures that the government continues
to have access to current and future technologies to assist in their
investigative, protective, or intelligence activities. I am concerned
that the tools and resources of our intelligence and law enforcement
communities are preserved--and more importantly, not limited, by
passage of S. 2037. Under that bill, a company who contracts with the
government can continue to develop encryption/decryption devices under
that contract, without having to worry about criminal penalties.

  Because much of our leading technologies come from the private
sector, the government needs to have access to this vital resource for
intelligence and law enforcement purposes.

  The law enforcement exception recognizes that oftentimes governmental
agencies work with non-governmental entities--companies, in order to
have access to and develop cutting edge technologies and devices. Such
conduct should not be prohibited or impeded by this copyright
legislation.

                          ____________________

Digital Millenium Copyright Act:

   http://jya.com/s2037.txt  (162K)





From 88769500 at 27850.com  Mon May 18 04:49:43 1998
From: 88769500 at 27850.com (Heather Johnson)
Date: Mon, 18 May 1998 04:49:43 -0700 (PDT)
Subject: I heard you wanted my picture..
Message-ID: <199805180718.HAA25658@mailroot.com>



Here it is!
From sunder at brainlink.com Mon May 18 09:53:47 1998 From: sunder at brainlink.com (Sunder) Date: Mon, 18 May 1998 09:53:47 -0700 (PDT) Subject: Gunpowder taggant solution In-Reply-To: <199805161952.OAA22508@manifold.algebra.com> Message-ID: <3560664D.A697C23A@brainlink.com> Igor Chudov @ home wrote: > Also, a gun owner could simply buy gnu powder in various places and > mix the batches. Ayeee! Just what we needed! Free Software GnuPowder. :) From the folx who broght you Emacs. :) (sorry had to be done!) -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From jya at pipeline.com Mon May 18 10:37:57 1998 From: jya at pipeline.com (John Young) Date: Mon, 18 May 1998 10:37:57 -0700 (PDT) Subject: German Phone Cards Hacked Message-ID: <199805181737.NAA03845@camel8.mindspring.com> Forwarded from Europe: May 18, 1998 Telephone card fraud in the millions of dollars. Hackers from the Netherlands have inundated the German market with illegally recharged telephone cards, causing losses in the several millions of marks (millions of dollars), stated the weekly Focus, due out Monday. In breaking the telephone cards' code, the hackers succeeded in recharging cards emptied of their credit. The German association of tobacconist wholesalers assesses losses at 60 million marks (33 million dollars), reports Focus. The con men bought used cards by the thousands from collectors. As a result, their intitial price of five pfenning (2.7 cents) per card quickly rose to one mark (55 cents). According to experts cited by Focus, the recharged cards, which the pirates resold at a lesser or equivalent price, are impossible to distinguish from those purchased legitimately. Card producers intend to stop this illegal commerce thanks to a new software program allowing used cards to be electronically marked, the weekly believes. [Translation by DN] ---------- Escroquerie de plusieurs millions de dollars par cartes t�l�phoniques Des pirates informatiques n�erlandais ont inond� le march� allemand avec des cartes t�l�phoniques recharg�es ill�galement, causant un pr�judice de plusieurs millions de marks (plusieurs millions de dollars), affirme l'hebdomadaire Focus � para�tre lundi. En for�ant le syst�me de codage des cartes t�l�phoniques, les pirates ont r�ussi � recharger des cartes vid�es de leurs unit�s. L'association allemande des grossistes et d�bitants de tabac chiffre le pr�judice � 60 millions de marks (33 millions de dollars), rapporte Focus. Les escrocs achetaient des cartes usag�es par milliers aupr�s de collectionneurs. Leur prix initial de cinq pfennig (2,7 cents) par carte est de ce fait rapidement mont� � pr�s d'un mark (55 cents). Selon des experts cit�s par Focus, les cartes recharg�es, que les pirates revendaient � un moindre prix ou au m�me prix, sont impossibles � diff�rencier de celles d�ment achet�es. Les fabricants de cartes entendent stopper ce commerce ill�gal gr�ce � un nouveau programme informatique (software) permettant de marquer �lectroniquement les cartes usag�es, croit savoir l'hebdomadaire. From online at cyper-west.com Mon May 18 11:14:29 1998 From: online at cyper-west.com (OnLine Mortgage Corp.) Date: Mon, 18 May 1998 11:14:29 -0700 (PDT) Subject: Home Loans on the Net Message-ID: <199805181264EAA42243@post.cyber-west.com> With intersest rates so low, you might be intersted in obtaining a new Home Loan. Does your income not quite cover all your needs? Are you left wanting for business needs, home needs, autos, travel, or for any other purpose or do you just want to get out of DEBT? Just complete our EASY APPLICATION (http://www.mortgageweb.com/onlea.htm) and we will do a finanical analysis to see how much money you can save each month. Or how much money you can get to be used for any purpose. You can borrow money for: Debt Consolidation Autos & Boats Starting a Business Medical Expenses Anything you might need You alone decide how much to borrow and how long to repay the loan. In fact may programs allow you to repay early with no penalty. So APPLY NOW, you have nothing to lose. In fact if you act within the next 48 hours we will include a free pre-paid calling card with your loan. (http://www.mortgageweb.com/onlea.htm) OnLine Mortgage Corporation ************************************************************************************************ We are responsible e-mailers and received information that you might be interested in this program. If this was done in error please accept our appology and hit reply and enter "remove in the heading". ************************************************************************************************** From lfarrar at chsch.demon.co.uk Sun May 17 21:20:00 1998 From: lfarrar at chsch.demon.co.uk (Luke Farar) Date: Mon, 18 May 1998 12:20:00 +0800 Subject: remove Message-ID: <355CF548.1F08@chsch.demon.co.uk> remove From billp at nmol.com Mon May 18 13:23:34 1998 From: billp at nmol.com (bill payne) Date: Mon, 18 May 1998 13:23:34 -0700 (PDT) Subject: National Atomic Museum Message-ID: <35609809.407F@nmol.com> Monday 5/18/98 1:37 PM John Young J Orlin Grabbe Morales http://jya.com/whpfiles.htm and I had lunch at Wendy�s at 11:30. I read drafts of Morales upcoming filings. And discussed legal strategies. After lunch, I went to the National Atomic Museum on Kirtland AFB. The museum is across the street from Sandia. They now charge for admission ... but I made it in for $1 as a senior citizen. The museum main hall tour is laid out by history date of radiation. The self-guided tour gets interesting about the time of Hahn, Heisenberg, Fermi, Lawrence, ... Then it gets into THE BOMB. Lots of picture of the �50 NTS site explosions. But as we know from Carole Gallagher book's American Ground Zero a DOE employee is quoted �Those Mormons don�t give a shit about radiation.� After touring the main hall, I went back to a wall display near the bathrooms. There they have a rather-large display on LANL mathematician Stanislas Ulam. Ulam�s thing was Monte Carlo computations. These use random or pseudorandom numbers. Ted Lewis told me that they now use the gfsr at LANL for its nuclear bomb simulations. http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=0 But this is how the mess got started. Me making contact with a Japanese professor who developed a new method for selecting the binary seed matrix for the gfsr. I went into the gift shop. I bought John Young a refrigerator magnet PROUDLY proclaiming 1945 509th COMPOSITE GROUP 1995 FIRST ATOMIC BOMBARDMENT 50th ANNIVERSARY and Orlin a colorful red and orange postcard which reads on the back Trinity On July 16, 1945 at 5:30 AM, at a site code-named trinity, approximately 130 miles south of Albuquerque on White Sands Missile Range, the world�s first nuclear device was exploded. The explosion, equal to 20,000 tons of TNT, was was seen and heard over the entire state of New Mexico. Great article, Orlin. http://www.aci.net/kalliste/speccoll.htm Madsen did good too. http://caq.com/cryptogate Let�s all hope Congress, unlike the bureaucrats, see the merits of getting the requested documents posted on Internet. And on to settlement of this UNFORTUNATE matter. Later bill From shamrock at cypherpunks.to Mon May 18 13:31:35 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Mon, 18 May 1998 13:31:35 -0700 (PDT) Subject: Crypto Under Digital Copyright Act In-Reply-To: <199805181127.HAA16402@camel8.mindspring.com> Message-ID: On Mon, 18 May 1998, John Young wrote: > Congressional Record: May 15, 1998 (Senate) > > DIGITAL MILLENNIUM COPYRIGHT ACT > > Mr. KYL. Mr. President, I rise today to speak about a section in the > Digital Millennium Copyright Act that I am particularly proud of, and > that is the law enforcement exception in the bill. Yup. Reverse engineer a cipher, go to jail. Seems future security analysis of ciphers will have to be released anonymously from Tonga. -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From jim at mentat.com Mon May 18 16:23:06 1998 From: jim at mentat.com (Jim Gillogly) Date: Mon, 18 May 1998 16:23:06 -0700 (PDT) Subject: GFSR initialization? [Re: National Atomic Museum] Message-ID: <9805182322.AA27897@mentat.com> [Bill Payne's's mailing list pruned back to cypherpunks only] > Ted Lewis told me that they now use the gfsr at LANL for its nuclear > bomb=20 > simulations. > > http://av.yahoo.com/bin/query?p=3Dgfsr&hc=3D0&hs=3D0=20 > > But this is how the mess got started. Me making contact with a > Japanese=20 > professor who developed a new method for selecting the binary seed > matrix > for the gfsr. Is that to speed it up, so you don't have to initialize it by spinning through a bunch of initial iterations? Turns out there's a time-memory tradeoff, where if you do a recursion relationship on where you want it to start, you can set it up in log2 time and come out with the same starting point you would have by spinning: the recursion equations cancel nicely and it boils down to something manageable. I think other people have initialized it with another PRNG with good success. I that's not classified, since I came up with the recursion shortly after the Lewis & Payne paper on GFSR came out -- JACM, wasn't it? I never got around to writing it up. Jim Gillogly From wopaulai91 at yahoo.com Mon May 18 19:14:18 1998 From: wopaulai91 at yahoo.com (wopaulai91 at yahoo.com) Date: Mon, 18 May 1998 19:14:18 -0700 (PDT) Subject: Information you requested! Message-ID: <199805182121RAA19197@us.ibm.net.bmc.com> Thank you for your interest in our training Course. Success Courses offers an extensive Video Tape training course in "How to Collect Judicial Judgments". If you are like many people, you are not even sure what a Judicial Judgment is and why processing Judicial Judgments can earn you very substantial income. If you ever sue a company or a person and you win then you will have a Judicial Judgment against them. You are happy you won but you will soon find out the shocking fact: "Its now up to you to collect on the Judgment". The court does not require the loser to pay you. The court will not even help you. You must trace the loser down, find their assets, their employment, bank accounts, real estate, stocks and bonds, etc. Very few people know how to find these assets or what to do when they are found. The result is that millions of Judgments are just sitting in files and being forgotten. "In 79% of the cases the winner of a Judgment never sees a dime." The non-payment of judicial debt has grown to epidemic proportions. Right now in the United States there is between 200 and 300 billion dollars of uncollected Judicial Judgment debt. For every Judgment that is paid, 5 more Judgments take its place. We identified this massive market 4 years ago and have actively pursued Judicial Judgments since. We invented this business. We have perfected it into a well proven and solid profession in which only a select few will be trained in the techniques necessary to succeed in this profession. With our first hand experience we have built a course which teaches you how to start your business in this new unknown and exciting field of processing Judicial Judgments. By following the steps laid out in our course and with reasonable effort you can become very successful in the processing of Judicial Judgments. The income potential is substantial in this profession. We have associates who have taken our course and are now working full time making $96,000.00 to over $200,000.00 per year. Part time associates are earning between $24,000.00 and $100,000.00 per year. Some choose to operate out of their home and work by themselves. Others build a sizable organization of 15 to 25 people in attractive business offices. Today Success Courses and our associates have over 632 million dollars in Judicial Judgments that we are currently processing. Of this 632 million, 36 million is in the form of joint ventures between our firm and our associates. Joint ventures are where we make our money. We only break even when our course is purchased. We make a 12% margin on the reports we supply to our associates. Our reporting capability is so extensive that government agencies, police officers, attorneys, credit agencies etc. all come to us for reports. Many of our associates already have real estate liens in force of between 5 million to over 15 million dollars. Legally this means that when the properties are sold or refinanced our associate must be paid off. The norm is 10% interest compounded annually on unpaid Judicial Judgments. Annual interest on 5 million at 10% translates to $500,000.00 annually in interest income, not counting the payment of the principle. Our associates earn half of this amount or $250,000.00 per year. This is just for interest, not counting principle and not counting the compounding of the interest which can add substantial additional income. Typically companies are sold for 10 times earnings. Just based on simple interest an associate with 5 million in real estate liens could sell their business for approximately 2.5 million dollars. 92% of all of our associates work out of their home; 43% are women and 36% are part time. One of the benefits of working in this field is that you are not under any kind of time frame. If you decide to take off for a month on vacation then go. The Judgments you are working on will be there when you return. The Judgments are still in force, they do not disappear. The way we train you is non-confrontational. You use your computer and telephone to do most of the processing. You never confront the debtor. The debtor doesn't know who you are. You are not a collection agency. Simply stated the steps to successful Judicial Processing are as follows: � Mail our recommended letter to companies and individuals with Judicial Judgments. (We train you how to find out who to write to) � 8% to 11% of the firms and people you write will call you and ask for your help. They call you, you don't call them unless you want to. � You send them an agreement (supplied in the course) to sign which splits every dollar you collect 50% to you and 50% to them. This applies no matter if the judgment is for $2,000.00 or $2,000,000.00. � You then go on-line to our computers to find the debtor and their assets. We offer over 120 powerful reports to assist you. They range from credit reports from all three credit bureaus, to bank account locates, employment locates, skip traces and locating stocks and bonds, etc. The prices of our reports are very low. Typically 1/2 to 1/3 of what other firms charge. For example we charge $6.00 for an individuals credit report when some other companies charge $25.00. � Once you find the debtor and their assets you file garnishments and liens on the assets you have located. (Standard fill in the blanks forms are included in the course) � When you receive the assets you keep 50% and send 50% to the original Judgment holder. � Once the Judgment is fully paid you mail a Satisfaction of Judgment to the court. (Included in the course) Quote's from several of our students: Thomas in area code 516 writes us: "I just wanted to drop you a short note thanking you for your excellent course. My first week, part time, will net me 3,700.00 dollars. Your professionalism in both the manual and the video opened doors for me in the future. There's no stopping me now. As of February 3rd, 1995, Thomas states he has over $8,500,000 worth of judgments he is working on. After only having this course for four months, Larry S. in area code 314 stated to us: "I am now making $2,000.00 per week and expect this to grow to twice this amount within the next year. I am having a ball. I have over $250,000 in judgments I am collecting on now." After having our course for 7 months Larry S. in 314 stated "I am now making $12,000.00 per month and have approximately $500,000.00 in judgments I am collecting on. Looks like I will have to hire someone to help out" Marshal in area code 407 states to us "I feel bad, you only charged me $189.00 for this course and it is a gold mine. I have added 3 full time people to help me after only having your course for 5 months" If the above sounds interesting to you then its time for you to talk to a real live human being, no cost or obligation on your part. Please call us at Area Code 2 5 3 then 8 6 3--5 5 2 2. We have Customer Support staff available to you from 8:00AM to 7:00PM (Pacific Time) Monday through Saturday. Closed Sunday. If you call this number you can talk to one of our experienced Customer Support personnel. They can answer any questions you may have - with no obligation. Sometimes we run special pricing on our courses and combinations of courses. When you call our Customer Support line they can let you know of any specials we may be running. If you like what you read and hear about our courses, then the Customer Support person can work with you to place your order. We are very low key. We merely give you the facts and you can then decide if you want to work with us or not. >From the above information and actual results you can see why we can state the following: With our course you can own your own successful business. A business which earns you substantial income now and one which could be sold in 3-5 years, paying you enough to retire on and travel the world. A business which is extremely interesting to be in. A Business in which every day is new and exciting. None of your days will be hum drum. Your brain is challenged. A business which protects you from Corporate downsizing. A business which you can start part time from your home and later, if you so desire, you can work in full time. A business which is your ticket to freedom from others telling you what to do. A business which lets you control your own destiny. Our training has made this happen for many others already. Make it happen for you! Thank you for your time and interest. 24mx58.10gr.1 From 9086097 at 6urt6ijratr.com Tue May 19 01:26:20 1998 From: 9086097 at 6urt6ijratr.com (9086097 at 6urt6ijratr.com) Date: Tue, 19 May 1998 01:26:20 -0700 (PDT) Subject: 40 MILLION EMAIL ADDRESSES CHEAP PRICE!!! Message-ID: <199805190826.BAA22562@toad.com> 40 MILLION EMAILS FOR SALE super low price! Our Fresh Addresses Will Bring You Incredible Results! http://207.93.198.154/webhost If you REALLY want to get the word out regarding your services or products, Bulk Email is the BEST way to do so, PERIOD! Advertising in newsroups is good but you're competing with hundreds even THOUSANDS of other ads. Will your customer's see YOUR ad in the midst of all the others? Bulk Email will allow you to DIRECTLY contact your potential customers. They are much more likely to take the time to read about what you have to offer if it was as easy as reading it via email rather than searching through countless postings in newsgroups. There is a secret to effective Bulk Email...HIGH QUALITY LISTS! There are SO many companies offering bulk email lists that are months old and it's not uncommen for HALF of those addresses to be outdated and undeliverable. Also, most companies offer lists that they have compiled from addresses extracted from newsgroups, THE WORST PLACE TO GET ADDRESSES FROM! Why? Simple, most people that post messages in news- groups KNOW that their addresses might be extracted so they use FAKE addresses resulting in undeliverable messages. You can now get FRESH, HIGH QUALITY lists of addresses that have NOT been extracted from newsgroups! Our lists are compiled of addresses that we have extracted from member directories and help forums where you CAN NOT use fake email addresses! Also, our lists are LESS than 1 month old and are CONSTANTLY updated to remove dupes and undeliverables! Our emails can be downloaded at a web site or be shipped to your home in disks. Our emails are in text form, one line per email. This form is compatible with Pegasus, Eudora, Microsoft email programs, and many other popular email softwares. We believe that if you have a great product or service for everyone, you should let everyone know. Do it cost effectively today! Sending emails doesn't cost you one cent! In just one night, millions of people will know about your company or your corporation. Market your company by reaching 40,000,000 (40 million) fresh customers for only $79.00!!!! Special Sale! Buy the 40 Million email addresses today and receive Email Platinum Professional Version FREE! Email Platinum Pro is 4 programs in one! (This message is sent by Email Platinum. You can too send out mass sales letters professionally.) Email Platinum is an extremely fast mass emailer (150,000 emails per hour with modest Pentium) that does four things: 1) Collects email addresses from newsgroups, web sites, or from AOL member files by key words and by specific interests. 2) Mail out your sales letters with automated friendly addressing (example: Dear John, Dear Nancy, etc.) Ramdomizes from and to field. One push of a button does it all. Guarantee no cut and paste. 3) Have capability to remove email addresses of people who don't like emails. 4) Post your sales letters to THOUSANDS OF NEWSGROUPS WITH A PUSH OF A BUTTON --- within HALF AN HOUR!! Email Platinum and Email Addresses are your best sales tools! If you have a good product, you will be rich in no time. Call today (415)585-3825. All for $79. Not a penny extra. Call today (415)585-3825. Technical support available 24 hours. Emails are updated regularly. We can accept Visa or Master Card. http://207.93.198.154/webhost Or, simply print this form and fill it out. Mail it along with $79 check or money order to: Alex Chiu PO BOX 16547 San Francisco CA 94116 (415) 585-3825 Upon the receipt of your payment, you will immediately be instructed via email or by phone on how to download the fresh email addresses. Name: _________________________________ Address: ________________________________________ _________________________________________________ Telephone number: ___________________________ Email address: ______________________________ ----------------------------------------------------- ------------------------------------------------------ Don't want to email millions of people yourself? No problem. I can do it for you professionally! I mail out two million emails for you within 3 days for $129!! Tell me what kind of customer you would want, and I will set the target with my highly targeted list. A mere $129 service includes: Email two million people. (targeted prospects) Post advertisement on 2000 newsgroups. telephone recommendations and technical support on how to make money on the internet. I guarantee you this is a great way to start your own company on the internet. Few months later, you will be like me making $5000 a month with internet! Call (415) 585-3825 if you have any question. From www at dejanews.com Tue May 19 02:40:00 1998 From: www at dejanews.com (www at dejanews.com) Date: Tue, 19 May 1998 02:40:00 -0700 (PDT) Subject: Deja News Registration Confirmation Message-ID: <199805190939.EAA21236@x5.dejanews.com> Welcome to My Deja News! You have registered for My Deja News using the email address: cypherpunks at toad.com. If you did not register for My Deja News, please ignore this message. To enable you to post messages on Deja News, we must confirm your email address. This allows us to minimize "spam" and other problems. To confirm your email address, visit the following Web page: http://www.dejanews.com/ec.xp/Z9601d5cf485376063bac83214984f531fd6293a If your email software supports it, you can simply click on the link. Since this Web page address (URL) is quite lengthy, however, you may find it necessary to copy the entire URL and paste it into your Web browser. As a reminder, your username is bsphynx and your password is sphynx. You may wish to keep this email to refer to in case you forget. If you have any questions about My Deja News, please refer to the Help page at http://www.dejanews.com/help/help_regstr.shtml Thanks, Deja News From jya at pipeline.com Tue May 19 04:39:44 1998 From: jya at pipeline.com (John Young) Date: Tue, 19 May 1998 04:39:44 -0700 (PDT) Subject: German Phone Cards Hacked In-Reply-To: <199805181737.NAA03845@camel8.mindspring.com> Message-ID: <199805191139.HAA15263@camel8.mindspring.com> See English version of German article yesterday on Dutch hack of phone cards: http://jya.com/card-less.htm From jya at pipeline.com Tue May 19 04:57:57 1998 From: jya at pipeline.com (John Young) Date: Tue, 19 May 1998 04:57:57 -0700 (PDT) Subject: G8 on High Tech Crime Message-ID: <199805191157.HAA20483@camel8.mindspring.com> Ross Anderson and Ulf M�ller have provided URLs for the recent communique from the Brimingham G8 summit on "principles and action plan" for fighting high tech crime: http://jya.com/g8crime.htm From bill.stewart at pobox.com Tue May 19 08:05:24 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 19 May 1998 08:05:24 -0700 (PDT) Subject: linux-ipsec: ANNOUNCE: FreeS/WAN IPSEC & IKE version 0.8 released & useful! Message-ID: <3.0.5.32.19980518152708.008bdd30@popd.ix.netcom.com> Forwarded from linux-ipsec at clinet.fi - posted by Hugh Daniel --------------------------------------------------------- I would like to announce for the FreeS/WAN software team that they now have a freeswan-0.8 release available for download from the FreeS/WAN home page at: http://www.xs4all.nl/~freeswan The 0.8 (and target 1.0 in June) runs only in a VPN (tunnel) mode, protecting and encrypting net traffic for a subnet behind the SG. This setup is called a SG for Security Gateway. We plan on implementing the rest of the IPSEC and IKE draft standards in our 2.0 release later this summer for the 2.1.xxx and 2.2.xx series Linux kernels. There is some useful documentation for the current FreeS/WAN done by Kai Martius at: http://www.imib.med.tu-dresden.de/imib/Internet/index.html The 0.8 release has been tested extensively in the hand keyed ESP-3DES-HMAC-MD5-96 tunnel mode and is quite robust. On a 150Mhz 586 Clone PC TCP throughput is over 320 Kbytes/second sustained as measured by netperf. The IKE daemon pluto has been tested only a very little and sometimes works and sometimes does not. It will work for the simple VPN case before 1.0. Feedback, new features, documentation, scripts and bug fixes & reports are especially useful in the next few weeks before we start in on the 0.9x series of release working up to a stable 1.0 release in June. Don't wait for the last minute to submit that neat feature or bug fix, as we might not have time to include it! If you have questions about the project please see our home page where you will find a mail list, list archives, FTP directory's etc. Thanks to everyone who made this release possible, but mostly the people who coded it up! Please post all bugs, fixes, code etc. to the public email list at . ||ugh Daniel hugh at toad.com Systems Testing & Project mis-Management The Linux FreeS/WAN Project http://www.xs4all.nl/~freeswan From LISTSERV at LISTSERV.AOL.COM Tue May 19 08:05:54 1998 From: LISTSERV at LISTSERV.AOL.COM (L-Soft list server at America Online (1.8c)) Date: Tue, 19 May 1998 08:05:54 -0700 (PDT) Subject: Rejected posting to CYBERIA-L@LISTSERV.AOL.COM Message-ID: <199805191505.IAA03014@toad.com> You are not authorized to send mail to the CYBERIA-L list from your cypherpunks at TOAD.COM account. You might be authorized to send to the list from another of your accounts, or perhaps when using another mail program which generates slightly different addresses, but LISTSERV has no way to associate this other account or address with yours. If you need assistance or if you have any question regarding the policy of the CYBERIA-L list, please contact the list owners: CYBERIA-L-request at LISTSERV.AOL.COM. ------------------------ Rejected message (36 lines) -------------------------- Received: from netcomsv.netcom.com (uucp1-b.netcom.com [163.179.3.1]) by listserv.aol.com (8.8.8/8.8.8) with ESMTP id LAA20089 for ; Tue, 19 May 1998 11:05:16 -0400 (EDT) Received: from ca07b8bl (pax-ca14-19.ix.netcom.com [204.31.233.83]) by netcomsv.netcom.com (8.8.5-r-beta/8.8.5/(NETCOM v1.01)) with SMTP id IAA23186; Tue, 19 May 1998 08:05:12 -0700 (PDT) Message-Id: <3.0.5.32.19980518104054.008bd710 at popd.ix.netcom.com> X-Sender: stewarts at popd.ix.netcom.com (Unverified) X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32) Date: Mon, 18 May 1998 10:40:54 -0700 To: Law & Policy of Computer Communications , CYBERIA-L at LISTSERV.AOL.COM From: Bill Stewart Subject: Re: regulating speech (was: DNS) In-Reply-To: <3.0.16.19980515115128.34271d5c at pop.radix.net> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" At 12:41 PM 5/15/98 -0400, Donald Weightman wrote: >I wonder if LEBRON V. AMTRAK is relevant here. There the Court extended >the First Amendment to corporations created by, and under the control of, >the government in the case of an artist who argued successfully that Amtrak >had been wrong to reject his billboard display because of its political >message. > >The devil is in the details -- of InterNIC's creation and operation, vs. >Amtrak's. The Supreme Court just decided that Tax-funded radio/tv stations don't have to include all candidates for an office in their debates if they don't feel like it, based on First Amendment reasons. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From eureka-help at eureka.abc-web.com Tue May 19 08:42:45 1998 From: eureka-help at eureka.abc-web.com (eureka-help at eureka.abc-web.com) Date: Tue, 19 May 1998 08:42:45 -0700 (PDT) Subject: Successful Subscription Message-ID: <895592559.16954.ezmlm@eureka.abc-web.com> WELCOME TO EUREKA! ================== Congratulations, your free subscription to the Eureka! newsletter is now set up. We hope you enjoy every copy. As promised, while you wait for your first newsletter here are the links to the FREE videos and FREE photos! BIENVENUE � EUREKA! =================== F�licitations, votre abonnement libre � l'Eureka! le bulletin est maintenant install�. Nous esp�rons que vous appr�ciez chaque copie. Comme promis, alors que vous attendez votre premier bulletin ici sont les liens aux videos LIBRES et aux photos LIBRES! WILLKOMMEN ZU EUREKA! ===================== Gl�ckw�nsche, Ihre freie Subskription zum Eureka! Rundschreiben wird jetzt oben eingestellt. Wir hoffen, da� Sie jedes Exemplar genie�en. Wie, w�hrend Sie Ihr erstes Rundschreiben hier warten, sind die Links zu den FREIEN videos und zu den FREIEN Fotos versprochen! RECEPCI�N A EUREKA! =================== Felicitaciones, su suscripci�n libre al Eureka! el bolet�n de noticias ahora se fija para arriba. Esperamos que usted goce de cada copia. Seg�n lo prometido, mientras que usted espera su primer bolet�n de noticias aqu� son las conexiones a los videos LIBRES y a las fotos LIBRES! BENVENUTO A EUREKA! =================== Congratulazioni, il vostro abbonamento libero al Eureka! il bollettino ora � installato. Speriamo che godiate ogni copia. Come promesso, mentre aspettate il vostro primo bollettino qui sono i collegamenti ai vid- eos LIBERI ed alle foto LIBERE! BOA VINDA A EUREKA! =================== Felicita��es, sua subscri��o livre ao Eureka! o boletim de not�cias � ajustado agora acima. N�s esperamos que voc� aprec�e cada c�pia. Como prometidas, quando voc� esperar seu primeiro boletim de not�cias aqui s�o as liga��es aos videos LIVRES e �s fotos LIVRES! ======================================================= FREE hardcore videos ........ http://www.slutorama.com/ FREE hardcore photos .... http://209.50.232.36/desires/ ======================================================= The following lines identify the source of this subscription request, including date/time, IP number and browser used. From guy at panix.com Tue May 19 08:42:59 1998 From: guy at panix.com (Information Security) Date: Tue, 19 May 1998 08:42:59 -0700 (PDT) Subject: NSA & y2k Message-ID: <199805191542.LAA10584@panix2.panix.com> Forwarding... ---guy > From owner-ignition-point at majordomo.pobox.com Tue May 19 10:29:02 1998 > Subject: IP: NSA concerns could hamper DOD Y2K fix Source: Federal Computer Week http://www.fcw.com/pubs/fcw/1998/0518/fcw-frontnsa-5-18-1998.html NSA concerns could hamper DOD Y2K fix BY BOB BREWIN (antenna at fcw.com) HEATHER HARRELD (heather at fcw.com) DANIEL M. VERTON (dan_verton at fcw.com) The National Security Agency has slapped a security blanket on the Pentagon's efforts to fix the Year 2000 millennium bug, which could further slow the Defense Department's already-behind-schedule Year 2000 fixes. NSA has determined that all information detailing DOD's computers and its efforts to fix the Year 2000 problem are a "national security interest" and "highly sensitive." As a result, the Pentagon has cut off the military services and DOD project offices from the Defense Integrated Support Tool (DIST) database, which the Defense Information Systems Agency maintains to provide details on all DOD computer systems and interfaces for use in planning and deployment. DIST, according to DISA, is a database of some 9,000 DOD systems that the department uses to track such key areas as system interfaces, compliance with high-priority standards, interoperability testing, consolidation goals and Year 2000-compliance planning. DIST was seen as critical to the Year 2000 problem because it provides a central source of information about interfaces between different DOD systems, which is a chief concern of Year 2000 conversion efforts. DOD began using DIST to track Year 2000 compliance in August 1996, and a Dec. 19, 1997, memo from the Office of the Secretary of Defense to DOD chief information officers identified DIST as the "central, authoritative database for tracking resolution of the Year 2000-related problems for systems throughout the department." That aggregation of extensive details about Year 2000 problems with DOD systems poses a threat to national security, according to NSA. "The DOD's Y2K conversion effort is a national security interest," NSA reported in a statement supplied to FCW. "All information detailing these information systems and the progress being made toward their conversions is considered to be highly sensitive." DOD is not trying to cover up information about its Year 2000 efforts, a DOD spokeswoman said. "We couldn't hide what we're doing if we wanted to, and we certainly don't want to," she said. "The idea is to move these fixes along at the fastest possible clip but not to jeopardize other security measures as we do it." While industry and service sources said they could understand NSA's security concerns, they said the classification could hobble the Pentagon's already-delayed Year 2000 remediation efforts. One former high-ranking DOD official described the classification issue as symptomatic of what he called the Pentagon's "gross mismanagement" of Year 2000 issues. [snip of 90 lines] ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From mscompia at microsoft.com Tue May 19 10:46:34 1998 From: mscompia at microsoft.com (mscompia at microsoft.com) Date: Tue, 19 May 1998 10:46:34 -0700 (PDT) Subject: Information From The Microsoft Personal Information Center Message-ID: <0b3382445171358UPIMSSMTPSYS08@msn.com> Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp. Password: writecode If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page. From StanSqncrs at aol.com Tue May 19 11:11:00 1998 From: StanSqncrs at aol.com (StanSqncrs) Date: Tue, 19 May 1998 11:11:00 -0700 (PDT) Subject: AOL Top Story Message-ID: <8688e6ed.3561cae5@aol.com> Hackers Tell About Security Woes WASHINGTON (AP) - Computer hackers told Congress today that computer security is so lax, they could disable the entire Internet in a half-hour. Members of the hacker think-tank called ``The Loft,'' who were praised by senators for calling attention to the problems of computer security, also warned that they could transfer Federal Reserve funds by computer and disrupt electrical power. One hacker, identified by his online handle ``Mudge,'' told the Senate Governmental Affairs Committee ``if you're looking for computer security then the Internet is not the place to be.'' From investorsedge at mci2000.com Tue May 19 15:33:58 1998 From: investorsedge at mci2000.com (SunGroup) Date: Tue, 19 May 1998 15:33:58 -0700 (PDT) Subject: 90 Day Trial Offer: Day Trades/Growth/Blue Chips/Penny Stocks Message-ID: <199805182644SAA35444@rush.provo.novell.com> 5/18/98 Dear Investor. Investors Edge is offering a 3-month subscription free. Investors Edge is a Newsletter that searches out timely undervalued and special situation investment opportunities. From Day Trades to high growth companies. Once you see your returns that you make from our advice, we are confident you will sign up for a full subscription. You have nothing to lose except timely investment opportunities. Join the rank of those savvy investors who get insights into little known, high growth companies and accurate market timing for day traders that have the realistic potential to post substantial price gains in the near future. Click or type here : http://www.investorsedge.net www.investorsedge.net Here is a sample of a Market Alert. Power Technology, Inc. Years Ahead of it's competitors 5/18/98 Market Alert Power Technology PWTC (OTC: BB: PWTC) Time to start to accumulating. We have learned that the company is about to have a major event. Here is a brief description of the company. Power Technology's (OTC BB:PWTC), principal offices and laboratory are located at 1000 West Bonanza Rd. Las Vegas, Nevada 89106. The centrally located warehouse, laboratory, office structure, owned by Alvin Snaper, is a two-story 30,000 square foot building. The Company utilities 5,000 square feet for the development and testing battery technology for electric automobiles and other uses. Current technology in the automotive battery industry utilizes a 6 to12 volt battery system that employs standard electro-plates with lead-acid chemistries. Power Technology has developed with already proven technology, a batter that substantially lighter than the conventional battery and also have a quicker re-charge rate and will be more cost effective. Because this new technology does not use lead, this product will be environmentally friendly. The potential market for the new Power Technology battery could be any application that utilizes the conventional lead-acid technology. Also the current target market for Power Technology's battery will be the new environmentally friendly electric car. Until recent amendments postponed legislation, the California Air Resources Board decreed that 2% of vehicles sold in California by major automakers must meet a zero-emissions vehicle standard by the year 1998. By the year 2003, 10% of automakers sales mix in California must be electric. In addition clean-air-regulators in a dozen Northeastern states and Washington, DC are considering adopting the same air-quality standards as in California, which could result in an electric vehicle mandate covering roughly 40% of the US car and light-truck market. The electric cars produce to-date have battery packs that last between 25,000 and 30,000 miles and require a two to three hour recharge using a 220-volt outlet or six to 10 ten hour recharge using a 110-volt outlet and cost about $2000 to $2,500 to replace. Still, these operating and recharge statistics only apply to electric cars or batteries operating at room temperature. At higher temperatures, like those found on sun-soaked asphalt highways (approximately 50% of North America), battery life is drastically diminished. Currently electric cars will carry two people about 50 miles on a hot day. With this kind of performance the consumer will be very limited to where and how far they are able to drive. The Battery that Power Technology has developed will let a consumer drive approximately 250 miles one a normal charge. The recharge time on a 110-volt outlet is approximately 3 hours. The Power Tech battery also does not contain any harmful materials. Two weeks ago I saw a prototype of the Battery and spoke to the inventor, Mr. Alan Snaper. The company currently has about $500.000 in the bank and is in discussions with several major companies and governmental agencies regarding this product. Currently Power Technology (OTC.BB) trades around 5 dollars a share. The company just recently started to trade. In my opinion Power Technology is undervalued. I believe this company will do very well in 1998. This is one of those undiscovered, overlooked companies on Wall Street. I really can't even project the potential of this company. 10 to 15 a share by the end of 1998 is extremely conservative. Take a look at the management. The stock should be 10 just based on the management's resume. Management: Alvin A. Snaper, is the company's vice-president of development and the project coordinator for the new technology. He has been engaged in scientific research and development of products and processes for 30 years. His well known inventions include the IBM Selectic Ball, Tang (the Orange drink), the NASA Apollo Photo-pack and a line of industrial hard coatings currently used by companies such as Gillette, Boeing, TRW, Vermont-American, Gulf Western and many others. Mr. Snapper currently holds 600 U.S. and foreign patents, products and processes. Mr. Snaper is the only inventor to receive the Design News Magazine Best Patent of the Year award for three separate years. In fact he is the only individual to receive more than one such citation. Charles Warn is the Chief chemical engineer for the project. He has over 40 years experience in development and project engineering and design expertise in a variety of different disciplines. His past experience includes working with General Motors and Parker-Hannifin with high performance aircraft fuel systems. Chances are that one of the big three automakers will buy out Power Technology. Due to no exposure in the financial industry, Power is undiscovered and a screaming buy. From kie25 at msn.com Tue May 19 17:34:28 1998 From: kie25 at msn.com (kie25 at msn.com) Date: Tue, 19 May 1998 17:34:28 -0700 (PDT) Subject: A DIRTY LITTLE JOKE!!! Message-ID: <199805191585RAA15856@server.on.ca> | ------------------WWW.THEDIRTYJOKE.COM------------------ | |This filthy joke was brought to you by the wonderful folks| |at WWW.THEDIRTYJOKE.COM ... Feel free to send this joke�� | |to anyone you think might get a kick out if it ... and for| |more great jokes visit WWW.THEDIRTYJOKE.COM ...���������� | | ------------------WWW.THEDIRTYJOKE.COM------------------ | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| � The other day I was out playing some golf ... and my ball landed on the rough in a patch of buttercups.� As I lifted my club in the air I heard a faint voice ... "Please don't hurt my buttercups, buttercups."� I lowered my club and took a quick glance back and forth to make sure that I was alone. Satisfied that I was alone, I began to raise my club ... and again came the same voice, this time a bit louder, "Please don't hurt my buttercups, buttercups."� This time I was so sure of the voice that I spoke aloud, "Hello, is someone out there." No sooner than I had finished speaking a tiny fairy appeared before me.� "I am the forest fairy, if you don't hurt my buttercups then I'll give you all the butter you could want for the rest of your life." and so I replied ... "Where the hell where you when I was in the pussywillows?" � |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| | -----------------WWW.EROTICBOXOFFICE.COM---------------- | |If you're looking for the sexiest women on the net, you�� | |should start you're hunt at WWW.EROTICBOXOFFICE.COM ... We| |have the youngest, most adorable girls you'll ever see!�� | |And you won't find 'em anywhere else ...����������������� | | ------------------THE HUNT STARTS HERE------------------ | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| From redsonja at liii.com Tue May 19 20:08:20 1998 From: redsonja at liii.com (She Devil With A Modem) Date: Tue, 19 May 1998 20:08:20 -0700 (PDT) Subject: Suit with braindead tie Message-ID: <199805200308.XAA06738@rowan.liii.com> Also Sprach Anonymous: > > time.com / The Netly News > May 19, 1998 > > There was blood in the water in Washington, DC yesterday, and > Microsoft's foes hardly had a chance to rejoice over the government's > anticipated antitrust lawsuit before they were asking for more. > Longtime Microfoe Gary Reback, an attorney with the Silicon Valley law > firm Wilson Sonsini Goodrich & Rosati, still thinks breaking up > Microsoft AT&T-style would be a good idea. At a press conference > yesterday, Sen. Orrin Hatch (R-Utah) predicted the lawsuit "will > become even broader. I have no doubt about that." Netscape dubbed it a > welcome but only an "initial step." > > [...remainder snipped...] I wonder if anyone else has picked up on the "Braindead military action" of awarding Microsoft the dubiously coveted intelligence desktop? It may not be as braindead as you think. Yes, if standard kickbacks and BS occur as they have in the past (those who are not free to speak about the mistakes of the past may be doomed to see them repeated) then technical support for the poor troopies required to maintain the shitty, buggy NT ports may end up making "Blue Screen Of Death" have an entirely new and sad meaning. It's sad that the lack of the intelligence community's desire to police itself as much as it would like to police America's generic civilians results in the sort of kickbacking that yields inferior weaponry, but I guess if they don't address that it will end up biting them in the ass. And yes, that is indeed indicative of a braindead military, led by the supreme oxymoron of a braindead military intelligence community, where the dutiful are asked to turn their eyes away (for reasons of classification, of course) from the acts of the greedy. But assume for a moment that it might be the military and not M$oft that holds the leash on the contract. Imagine a Microsoft that has sold it's soul to the US Intel community. Couldn't happen to a nicer company, don't you think? Microsoft HAVING to port their NT stuff to the Unix boxes that hold the databases and the communications servers. Microsoft HAVING to provide a certain amount of "mission critical" tech support. Microsoft HAVING to deal with adapting to the real world, rather than forcing the world to adapt to it. This could be the beginning of a beautiful "friendship". >;-7 -- "Good evening, Mr. Burglar! My name is Jowles! | Do not CD c Would you care for a cocktail before I attempt | taunt --------P===\==/ to intimidate you with my aggressive behavior?" | happy fun /_\__ -- Miss Manners' Attack Dog | fencer! _\ \ S From jya at pipeline.com Tue May 19 20:17:08 1998 From: jya at pipeline.com (John Young) Date: Tue, 19 May 1998 20:17:08 -0700 (PDT) Subject: Chaum's patent on traceable payment systems In-Reply-To: Message-ID: <199805200317.XAA29396@camel8.mindspring.com> Chaum's "limited-traceability" patent includes other features which directly counterbalance those of the Abstract accurately posted by Anonymous. We've transcribed the initial sections of the 17-page patent which provide a fuller view of what his system offers: http://jya.com/chaum-lts.htm It's an interesting, nuanced proposal, from 1994, which helps explain some of the strategy he's been keeping close to his chest until patent approval, and which may portend more provocative designs in the pipeline for outfoxing the keepers of the chickens. From StanSqncrs at aol.com Tue May 19 20:40:49 1998 From: StanSqncrs at aol.com (StanSqncrs) Date: Tue, 19 May 1998 20:40:49 -0700 (PDT) Subject: 'Nobody', Still At Home! Message-ID: <7272bfd8.3562508e@aol.com> In a message dated 5/19/98 10:09:01 PM Central Daylight Time, mixmaster at remail.obscura.com writes: << Stan, It is considered rude to quote a private e-mail publicly without obtaining permission from the sender first. Try putting "netiquitte" in your favorite search engine. Then read and learn. This will help you. >> Gee, like sending anonomous, unsolicited e-mail isn't against "netiquitte"? Try taking that "plank" out of you eye, buddy! Stan From postmaster at xxxmail.net Tue May 19 20:49:29 1998 From: postmaster at xxxmail.net (Adults Only) Date: Tue, 19 May 1998 20:49:29 -0700 (PDT) Subject: http://www.scarlett.net/starter Message-ID: <3.0.3.32.19980519091310.00a09b80@208.15.12.231> http://www.scarlett.net/starter Everyone needs legal images on their web sites these days!! And XXX by SCARLETT has got the pictures you need!! XXX RAW EXTREME HARDCORE , BIZAARE Pics is what we specialize in!! Check out http://www.scarlett.net/starter Our specials are unbeatable and only 30 CD's are sold to Webmasters!! :D CD #1 - 1000+images for $500.00 (Mostly hardcore) CD #2 - 500+images for $250.00 (ALL EXTREME HARDCORE) CD #3 - 500+images for $250.00 (Girls with toys) CD #4 - 626 images for $350.00 (NEW ALL HARDCORE TEEN CD) No one else has nasty stuff like this for this price folks!! All images are thumbnailed with HTML pages and come with the raw 1200x800 150dpi images. APIC/WebPosse receive a 20% discount. 10% discount if you purchase all four. ++PEACE & LOVE++ http://www.scarlett.net http://www.scarlett.net http://www.scarlett.net From 36997526 at giselp.com Wed May 20 01:29:10 1998 From: 36997526 at giselp.com (36997526 at giselp.com) Date: Wed, 20 May 1998 01:29:10 -0700 (PDT) Subject: Secrets To Losing Weight Right Now and Keeping It Off Forever! Message-ID: <>

Are You Serious About Losing Weight Right Now?
If you are, please continue.
If not, we apologize for the intrusion.

You can slim down right now using Five Simple Techniques taught by experts around the world.

It's been tested and guaranteed effective 98.2% to work with just about anyone.  It doesn't matter who you are or if you have dieted and failed before.  This program is 100% guaranteed.  It's safe for anyone, and any age.

Imagine,  getting down to that perfect dress size, or fitting into those jeans that just don't want to go on anymore.

You can lose those unwanted pounds right now without the use of:

	Expensive Diet Pills
	Awful Tasting Diet Shakes
	or, just plain starving yourself.
	And best of all, It's perfectly safe!


Summer is almost here. So say goodbye to YoYo Diets forever.

It's time to start a new You!

For Free Information on shaving those unwanted pounds safely, email us at:
weightloss at giselp.com

We guarantee you'll have a new attitude!

Please pardon our intrusion.  To be removed, Click reply and type "Remove" in Subject box and you will be permanently removed from any future mailings.









From 36997526 at giselp.com  Wed May 20 01:29:10 1998
From: 36997526 at giselp.com (36997526 at giselp.com)
Date: Wed, 20 May 1998 01:29:10 -0700 (PDT)
Subject: Secrets To Losing Weight Right Now and Keeping It Off Forever!
Message-ID: <>



Are You Serious About Losing Weight Right Now?
If you are, please continue.
If not, we apologize for the intrusion.

You can slim down right now using Five Simple Techniques taught by experts around the world.

It's been tested and guaranteed effective 98.2% to work with just about anyone.  It doesn't matter who you are or if you have dieted and failed before.  This program is 100% guaranteed.  It's safe for anyone, and any age.

Imagine,  getting down to that perfect dress size, or fitting into those jeans that just don't want to go on anymore.

You can lose those unwanted pounds right now without the use of:

	Expensive Diet Pills
	Awful Tasting Diet Shakes
	or, just plain starving yourself.
	And best of all, It's perfectly safe!


Summer is almost here. So say goodbye to YoYo Diets forever.

It's time to start a new You!

For Free Information on shaving those unwanted pounds safely, email us at:
weightloss at giselp.com

We guarantee you'll have a new attitude!

Please pardon our intrusion.  To be removed, Click reply and type "Remove" in Subject box and you will be permanently removed from any future mailings.









From out at sex-e-world.com  Wed May 20 01:46:01 1998
From: out at sex-e-world.com (out at sex-e-world.com)
Date: Wed, 20 May 1998 01:46:01 -0700 (PDT)
Subject: Adults Only
Message-ID: <199805200859.BAA15075@ns1.1connect.com>



This message is intended for those over the age of 18.  If you are under the age of 18
click your delete key now!

Click into gigabytes of pure hardcore.-  Secure Instant Online Access
http://www.sex-e-world.com/

Free 3 day trial membership






From nuw at mail.usa.com  Wed May 20 10:22:55 1998
From: nuw at mail.usa.com (nuw at mail.usa.com)
Date: Wed, 20 May 1998 10:22:55 -0700 (PDT)
Subject: The market is wide open
Message-ID: <199805201719.NAA07700@pop01.globecomm.net>


|||||| (o o) oOOo-(_)-oOOo ___|___|___|___|___| ___|___|___|___|___| Just popping over to say... Online Marketers Visit Us On The World-Wide-Web http://www.fontaineonline.com/sawtell Bulk Email Software Bulk Friendly Web Hosting Bulk Friendly Email Accounts (incoming & outgoing) Bulk Friendly ISP Email Address Databases !! Bulk Email Delivery Service http://www.fontaineonline.com/sawtell Our Site is best viewed with Netscape 3.0





>                     WHERE AM I?
>              ------------------------------------
>A helicopter was flying around above Seattle yesterday when
>an electrical malfunction disabled all of the aircraft's electronic
>navigation and communication equipment. Due to the clouds and haze
>the pilot could not determine his position or course to steer to
>the airport. The pilot saw a tall building, flew toward it, circled,
>drew a handwritten sign and held it in the helicopter's window. T
>he sign said "WHERE AM I ?" in large letters.
>
>People in the tall building quickly responded to the aircraft,
>drew a large sign and held it in a building window. Their sign said,
>"YOU ARE IN A HELICOPTER.' The pilot smiled, waved, looked at his
>map and determine the course to steer to SEATAC
>(Seattle/Tacoma) airport and landed safely.
>
>After they were on the ground, the co-pilot asked the pilot how
>the "YOU ARE IN A HELICOPTER" sign helped determine their
>position. The pilot responded, "I knew that had to be the
>MICROSOFT building because they gave me a technically correct
>but completely useless answer."

Jean-Francois Avon, Pierrefonds(Montreal) QC Canada
  JFA Technologies, R&D physicists & engineers
  Instrumentation & control, LabView programming.
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C







From 6YqDi2e7N at alwret.com  Thu May 21 01:32:16 1998
From: 6YqDi2e7N at alwret.com (6YqDi2e7N at alwret.com)
Date: Thu, 21 May 1998 01:32:16 -0700 (PDT)
Subject: LOSE FAT/BUILD MUSCLE: USE CREATINE
Message-ID: 


____________________________________________________________________________
THIS IS A ONE TIME MAILER!
____________________________________________________________________________


In appreciation for accepting this e-mail, we would like to invite you to
take the next step in enhancing your health, physique, and strength:

**Retail Outlets, Wholesalers, Distributors, Coaches, Trainers, Fire/Police Departments Welcome
   (Please scroll to bottom of page for more info.)**

                                              UNBEATABLE PROMOTION!

THE NEWS IS OUT.......

                                           **CREATINE MONOHYDRATE: **
IS A METABOLITE THAT FUNCTIONS AS A PRECURSOR TO CREATINE PHOSPHATE.  ONCE
CONVERTED TO CREATINE PHOSPHATE IT PROVIDES A HIGH ENERGY PHOSPHATE
MOLECULE FOR ATP PRODUCTION.  ATP (ADENOSINE TRI PHOSPHATE) IS THE CHEMICAL
IN OUR BODIES THAT FUELS ALL MUSCULAR CONTRACTIONS.  WITH HIGHER AMOUNTS OF
ATP AVAILABLE,  YOU WILL PUSH HEAVIER WEIGHTS,  EXERCISE HARDER WITHOUT
FATIGUE, AND RIP THROUGHOUT YOUR WORKOUTS!  CREATINE'S ROLE,  COUPLED WITH
TRAINING INFLUENCES MUSCULAR CONTRACTION,  CELL HYDRATION,  STRENGTH, 
ENDURANCE AND ULTIMATELY,  LONG TERM MUSCULAR GROWTH.  AS LITTLE AS 5-10
GRAMS TAKEN PRIOR TO WORKING OUT WILL INTENSIFY YOUR TRAINING SESSIONS LIKE
NOTHING THAT'S AVAILABLE ON THE MARKET TODAY. 

                                                       "BUYER BEWARE"
UNFORTUNATELY THERE ARE MANY UNSCRUPULOUS SUPPLEMENT COMPANIES OFFERING
CREATINE THAT HAS BEEN CUT IN HALF BY ADDING  MALTODEXTRINE (A COMPLEX
CARBOHYDRATE).  WE SELL ONLY 100% PURE  CREATINE (PHARMACEUTICAL GRADE
AMERICAN MADE/HPLC TESTED).  

WE GUARANTEE IT OR YOUR MONEY BACK!

**UP TO 60% BELOW RETAIL PRICES***

COME SEE WHY THOUSANDS SAVE WITH US AND WHY WE ARE THE #1 HEALTH AND
NUTRITION COMPANY ON THE INTERNET........

1100 g. OF PURE CREATINE:   $69.99  (COMPARE TO $120: SAVE UP TO 50%)
(2.4 lbs./4 MONTHS SUPPLY) NO LIMIT!

PACKAGE PRICES:

"BIG3"
(IF YOU NEED TO LOSE THE FAT AND GAIN LEAN MUSCLE)      
(3 MOS. SUPPLY/CREATINE-CLA-CARNITINE SUGGESTED PRICE: $220)
ON SALE: $139.99 YOU SAVE $80!
**Order now to receive an additional $40 in free gifts**

"MUSCLE MAXX"
(IF YOU ARE LEAN BUT NEED TO ADD MORE MUSCLE)
(3 MOS. SUPPLY/CREATINE-GLUTAMINE-TAURINE SUGGESTED PRICE: $200
ON SALE: $129.99 You SAVE $70!
**Order now to receive an additional $40 in free gifts**

TOLL FREE IN THE USA: 1- (800) 933-5043
CALL: 1-(714) 770-0750 (FOR NATIONAL & INTERNATIONAL CALLERS)

OR
http://206.67.54.156 

CLICK HERE TO VISIT THE #1 HEALTH/FITNESS SECURE WEB-PAGE AND GET MORE 
DETAILS ON OVER 50 OTHER PRODUCTS+200 MORE EXPECTED BY SUMMER OF 98' 
(0RDER ONLINE 24HRS/7DAYS A WEEK)!


ATTN:  RETAIL STORE OWNERS/ NATIONAL & INTERNATIONAL DISTRIBUTORS ONLY: 
CARRY OUR PRODUCTS AND WE WILL ADVERTISE YOUR STORE/STORES FOR "FREE" ($400
VALUE PER MONTH/ PER STORE) ON OUR WEB-SITE UNDER "RETAIL STORES NEAR YOU".
 PLEASE VISIT OUR WEB-SITE FOR MORE INFORMATION.  NOW WHAT SUPPLEMENT
COMPANY GIVES YOU THAT KIND OF PRODUCT SUPPORT AND MARKETING????  DON'T LET
THIS OPPORTUNITY PASS YOU BY....CALL (714) 583-1975 TO GET YOUR STORE
WHOLESALE PRICES AND VOLUME DISCOUNTS! 








From josh434 at juno.com  Thu May 21 11:01:44 1998
From: josh434 at juno.com (josh d smith)
Date: Thu, 21 May 1998 11:01:44 -0700 (PDT)
Subject: programing
Message-ID: <19980522.120339.3414.0.josh434@juno.com>


hello i am new to this list
i would like to know what programing language everyone prefers
and any books they recommend on that subject
thanx
josh

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]





From darl0006 at tc.umn.edu  Thu May 21 11:22:21 1998
From: darl0006 at tc.umn.edu (Matthew T Darling)
Date: Thu, 21 May 1998 11:22:21 -0700 (PDT)
Subject: programing
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID: 


I prefer Ada, Apple's MLX, basic, and Logo.  At times i also like to
program in machine language.  

;)






From declan at pathfinder.com  Thu May 21 11:29:36 1998
From: declan at pathfinder.com (Declan McCullagh)
Date: Thu, 21 May 1998 11:29:36 -0700 (PDT)
Subject: programing
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID: 


My favorites are Applesoft BASIC and 6502 assembly. I suggest you go out
an buy an Apple IIe. Just think -- no need to deal with any messy
compiler, and you've got BASIC in ROM! A win-win situation, I say! 

Good luck!

-Declan


On Fri, 22 May 1998, josh d smith wrote:

> hello i am new to this list
> i would like to know what programing language everyone prefers
> and any books they recommend on that subject






From StanSqncrs at aol.com  Thu May 21 12:08:31 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Thu, 21 May 1998 12:08:31 -0700 (PDT)
Subject: programing
Message-ID: 


In a message dated 5/21/98 1:47:56 PM Central Daylight Time,
declan at pathfinder.com writes:

<< My favorites are Applesoft BASIC and 6502 assembly. I suggest you go out
 an buy an Apple IIe. Just think -- no need to deal with any messy
 compiler, and you've got BASIC in ROM! A win-win situation, I say!  >>

Oh Man!  If you're gonna suggest 6502, go out and get a Cad... - a C-64 with a
6510!

Seriously.  ;-)

Stan Rosenthal 





From jya at pipeline.com  Thu May 21 12:34:34 1998
From: jya at pipeline.com (John Young)
Date: Thu, 21 May 1998 12:34:34 -0700 (PDT)
Subject: Archives: Blast from the past on GSM...
In-Reply-To: <199805211325.GAA04504@joseph.cs.berkeley.edu>
Message-ID: <199805211934.PAA12995@camel8.mindspring.com>


Robert Hettinga wrote:

>Anyway, much more than Y2K, I can imagine some poor old fart sweating away
>right now, waiting for some intellegent young hacker to come along and
>evicerate his whole installed code base, just because he decided the "rest
>of us" were too stupid to figure out how smart he was.

Are you imagining "limited traceability" being discovered to be not what
it claims to be?

It was humorous that several of Chaum's equations were printed upside 
down and/or mirror-imaged, yet got through the 4-year review process 
just fine. He must have chuckled at that.

And that several "embodiments of the present invention" just flat out
said "if you trust this digital transaction you are one dumb MF who 
deserves to be monitored,"  thereby assuring the user of his invention
that a target is just as dumb.

It's impressive that Chaum intends to fleece the law-abiding and the 
outlaws by getting them chasing their tails thinking they're secretly 
tracing/escaping the opposition while he laughs all the way to the . . .

Y2K is the tip of this techno-shamanry-duplicity, wild humor with a
straight-bankers-face, umm, like guess who -- our best Chaumian style
comedian.






From sextracash at pleasureclub.com  Thu May 21 13:54:46 1998
From: sextracash at pleasureclub.com (Sextra Cash)
Date: Thu, 21 May 1998 13:54:46 -0700 (PDT)
Subject: Does your site offer free content?
Message-ID: 


Hello Adult Webmaster,

It's one thing to get a surfer to visit your site once.  But that's not
where the money is.  You have to find a way to get your visitors to come
back again and again.  Build a clientelle.

We have found that the sites that offer "of the day" pics are the most
successful in building a loyal following.  Changing pictures everyday,
though, can be tedious and expensive.  So, to help you build your site,
we are offering FREE CONTENT!

SextraCash has just introduced a new way to bring surfers back to your
site EVERYDAY.

Introducing the DAILY SEXPACK.

Everyday, a new free pic will be posted to six different categories.
All six pics are updated daily. Your surfers will come back everyday
to see the new "of the day" pics.  Best of all, it's TOTALLY FREE TO YOU.
It is not often that you will receive an offer that is truly a win/win
proposition.  Most free content providers have a hidden agenda.
Either they want to keep all of the money generated by the banners,
or make you post something about them in a prime location on your site.
That is not what I am offering.  You get to keep all of the banner money,
and I don't require a reciprocal link of any kind.  Check it out.

http://www.pleasureclub.com/sextracash/sexpack.html







From josh434 at juno.com  Thu May 21 14:23:51 1998
From: josh434 at juno.com (josh d smith)
Date: Thu, 21 May 1998 14:23:51 -0700 (PDT)
Subject: programming
Message-ID: <19980522.152606.3382.5.josh434@juno.com>


i was thinking along the lines of pascal or c
i don't want to use apple or any form of it and besides i have a ibm
compatible
which do you think is better
thanx for all your responses
they've helped somewhat 
what is wrong with pascal or c please enclose all things that i should
take in to consideration
much appreciative
         josh

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]





From hedges at infonex.com  Thu May 21 15:20:50 1998
From: hedges at infonex.com (Mark Hedges)
Date: Thu, 21 May 1998 15:20:50 -0700 (PDT)
Subject: programing
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID: 


PERL is horrendously less efficient, but easy to code for grunt work like
data processing and administrative scripts. PERL is THE BOMB for CGI web
programming, and combined with a nice free database with like mySQL, you
can produce some really amazing applications. I'd guess quite a few on the
list use PERL... I do, almost exclusively, but I'm making services and
doing sysadmin and not producing platform-specific applications. Then, C is
the most likely language used. Probably lots of people have their own
favorite languages. The O'Reilly and Associates 'Nutshell' books are widely
accepted as good reference manuals and tutorials in many lanugages. Certain
languages work better for certain applications. Check a technical bookstore.

Mark Hedges
Infonex/Anonymizer


>At 12:03 PM 5/22/98 -0600, you wrote:
>>
>>hello i am new to this list
>>i would like to know what programing language everyone prefers
>>and any books they recommend on that subject
>
>Josh, my guess is that about 99% of programmers on this list use C
>whether they like it or not. What they prefer might be quite
>different. ;)







From vcarlos35 at juno.com  Thu May 21 15:59:34 1998
From: vcarlos35 at juno.com (Karl Rierson)
Date: Thu, 21 May 1998 15:59:34 -0700 (PDT)
Subject: programming
In-Reply-To: <19980522.152606.3382.5.josh434@juno.com>
Message-ID: <19980521.185808.5791.0.vcarlos35@juno.com>


The problem with C or pascal is that it requires 
quite a bit of punctuation such as:
braces {}
parentheses ()
and semicolons ;
Since your keyboard seems to be missing even a
period, programming in C may be a bit difficult...

Sorry. Couldn't resist.

On Fri, 22 May 1998 15:25:42 -0600 josh434 at juno.com (josh d smith)
writes:
>i was thinking along the lines of pascal or c
>i don't want to use apple or any form of it and besides i have a ibm 
>compatible
>which do you think is better
>thanx for all your responses
>they've helped somewhat 
>what is wrong with pascal or c please enclose all things that i should 
>take in to consideration
>much appreciative
>         josh

----
Karl Rierson, 
PGP: 0x72136D5B/2048-bit RSA/ EBDD 6E87 4C85 6F7F  65EA B30C 00FF 0229
F**cking Juno hasn't heard of decent sized line wraps

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]





From caj at math.niu.edu  Thu May 21 16:01:13 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Thu, 21 May 1998 16:01:13 -0700 (PDT)
Subject: programming
In-Reply-To: <19980522.152606.3382.5.josh434@juno.com>
Message-ID: 


On Fri, 22 May 1998, josh d smith wrote:

> i was thinking along the lines of pascal or c

> what is wrong with pascal or c please enclose all things that i should
> take in to consideration

	Neither has an ON GOTO command.

	I mean, this feature is decades old!  Jeez, you'd think they'd
	have one by now.  At least, we have FORTRAN's arithmetic IF.
	How can you write a good text adventure game without an ON GOTO?

	Seriously, I think ANSI C would be more universal, and less
	anal-retentive than Pascal.  Pascal was designed by a Nazi
	Fascist who wanted all programmers to sit up straight in
	their chairs and keep their office supplies carefully 
	arranged.  Real computer programming isn't office supplies
	and sitting up straight.  It's slouching, poorly-ventilated
	basements, and 20 half-empty cans of Barq's root beer.
	So program in C.

	Although the examples in Wayner's _Disappearing Cryptography_
	are written in pascal and lisp.  I guess I recommend learning
	as many languages as possible, but prepare to use C more than
	any other.

> much appreciative
>          josh

--                         __ +---------------------------------------------+
  ,ad8888ba,              (88)| Scott Adams, WHERE ARE YOU????????????????? |
 d8"' -- `"8b             `""'+--------------+--------------+---------------+
d8' "A Neo-                   | SpidermanTM  | SpidermanTM  | SpidermanTM,  |
88 NEO-Retro-  ,adPPYYba, :88 |    is no     |    is no     |  I want you   |
88  Techno-    ""     `Y8 :88 |   Vandal!!!  |   Killer!!!  | to:  BLOW ME  |
Y8,  Fest!"    ,adPPPPP88 :88 +--------------+--------------+---------------+
 Y8a. -- .a8P  88,    ,88 :88 |          Nothing special happens.           |
  `"Y8888Y"'   `"8bbdP"Y8 :88 +---------------------------------------------+
                          ;88 |  Draw a straight line that passes through   |
o=|caj at math.niu.edu|=888888P; |  every box in this .sig, and win $100.00!   |
http://www.math.niu.edu/~caj/ +---------------------------------------------+






From nobody at REPLAY.COM  Thu May 21 17:37:45 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 21 May 1998 17:37:45 -0700 (PDT)
Subject: Off topic.
Message-ID: <199805220037.CAA26634@basement.replay.com>


Call 1-800-343-3222 to stop the U. S. government from leeching off of the tobacco companies. 





From josh434 at juno.com  Thu May 21 19:31:10 1998
From: josh434 at juno.com (josh d smith)
Date: Thu, 21 May 1998 19:31:10 -0700 (PDT)
Subject: programing
Message-ID: <19980522.203316.3382.0.josh434@juno.com>


hello it is i josh once again
i finally bought a book for visual basic
does anyone know where i can get a complier for version 5
the book is by waite group press
by e zone it's web based though and i don't have the internet but i think
it will be fine reading it out of the book what do you think
thanx josh

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]





From rsriram at krdl.org.sg  Thu May 21 19:46:37 1998
From: rsriram at krdl.org.sg (R Sriram)
Date: Thu, 21 May 1998 19:46:37 -0700 (PDT)
Subject: programing
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID: <19980522104014.12855@krdl.org.sg>


On Fri, May 22, 1998 at 12:03:37PM -0600, josh d smith wrote:
| hello i am new to this list
| i would like to know what programing language everyone prefers
| and any books they recommend on that subject
| thanx
| josh

My favourites are 6510 assembly (C=64), 6502 assembly (BBC Micro), Z80 
assembly (Speccy - you need assembler software), and 8086 assembly.






From x1 at acwref.org.sg  Thu May 21 22:17:01 1998
From: x1 at acwref.org.sg (X1)
Date: Thu, 21 May 1998 22:17:01 -0700 (PDT)
Subject: programing
Message-ID: <19980522125520.26251@krdl.org.sg>


On Fri, May 22, 1998 at 08:33:11PM -0600, josh d smith wrote:
| hello it is i josh once again
| i finally bought a book for visual basic
| does anyone know where i can get a complier for version 5
| the book is by waite group press
| by e zone it's web based though and i don't have the internet but i think
| it will be fine reading it out of the book what do you think
| thanx josh

This doesn't appear to have anything even closely related to the
purpose of the cypherpunks list. You should look at newsgroups like
comp.lang.basic.visual and look at other mailing lists.





From josh434 at juno.com  Thu May 21 23:09:25 1998
From: josh434 at juno.com (josh d smith)
Date: Thu, 21 May 1998 23:09:25 -0700 (PDT)
Subject: programing
Message-ID: <19980523.001120.9374.0.josh434@juno.com>


sorry if i offended you x1 but everyone else seemed like they were
willing to talk on the subject and nothing else was being said and i
needed some advise and you all are suposed to be inteligent which some of
you have proved thanx everyone for your input so on the subject of
cyptogrify (sorry about the spelling) what program do you request using?
and where can i get it
       thanx 
           josh

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]





From icollins at scotland.net  Fri May 22 02:49:28 1998
From: icollins at scotland.net (Iain Collins)
Date: Fri, 22 May 1998 02:49:28 -0700 (PDT)
Subject: programing
Message-ID: <01BD856F.1E4A6CE0.icollins@scotland.net>


On Saturday, May 23, 1998 3:33 AM, josh d smith [SMTP:josh434 at juno.com] wrote:
> hello it is i josh once again
> i finally bought a book for visual basic
> does anyone know where i can get a complier for version 5
> the book is by waite group press
> by e zone it's web based though and i don't have the internet but i think
> it will be fine reading it out of the book what do you think
> thanx josh

You don't have the internet? You didn't get it with your CD? - I heard you can get it
on 3 x 1.44 MB disks from KwikMart (only $1.99).

Now, I'm not too sure how all this 'internet' stuff works (all rather complicated), but
don't you need one to send an e-mail? Boy have I been burned... ;)

Iain, icollins at sol.co.uk

PS: If you would like serious answer then feel free to send me a serious question
and I'd be happy to help you out (I'd say the questions are off topic from this list :).








From Markus.Kuhn at cl.cam.ac.uk  Fri May 22 03:33:34 1998
From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn)
Date: Fri, 22 May 1998 03:33:34 -0700 (PDT)
Subject: programing (Ada95)
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID: 


josh d smith wrote on 1998-05-22 18:03 UTC:
> i would like to know what programing language everyone prefers
> and any books they recommend on that subject

Depends on what I write:

  C     for efficient quickly developed unsecure hacks

  Perl  for less efficient more quickly developed hacks

  Ada95 for efficient large scale security critical applications,
        especially anything where multi-threading is a big issue

C and Perl are widely known, so I'll only speak about the third one:

Ada95 is actually a very nice language, and I wonder why it is still mostly
used by avionics engineers and the NSA and not so much in the commercial
world. Ada95 is object oriented, has exceptions, multithreading, object
synchronization, generics, decent type concepts, safe arrays and pointers,
etc. There is now a high-quality GNU Ada95 compiler available (GNAT, uses
the same backend and optimizer as gcc). I've put together some beginner's
information about Ada95 on

  http://www.cl.cam.ac.uk/~mgk25/ada.html

where you find information about books, free compilers and online tutorials.

Java is also a quite nice language. Essentially rather close in functionality
to Ada95, but more targeted towards mobile code applications, while Ada95
is more targeted towards high-performance and embedded security applications
(has better support for low-level programming than Java). Pascal and
Basic are mostly obsolete today (no classes, exceptions, tasks, etc.).

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: 







From steve at tightrope.demon.co.uk  Fri May 22 03:38:48 1998
From: steve at tightrope.demon.co.uk (Steve Mynott)
Date: Fri, 22 May 1998 03:38:48 -0700 (PDT)
Subject: programing
In-Reply-To: <19980523.001120.9374.0.josh434@juno.com>
Message-ID: <19980522113435.55078@tightrope.demon.co.uk>


I would recommend PERL as a powerful, compact language, which has many
crypto modules available.

-- 
pub  1024/D9C69DF9 1997/10/14 Steve Mynott 
            "Documentation? The code is the documentation!"





From x1 at aardvark.org.sg  Fri May 22 04:08:31 1998
From: x1 at aardvark.org.sg (X1)
Date: Fri, 22 May 1998 04:08:31 -0700 (PDT)
Subject: Crypto programs.
Message-ID: <19980522190349.54147@krdl.org.sg>


On Sat, May 23, 1998 at 12:11:17AM -0600, josh d smith wrote:
| sorry if i offended you x1 but everyone else seemed like they were
| willing to talk on the subject and nothing else was being said and i
| needed some advise and you all are suposed to be inteligent which some of
| you have proved thanx everyone for your input so on the subject of
| cyptogrify (sorry about the spelling) what program do you request using?
| and where can i get it

Some of the best crypto programs:
PGP available at http://www.pgpi.com/
If you're in the US, look at http://www.pgp.com/

If you run Linux, you could look at CFS (Cryptographic File System)

Look at http://www.cs.hut.fi/crypto for lots of info about crypto,
links, algorithms, software, etc.





From ichudov at algebra.com  Fri May 22 05:04:13 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Fri, 22 May 1998 05:04:13 -0700 (PDT)
Subject: vznuri is Vulis
In-Reply-To: <199805220508.BAA09714@panix2.panix.com>
Message-ID: <199805221202.HAA13035@manifold.algebra.com>


Information Security wrote:
>    >   From ichudov at Algebra.Com Thu May 21 23:09:59 1998
>    >   Information Security wrote:
>    >   >    >   From: "Vladimir Z. Nuri" 
>    >   >    >   as for Timmy, you're better off ignoring him. he doesn't realize that
>    >   >    >   people take him far less seriously than he would hope.
>    >   > 
>    >   > Heh-heh-heh.
>    >   > Vulis's alternate personality is pathetic at flaming.
>    >   
>    >   1) He is not Vulis's alternate personality
> 
> He says in email he wants to convince me otherwise,
> but then failed to follow through with anything
> to document a real "Vladimir Z. Nuri".

Look, why don't you read two year old archives to figure things out.

>    >   2) You are also pathetic
> And you are Igor.
> ---guy, Vulis Terminator
>    KABLAMMO! dm.com was gone...Vulis never to post in his own name again

	- Igor.





From lordgrey at borrowedtime.com  Fri May 22 05:10:16 1998
From: lordgrey at borrowedtime.com (Dan S. Camper)
Date: Fri, 22 May 1998 05:10:16 -0700 (PDT)
Subject: programing
Message-ID: <199805221209.HAA22593@goanna.outer.net>


>sorry if i offended you x1 but everyone else seemed like they were
>willing to talk on the subject and nothing else was being said and i
>needed some advise and you all are suposed to be inteligent which some of
>you have proved thanx everyone for your input so on the subject of
>cyptogrify (sorry about the spelling) what program do you request using?
>and where can i get it

COBOL would let you practice putting periods at the end of statements.  
Learn two things at once!

More seriously, code written in C, C++ and Perl is in demand.  There's a 
better chance that more people can maintain or update your code than if 
it was written in a less mainstream language, and customers tend to 
appreciate that.  Out of those three, Perl is probably the best 
introductory language.

DSC





From howree at cable.navy.mil  Fri May 22 05:27:17 1998
From: howree at cable.navy.mil (Reeza!)
Date: Fri, 22 May 1998 05:27:17 -0700 (PDT)
Subject: Off topic.
In-Reply-To: <199805220037.CAA26634@basement.replay.com>
Message-ID: <3.0.5.32.19980522222705.008005d0@205.83.192.13>


At 02:37 AM 22 05 98 +0200, Anonymous wrote:
>Call 1-800-343-3222 to stop the U. S. government from leeching off of the
tobacco companies. 
>
>

Is there a 1-800 number to stop both the government and the tobacco
companies from leeching off of the general populace?






From gypsywanderer at hotmail.com  Fri May 22 06:13:32 1998
From: gypsywanderer at hotmail.com (Gypsy Wanderer)
Date: Fri, 22 May 1998 06:13:32 -0700 (PDT)
Subject: Unix O/S
Message-ID: <19980522131258.29926.qmail@hotmail.com>


Hi 
I'm new to posting on this list (I've been checking it out for a while, 
really interesting stuff).

I'm a computer science student and therefore a newbie, but am interested 
in cryptography. 

I will be taking a UNIX course next year and plan to set up a UNIX drive 
on my PC.

I'm interested in getting some advice on which UNIX O/S would be good to 
set up. I'm currently aware of FreeBSD, OpenBSD, SCO UNIX, and LINUX. 
Suggestions and the reasons why would be greatly appreciated.

Thanks, Gypsy


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From nobody at REPLAY.COM  Fri May 22 06:55:35 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 May 1998 06:55:35 -0700 (PDT)
Subject: Off topic.
Message-ID: <199805221355.PAA03760@basement.replay.com>


On Fri, 22 May 1998, Reeza! wrote:

> At 02:37 AM 22 05 98 +0200, Anonymous wrote:
> >Call 1-800-343-3222 to stop the U. S. government from leeching off of the
> tobacco companies.
> >
> >
>
> Is there a 1-800 number to stop both the government and the tobacco
> companies from leeching off of the general populace?
>


How do the tobacco companies leech off of the general populace? By selling
them something they want? I just don't want to pay five dollars for a pack
of cigarettes which is why I'm spamming this number.





From nobody at REPLAY.COM  Fri May 22 07:29:10 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 May 1998 07:29:10 -0700 (PDT)
Subject: .Re: programing
Message-ID: <199805221429.QAA08672@basement.replay.com>



josh d smith wrote:
> 
> hello it is i josh once again
> i finally bought a book for visual basic
> does anyone know where i can get a complier for version 5
> the book is by waite group press
> by e zone it's web based though and i don't have the internet but i think
> it will be fine reading it out of the book what do you think
> thanx josh
> 

Josh,
Visual Basic is object oriented and uses late binding, like Smalltalk.
I advise you learn Smalltalk before trying to understand Visual Basic.

Also, version 5 is too advanced for a beginner. Start at version one and
only upgrade for new features as you need them.







From nobody at REPLAY.COM  Fri May 22 08:07:11 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 May 1998 08:07:11 -0700 (PDT)
Subject: .Re: Unix O/S
Message-ID: <199805221507.RAA14858@basement.replay.com>


Gypsy Wanderer wrote:
> 
> Hi
> I'm new to posting on this list (I've been checking it out for a while,
> really interesting stuff).
> 
> I'm a computer science student and therefore a newbie, but am interested
> in cryptography.
> 
> I will be taking a UNIX course next year and plan to set up a UNIX drive
> on my PC.
> 
> I'm interested in getting some advice on which UNIX O/S would be good to
> set up. I'm currently aware of FreeBSD, OpenBSD, SCO UNIX, and LINUX.
> Suggestions and the reasons why would be greatly appreciated.
> 
> Thanks, Gypsy
> 
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com


I'm starting a petition for less wasted bandwidth in cypherpunks.
To show your support, just respond to this thread.





From paulmerrill at acm.org  Fri May 22 08:29:37 1998
From: paulmerrill at acm.org (Paul H. Merrill)
Date: Fri, 22 May 1998 08:29:37 -0700 (PDT)
Subject: .
In-Reply-To: <199805221429.QAA08672@basement.replay.com>
Message-ID: <3565C458.CB00696D@acm.org>


VB isn't really all that bad, and it is a useful skill while Smalltalk is of
limited value.  As far as the version goes, VB5 is currently available and its
product will work directly with WIN32.  A more advisable phasing methodology
would be to only USE a small subset at first, adding other functionality to the
pot in use as time (and familiarity,  and experience, etc.) progress.

PHM

Anonymous wrote:

> josh d smith wrote:
> >
> > hello it is i josh once again
> > i finally bought a book for visual basic
> > does anyone know where i can get a complier for version 5
> > the book is by waite group press
> > by e zone it's web based though and i don't have the internet but i think
> > it will be fine reading it out of the book what do you think
> > thanx josh
> >
>
> Josh,
> Visual Basic is object oriented and uses late binding, like Smalltalk.
> I advise you learn Smalltalk before trying to understand Visual Basic.
>
> Also, version 5 is too advanced for a beginner. Start at version one and
> only upgrade for new features as you need them.








From StanSqncrs at aol.com  Fri May 22 11:24:43 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Fri, 22 May 1998 11:24:43 -0700 (PDT)
Subject: Unix O/S
Message-ID: <684212d9.3565c2af@aol.com>


In a message dated 5/22/98 10:29:27 AM Central Daylight Time,
nobody at REPLAY.COM writes:

<< I'm starting a petition for less wasted bandwidth in cypherpunks. >>

You would.

<< To show your support, just respond to this thread. >>

Oh, so there's no way we can show if we don't support your idea.  You create
what we call an un-level playing field.

BUT, in this case, I think there's a simple way that you can have it so
there's less wasted bandwidth here.  Ban anonomous posting.  ;-)

Stan





From jya at pipeline.com  Fri May 22 16:24:14 1998
From: jya at pipeline.com (John Young)
Date: Fri, 22 May 1998 16:24:14 -0700 (PDT)
Subject: Clinton Backs Cyber-Terror Warnings
Message-ID: <199805222324.TAA01375@dewdrop2.mindspring.com>


May 22, 1998
Clinton Backs Cyber-Terror Warnings
Filed at 1:31 p.m. EDT
By The Associated Press

ANNAPOLIS, Md. (AP) -- Nuclear warheads were the stuff of Cold War
stockpiles and beachheads the battlefields of times gone by. To counter
today's threats, President Clinton told a new class of Naval officers, the
United States must amass germ-warfare vaccines and battle terrorists in
cyberspace. 

``If our children are to grow up safe and free, we must approach these new
21st century threats with the same rigor and determination we applied to the
toughest security challenges of this century,'' the president said today in
a commencement speech at the U.S. Naval Academy. 

For the 769 graduating midshipmen and 139 midshipwomen whose dress uniforms
shone blindingly white in the sun, Clinton painted a near-apocalyptic
picture of the enemies who threatened their mission beyond the academy. 

``As we approach the 21st century, our foes have extended the fields of
battle from physical space to cyberspace, from the world's vast bodies of
water to the complex workings of our own human body. Rather than invading
our beaches or launching bombers, these adversaries may attempt cyber
attacks against our critical military systems and our economic base,''
Clinton said. 

Clinton also called for an interconnected ``cyber-system'' that would warn
and minimize damage of attacks on computers that control the stock market,
banking, utilities, air traffic and other so-called ``critical
infrastructure.'' 

Private companies including IBM, Dell Computers, Bell South and GTE have
already agreed to participate in the ``cyber-system,'' which Clinton wants
to be fully operational by 2003, administration officials said. 

``If we fail to take strong action, then terrorists, criminals and hostile
regimes could invade and paralyze these vital systems, disrupting commerce,
threatening health, weakening our capacity to function in a crisis,''
Clinton said. 

He appointed National Security Council adviser Richard Clarke, who
specializes in such issues as drug trafficking and terrorism, to head a new
office on infrastructure protection and counter-terrorism. Former Sen. Sam
Nunn and Jamie Gorelick, formerly the Justice Department's No. 2 official
and now Fannie Mae's vice chairwoman, will lead a private industry advisory

group. 

[Warnings of bio-terrorism snipped]





From jya at pipeline.com  Fri May 22 17:28:49 1998
From: jya at pipeline.com (John Young)
Date: Fri, 22 May 1998 17:28:49 -0700 (PDT)
Subject: Clinton's Anti-Terrorism Initiative
Message-ID: <199805230028.UAA03044@dewdrop2.mindspring.com>


We've collected news and White House reports on 
Clinton's broad anti-terrorism initiative announced today,
including description of two related Presidential Directives:

   http://jya.com/prez-init.htm  (50K)







From jya at pipeline.com  Fri May 22 17:44:37 1998
From: jya at pipeline.com (John Young)
Date: Fri, 22 May 1998 17:44:37 -0700 (PDT)
Subject: NSA Sets Terms for Secret Court Review
Message-ID: <199805230044.UAA16392@dewdrop2.mindspring.com>


The US Attorney in the Payne v. NSA lawsuit has described
the procedure NSA requires for the case judge to assess NSA's 
"Glomar response" with a Top Secret-SCI-CODEWORD declaration 
concerning Crypto AG, NSA backdoor spying on cryptosystems, 
and other underhanded interceptions:

   http://jya.com/usa052098.htm







From assass1n at division-x.org  Fri May 22 18:25:44 1998
From: assass1n at division-x.org (Assass1n)
Date: Fri, 22 May 1998 18:25:44 -0700 (PDT)
Subject: Need a Decent nntp server
Message-ID: <3.0.5.32.19980521234128.007a9250@mail.division-x.org>


This might be a little off subject since I am new to this mailing list but
I am in need of a good nntp server because the one my ISP runs is always
down if anyone has a list or just one or two good servers that alow sending
and receving please let me know

Assass1n
assass1n at division-x.org







From jya at pipeline.com  Fri May 22 19:14:54 1998
From: jya at pipeline.com (John Young)
Date: Fri, 22 May 1998 19:14:54 -0700 (PDT)
Subject: PDD 63
Message-ID: <199805230204.WAA06865@dewdrop2.mindspring.com>


We've made an HTML version of Presidential Decision
Directive 63 which details Clinton's anti-terrorism orders
to federal agencies today:

   http://jya.com/pdd63.htm  (39K)





From arpe at worldregister.com  Sat May 23 05:24:52 1998
From: arpe at worldregister.com (WorldRegister)
Date: Sat, 23 May 1998 05:24:52 -0700 (PDT)
Subject: World-wide security network for vehicles / objects
Message-ID: 



Important e-mail for your company, all of your employees, and customers

Dear Sir/Madam

Please, also click on http://www.worldregister.com

You will see how easily, cost-efficiently, and effectively you can
protect your valuable property� (vehicles and objects) better against theft
and misappropriation. You will also see how you can reduce your risk of unintentionally purchasing stolen goods � and with that prevent from slipping under the "wheels of justice." Immediate success is guaranteed.

We notify all press organs, insurance companies, leasing banks, and
merchants who are accessible worldwide via the Internet and by e-mail about
our new vigilance medium.� You can start profiting today!

Short documentation
http://www.worldregister.com/english/kurzprospekt.htm

Good reasons for joining
http://www.worldregister.com/english/stichworte/motivation.htm

Mask pattern of one free property query
http://www.worldregister.com/english/info/privat_11_2.htm

Mask pattern of a fee-based property listing
http://www.worldregister.com/english/info/privat_4_2.htm

Fraud prevention for insurance companies.�General.
http://www.worldregister.com/english/info/versi_7.htm

Uncovering of fake theft
http://www.worldregister.com/english/info/versi_5.htm

Warding off of claims reported multiple times
http://www.worldregister.com/english/info/versi_8.htm

----------------------------------------------------------------
Your e-mail address is published on the Internet.� We believe that this
innovation interests you for professional reasons.� In advanced, we would
like to thank you for your time.� If you have any further questions, please
do not hesitate to contact us.

Sincerely,� WorldRegister, Werner Bachman.

Tel: +41 1 313 04 71  Fax: +41 1 313 04 68
----------------------------------------------------------------








From jya at pipeline.com  Sat May 23 06:31:45 1998
From: jya at pipeline.com (John Young)
Date: Sat, 23 May 1998 06:31:45 -0700 (PDT)
Subject: E-Commerce Enhancement Act
Message-ID: <199805231331.JAA03260@dewdrop2.mindspring.com>


Excerpt from statement on introduction of S.2107, "Electronic
Commerce Enhancement Act," May 21, 1998 :

 The most important benefit of this legislation, however, lies in the
area of electronic innovation. Currently, digital encryption is in a
relatively undeveloped state. One reason for that is the lack of
opportunity for many individuals and companies to make use of the
technology. Another is the lack of a set industry standard. By allowing
use of this technology in the filling out of government paperwork, and
by establishing a standard for digital encryption, the federal
government can open the gates to quick, efficient development of this
technology, as well as its more application throughout the economy. The
benefits to American businesses as they struggle to establish paper-
free workplaces that will lower administrative costs, will be
significant, and will further spur our national economy.

-----

Full statement: http://jya.com/s2107-intro.txt









From jf_avon at citenet.net  Sat May 23 07:35:30 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Sat, 23 May 1998 07:35:30 -0700 (PDT)
Subject: E-Commerce Enhancement Act
Message-ID: <199805231443.KAA25446@cti06.citenet.net>


On Sat, 23 May 1998 09:30:01 -0400, John Young wrote:

>Excerpt from statement on introduction of S.2107, "Electronic
>Commerce Enhancement Act," May 21, 1998 :
[snip]
> The
>benefits to American businesses as they struggle to establish paper-
>free workplaces that will lower administrative costs, will be
>significant, and will further spur our national economy.

>Full statement: http://jya.com/s2107-intro.txt

one of my friend replied when I asked just *where* was the promised paperless office:
"as likely as a paperless toilet..."

:-)

Ciao

jfa

Jean-Francois Avon, Pierrefonds(Montreal) QC Canada
  JFA Technologies, R&D physicists & engineers
  Instrumentation & control, LabView programming.
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C







From bigboots at apci.net  Sat May 23 14:21:26 1998
From: bigboots at apci.net (Kentroy)
Date: Sat, 23 May 1998 14:21:26 -0700 (PDT)
Subject: hello
Message-ID: <35673E3D.9C0B79F3@apci.net>


TO whom ewver this concerns,

I came across your web page about making bumber stickers and was
iteresetes in purchasing some of the paper you talked about on your
page. If you can send me info or what everi need to purchase it you can
contact me at Vyncez at hotmail.com







From billp at nmol.com  Sat May 23 18:42:32 1998
From: billp at nmol.com (bill payne)
Date: Sat, 23 May 1998 18:42:32 -0700 (PDT)
Subject: "TOP SECRET (TS), Sensitive Compartmented Information (SCI), CODEWORD"
Message-ID: <356778D1.310F@nmol.com>


Saturday 5/23/98 7:16 PM

J Orlin Grabbe  http://www.aci.net/kalliste/

Just saw subject heading. "TOP SECRET (TS), Sensitive Compartmented
Information (SCI), CODEWORD" 

But jya.com did not respond.

I will buy a refrigerator magnet at the National Atomic Museum
in Albquerque

         1945 509th COMPOSITE GROUP 1995
           FIRST ATOMIC BOMBARDMENT
             50th ANNIVERSARY

for you and Masanori TOO.

For business reasons perhaps I should buy the whole bowl full.

This is so gross they have to be worth some MONEY, $US, YEN, SF, DM, 
Ringitt, etc.

Later
bill







From nl0v at nl0vpg.net  Sat May 23 19:52:52 1998
From: nl0v at nl0vpg.net (nl0v at nl0vpg.net)
Date: Sat, 23 May 1998 19:52:52 -0700 (PDT)
Subject: An invitation
Message-ID: <34755181_76443379>



This is a one time mailing and is never sent unsolicited. Your email address was included in an "Opt-In" target list of those interested 
in receiving adult site advertizing.If you have received this message in error please delete it.

Looking for High Quality Video and Pics??? 
Visit our site - you will not be disappointed!!

http://www.oasis.nu/jenny 




 





From nobody at REPLAY.COM  Sun May 24 02:35:14 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 24 May 1998 02:35:14 -0700 (PDT)
Subject: (no subject)Re: Unix O/S
Message-ID: <199805240935.LAA03446@basement.replay.com>


StanSqncrs wrote:
> 
> In a message dated 5/22/98 10:29:27 AM Central Daylight Time,
> nobody at REPLAY.COM writes:
> 
> << I'm starting a petition for less wasted bandwidth in cypherpunks. >>
> 
> You would.
> 
> << To show your support, just respond to this thread. >>
> 
> Oh, so there's no way we can show if we don't support your idea.  You create
> what we call an un-level playing field.
> 
> BUT, in this case, I think there's a simple way that you can have it so
> there's less wasted bandwidth here.  Ban anonomous posting.  ;-)
> 
> Stan

Stan,
   this is a petition. Unlike playing fields, petitions usually only
have one side, so your complaint is invalid.

Your new proposal merits inclusion, however. All those in favour of
banning anonymous posting can show their support by 
responding to the thread via an anonymous remailer.






From tiikue43 at netcom.com  Sun May 24 18:00:59 1998
From: tiikue43 at netcom.com (tiikue43 at netcom.com)
Date: Sun, 24 May 1998 18:00:59 -0700 (PDT)
Subject: The Hidden Secrets of Mortgage Lenders
Message-ID: <19980524427WAA48163@earthlink.net.ur.mx>


(this is a one time mailing only!!)


Dear Homeowner,

Would you like to pay off all your debts, including your mortgage in 5 to 8 years, without increasing your monthly payments? Or are you happy paying 88% of the value of your home in interest during the first ten years? Do you want to continue making the minimum payment on your charge cards, which could take you over 20 years to pay them off? How can we do this? With accelerators. Accelerators are nothing new, large corporations have been using them for centuries. Accelerators allow you to pay off the principal of your debts, therefore limiting the amount of interest that you owe. The result can be a substantial reduction in the length of time an individual pays on his or her mortgage and consumer debts, and a dramatic reduction in the amount of total payments. With accelerators you can eliminate your mortgage and debt in 5 to 8 years then take the same money you were using to pay off your debts and build true wealth during the time it would have taken you to pay off your mortgage originally. You don't need to be a wall street wizard to make this work. Let Equity 1st teach you how to avoid the pitfalls that cause most people to fail financially. In our program, you will know how and when you will be out of debt, as well as when you will be financially independent and able to live off the income from your investments. Most lenders want to keep you in debt as long as possible. The longer you are in debt, the more interest you pay. Equity 1st of Salt Lake City, Utah, has been helping people totally eliminate all their debts, and reach their financial goals, since the 1980's. Whether you require a first mortgage, second mortgage, debt consolidation, debt restructuring, or mortgage acclerator program, I can help you with all your financing needs. My network of nationwide lenders enables me to find the best interest rates available.. Programs are also available for homeowners with slow credit, little or no equity, or even bankruptcy. The reality: 96% of all Americans fail to achieve financial independence. Do you want to be in the 4% who do? To learn more about how you can be debt free, and have all your financing options explained to you, click HERE to request more information, (place debt free, and your first name in the subject). If you prefer to speak with a Financial Consultant for a no obligation consultation, call toll free at 888-283-4899, in North Carolina call 910-777-8117. Consultants are available Monday - Friday from 8:00am until 9:00pm and on Saturday between the hours of 9:00am to 12:00pm eastern standard time. When calling have this ID code SRLM available.

Sincerely, Denise Whitaker Financial Consultant and Mortgage Lending Officer

In a message dated 5/24/98 4:58:12 AM Central Daylight Time, nobody at REPLAY.COM writes: << Your new proposal merits inclusion, however. All those in favour of banning anonymous posting can show their support by responding to the thread via an anonymous remailer. >> The joke's not that funny the 2nd time around either! Stan From die at pig.die.com Mon May 25 11:22:38 1998 From: die at pig.die.com (Dave Emery) Date: Mon, 25 May 1998 11:22:38 -0700 (PDT) Subject: [rttyman@wwa.com: [Spooks] Digital Steganography] Message-ID: <19980525142146.B3293@die.com> ----- Forwarded message from Bob Margolis ----- Date: Mon, 25 May 1998 12:54:47 -0500 From: Bob Margolis To: spooks at qth.net Subject: [Spooks] Digital Steganography Secret Messages: Army Researchers Discover Advance Technique To Relay Information Army researchers bring new meaning to the phrase, 'a picture's worth a thousand words.' An advanced technique for hiding secret messages inside of images is a new discovery made recently by U.S.Army Research Laboratory (ARL) researchers and a Federated Laboratory partner from the University of Delaware. "As a method to provide secure communications on the battlefield, we are pursuing research in the area of digital steganography," says Lisa Marvel, an electronics engineer at ARL's Information Science & Technology Directorate. The Greek word, steganography, means covered writing. "Our initial system involves embedding hidden messages within images. Images that are typically transmitted over the battlefield, such as weather or terrain maps," she says. The hidden message, be it an authentication mark, time stamp or new orders to a commander, is completely undetectable and resistant to removal and arbitrary decoding. Only the intended recipient holding the 'key' can decode the hidden message. Consider for a moment the impact of this new capability. U.S. Forces are pent behind enemy lines and out numbered three to one. The commander is not able to communicate their situation to base, because an enemy listener is detected on the communication network. The commander orders a message be sent through the Stego Communication System. In less than 45 seconds a soldier types the message on a laptop computer, hides the message in a map and sends it to base undetected. U.S. troops are deployed with enemy forces unaware of the impending ambush. U.S. soldiers are recovered with no casualties. Steganography is part of ARL's defensive information warfare efforts under the Federated Laboratory Program. The research began in February 1997 and is projected to continue over the next two years. "The result of this basic research can be packaged as software that can run on any laptop, anywhere. The main focus for the next two years is to increase the amount of undetectable information that we are able to hide in an image and develop techniques that make messages even more resilient to any kind of corruption," Marvel says. Typically, basic research is projected for use five years out. But, Marvel says this particular work is implementable in a shorter timeframe. She predicts that when the research is completed in two years it will just be a matter of software rewrite and packaging, which will take about 6 months before it can actually become a true product. Marvel credits the collaborative work, commissioned by the Federated Laboratory, for the successful progress of the project. Marvel developed the initial test system, guided by Dr. Charles Boncelet, Professor of electrical engineering at the University of Delaware. "Dr. Boncelet brought in some specific insights and his expertise in random signals and noise truly contributed to the success of the work," Marvel says. Dr. Charles Retter another ARL engineer provided his expertise in low rate error correcting codes, "which is key to how we are able to extract the message from the image without having the original image," she adds. Digital steganography is a new topic of research that incorporates ideas from communications, cryptography, information theory, and signal processing. So far, very little information exists in the formal literature on this topic, unlike digital watermarking which is currently a very active area of research. Although similar, steganography differs from watermarking in several aspects. For example, digital watermarking is used to embed a visible or invisible signature into a medium in order to indicate ownership, such as the station insignia seen in the bottom corner of a television screen during programming. Steganography, on the other hand, is used to encode a hidden message typically much larger than a signature, Marvel explains. In preparing to file for a patent, the ARL researchers are conducting the required background research on the prior art. "We found that a few basic techniques used over the years work pretty well, but are not nearly as sophisticated or complete. It appears that our technique is unique," Marvel concludes. --- Submissions spooks at qth.net ----- End forwarded message ----- -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From corvett52 at yahoo.com Mon May 25 13:08:13 1998 From: corvett52 at yahoo.com (corvett52 at yahoo.com) Date: Mon, 25 May 1998 13:08:13 -0700 (PDT) Subject: The Internet Success ToolBox Message-ID: <> Note:We do not wish to send e-mail to anyone that does not want it so please send an e-mail to: corvett54 at yahoo.com You will be removed promptly. ***************************************************************** "THE INTERNET SUCCESS TOOLBOX" The Most Complete Marketing Software Package Available Anywhere! This is what you will receive on CD-ROM: 1. Stealth Mass Mailer ($399.00 value) - This unique, first of it's kind - software that allows you to easily send 250,000 e-mail messages an hour. Simply enough by making a single connection to the Internet using a standard modem, and connecting to either 20 different mail servers, or a single mail server 20 times. This, easy to use, software is designed for the basic computer user to understand. It's as easy as imputing the mail server, selecting the list of e-mail recipients to send to, inserting your e-mail address, adding your subject line, selecting your sales letter, and pressing send. 2. E-Mail Pro Extractor ($350.00 value) - This one of a kind software program is designed to manage and clean up any list of e-mail addresses. It will purge duplicates, manage removes and delete undeliverables. It will also separate and categorize your list of e-mail addresses by domain names. The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple text files that anyone can download from AOL, CompuServe, the Internet, etc...These text files contain classified ads, forum messages, or data from the member directory. Each of these files are filled with e-mail addresses. 3. Check Deposit System ($125.00 value) - Check Deposit System Version 2.1 is a state of the art, revolutionary software that allows you to easily and legally process checks by fax, phone or Internet. The customer's signature on the check is not necessary. 4. 16 Million E-mail Addresses ($149.00 value) - We took a total of over 92 million e-mail addresses from many of the touted CD's that are out there (bought them all - some were $300+)! We added the millions we had in storage to those. When we combined them all, we had in excess of 100+ million addresses in one huge file. We then ran a super "sort/de-dupe" program against this huge list. It cut the file down to less than 25 million!! We then ran a program that contained 150+ keywords to remove addresses with vulgarity, profanity, sex-related names, postmaster, webmaster, flamer, abuse, spam, etc...Also we eliminated all .edu, .mil., org., gov., etc... After that list was run against the remaining list, it reduced it down to near 16 million addresses! So, you see, our list will save people hundreds of dollars buying all others that are out there on CD. Using ours will be like using the 100+ million that we started with, but a lot less money and a lot less time! If you order "The Internet Success Toolbox" for $395.00 within the next 7 days, you'll also receive the following awesome bonuses absolutely FREE. A value of over $600.00 !!! To order: ____ YES! I'm bursting with anticipation! Please send me "The Internet Success Toolbox" so I can start advertising my business to "millions of people" - absolutely FREE! I'm anxious to see how others are creating immediate "cash-flow explosions", and eliminating most of their advertising and marketing costs - and how I can do the same! Enclosed is $395. ____ YES AGAIN! Because I'm responding within 7 days, I will receive 6 BONUSES with a total value of $663.90 - absolutely FREE! They include: BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most Powerful and Proven Strategies that really work to place you at the Top of the Search Engines! BONUS #2 ($195 value): A FREE one year subcription to "The Internet Success Toolbox Newsletter" - my ticket to marketing and internet cash flow heaven! BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified Ad Sites on the Internet" - a virtual GOLDMINE! BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your Business on Automatic Pilot and Turn Your Marketing System Into a Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even When You Don't!!" BONUS #5 ($195 value): Unlimited technical support. Even though "The Internet Success Toolbox" will be simple to use, it's great to know support is always available - if and when you really need it! And last but not least . . . . BONUS #6 ($175 value): Order within 7 days and I'll also throw in a FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE lodging at one of over 30 "premier" resorts. Some vacation spots you can choose from include: Hawaii; Orlando, FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean; Cancun, Mexico; and many, many more! Hey, when you start making a TON of money, you'll wanna do some celebrating, won't you? So start packing those bags! That's it. A lot more than you bargained for isn't it? When you total all the goodies up, you're looking as a total value of $663.90! All yours - absolutely FREE - with your purchase of our amazing package "The Internet Success Toolbox " for only $395.00. And I'll even pay for shipping your package. You can have it in days. And start making money THE VERY SAME DAY! Anyway, I have a copy right here on my desk reserved for you. All I need is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES. ___Yes, Also send me info on obtaining a Merchant Account so that I can take credit cards for my business. ___I am interested in becoming a re-seller for your company. Please send re-seller information. Name _____________________________________________________ Street Address ____________________________________________ City)__________________State_______Zip_____________ Phone # (_____) ___________________________ Fax # (______) _____________________ E-mail Address _________________________ ___Visa ___MasterCard Total:$________ Account Number_____________________ Expiration Date____________________ I understand that all sales are final. ____________________________________ Signature To order by check: *********************************************************** Tape or paste your check here Fax it to us at: (425)379-9722 You do not need to send a hard copy of your check. The fax is all we need. (We are able to perform this service using our Check Deposit System Software) ************************************************************ * Orders by Credit Card are shipped IMMEDIATELY. Fax completed order form to: (425) 379-9722 * Orders by personal, business or credit card CHECK are shipped in 7-10 business days. * Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK or MONEY ORDER are shipped IMMEDIATELY. Mail to: SYS 11014 19th Ave SE Suite 305 Everett, WA 98208. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - From corvett52 at yahoo.com Mon May 25 13:08:13 1998 From: corvett52 at yahoo.com (corvett52 at yahoo.com) Date: Mon, 25 May 1998 13:08:13 -0700 (PDT) Subject: The Internet Success ToolBox Message-ID: <> Note:We do not wish to send e-mail to anyone that does not want it so please send an e-mail to: corvett54 at yahoo.com You will be removed promptly. ***************************************************************** "THE INTERNET SUCCESS TOOLBOX" The Most Complete Marketing Software Package Available Anywhere! This is what you will receive on CD-ROM: 1. Stealth Mass Mailer ($399.00 value) - This unique, first of it's kind - software that allows you to easily send 250,000 e-mail messages an hour. Simply enough by making a single connection to the Internet using a standard modem, and connecting to either 20 different mail servers, or a single mail server 20 times. This, easy to use, software is designed for the basic computer user to understand. It's as easy as imputing the mail server, selecting the list of e-mail recipients to send to, inserting your e-mail address, adding your subject line, selecting your sales letter, and pressing send. 2. E-Mail Pro Extractor ($350.00 value) - This one of a kind software program is designed to manage and clean up any list of e-mail addresses. It will purge duplicates, manage removes and delete undeliverables. It will also separate and categorize your list of e-mail addresses by domain names. The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple text files that anyone can download from AOL, CompuServe, the Internet, etc...These text files contain classified ads, forum messages, or data from the member directory. Each of these files are filled with e-mail addresses. 3. Check Deposit System ($125.00 value) - Check Deposit System Version 2.1 is a state of the art, revolutionary software that allows you to easily and legally process checks by fax, phone or Internet. The customer's signature on the check is not necessary. 4. 16 Million E-mail Addresses ($149.00 value) - We took a total of over 92 million e-mail addresses from many of the touted CD's that are out there (bought them all - some were $300+)! We added the millions we had in storage to those. When we combined them all, we had in excess of 100+ million addresses in one huge file. We then ran a super "sort/de-dupe" program against this huge list. It cut the file down to less than 25 million!! We then ran a program that contained 150+ keywords to remove addresses with vulgarity, profanity, sex-related names, postmaster, webmaster, flamer, abuse, spam, etc...Also we eliminated all .edu, .mil., org., gov., etc... After that list was run against the remaining list, it reduced it down to near 16 million addresses! So, you see, our list will save people hundreds of dollars buying all others that are out there on CD. Using ours will be like using the 100+ million that we started with, but a lot less money and a lot less time! If you order "The Internet Success Toolbox" for $395.00 within the next 7 days, you'll also receive the following awesome bonuses absolutely FREE. A value of over $600.00 !!! To order: ____ YES! I'm bursting with anticipation! Please send me "The Internet Success Toolbox" so I can start advertising my business to "millions of people" - absolutely FREE! I'm anxious to see how others are creating immediate "cash-flow explosions", and eliminating most of their advertising and marketing costs - and how I can do the same! Enclosed is $395. ____ YES AGAIN! Because I'm responding within 7 days, I will receive 6 BONUSES with a total value of $663.90 - absolutely FREE! They include: BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most Powerful and Proven Strategies that really work to place you at the Top of the Search Engines! BONUS #2 ($195 value): A FREE one year subcription to "The Internet Success Toolbox Newsletter" - my ticket to marketing and internet cash flow heaven! BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified Ad Sites on the Internet" - a virtual GOLDMINE! BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your Business on Automatic Pilot and Turn Your Marketing System Into a Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even When You Don't!!" BONUS #5 ($195 value): Unlimited technical support. Even though "The Internet Success Toolbox" will be simple to use, it's great to know support is always available - if and when you really need it! And last but not least . . . . BONUS #6 ($175 value): Order within 7 days and I'll also throw in a FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE lodging at one of over 30 "premier" resorts. Some vacation spots you can choose from include: Hawaii; Orlando, FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean; Cancun, Mexico; and many, many more! Hey, when you start making a TON of money, you'll wanna do some celebrating, won't you? So start packing those bags! That's it. A lot more than you bargained for isn't it? When you total all the goodies up, you're looking as a total value of $663.90! All yours - absolutely FREE - with your purchase of our amazing package "The Internet Success Toolbox " for only $395.00. And I'll even pay for shipping your package. You can have it in days. And start making money THE VERY SAME DAY! Anyway, I have a copy right here on my desk reserved for you. All I need is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES. ___Yes, Also send me info on obtaining a Merchant Account so that I can take credit cards for my business. ___I am interested in becoming a re-seller for your company. Please send re-seller information. Name _____________________________________________________ Street Address ____________________________________________ City)__________________State_______Zip_____________ Phone # (_____) ___________________________ Fax # (______) _____________________ E-mail Address _________________________ ___Visa ___MasterCard Total:$________ Account Number_____________________ Expiration Date____________________ I understand that all sales are final. ____________________________________ Signature To order by check: *********************************************************** Tape or paste your check here Fax it to us at: (425)379-9722 You do not need to send a hard copy of your check. The fax is all we need. (We are able to perform this service using our Check Deposit System Software) ************************************************************ * Orders by Credit Card are shipped IMMEDIATELY. Fax completed order form to: (425) 379-9722 * Orders by personal, business or credit card CHECK are shipped in 7-10 business days. * Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK or MONEY ORDER are shipped IMMEDIATELY. Mail to: SYS 11014 19th Ave SE Suite 305 Everett, WA 98208. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - From iofferfun at bigfoot.com Mon May 25 14:13:00 1998 From: iofferfun at bigfoot.com (iofferfun at bigfoot.com) Date: Mon, 25 May 1998 14:13:00 -0700 (PDT) Subject: Have a peek Message-ID: <199805252112.OAA25547@cygint.cygnus.com> I thought that you would be interested in these sites. There are some interesting links on them. You should check them out. Arts sites: http://www.areyou.com/tt/arts.html Automobile sites: http://www.areyou.com/tt/auto.html Business Consultants sites: http://www.areyou.com/tt/bizcon.html Business Opportunities sites: http://www.areyou.com/tt/bizop.html Business Services sites: http://www.areyou.com/tt/bizserv.html Computer Services sites: http://www.areyou.com/tt/comserv.html Computer Software sites: http://www.areyou.com/tt/software.html Money & Finance sites: http://www.areyou.com/tt/finance.html Free Computer Products sites: http://www.areyou.com/tt/freecomputer.html Gambling sites: http://www.areyou.com/tt/gambling.html Games sites: http://www.areyou.com/tt/game.html Health and Fitness sites: http://www.areyou.com/tt/fitness.html Health Care Products sites: http://www.areyou.com/tt/health.html Hobby collecting sites: http://www.areyou.com/tt/collecting.html Home Business sites: http://www.areyou.com/tt/homebiz.html Internet & Web Resources sites: http://www.areyou.com/tt/webres.html Marketing sites: http://www.areyou.com/tt/marketing.html Shopping sites: http://www.areyou.com/tt/shopping.html Sports sites: http://www.areyou.com/tt/sports.html I hope you enjoyed them. Liza A mailing list was created for this promotion and will not be reused. Each email address is permanently removed from the list after this letter is mailed. However, if you still wish to email me with any questions or comments, please use the return address of this email. Thank you for taking the time to read this material. From huihienii21 at msn.com Mon May 25 16:34:38 1998 From: huihienii21 at msn.com (huihienii21 at msn.com) Date: Mon, 25 May 1998 16:34:38 -0700 (PDT) Subject: Want to Advertise? Bulk Friendly Hosting? We Have It!! Message-ID: <1998051434NAA13714@AOL-SUCKS.upm.edu.my> Express Mail Server & MORE!!! The Next Genereration in Mass Emailers, Completely bypass your ISP's email server and send out your email originating from your personal computer directly into your recipients mail system! Send email directly from you computer without using any of your ISP's server resources! Mail is delivered instantaneously, This incredible mail engine actually hand delivers the message from your computer into the recipients mail system. No delay; message literally travels right to its destination. Guaranteed delivery Every single last one of your messages gets delivered! Message goes directly from your computer to your recipients mail system. Personalize messages, Automatically inserts recipients name in the body or your letter for a dramatic increase in responses. Verifies every single addresses before sending. Puts all bad addresses in a bad address file (practically eliminates undeliverables!). Unbelievably FAST !! This new technology uses a multithreaded process to connect directly with your recipients mail system! Express Mail will send up to 80,000 messages per hour with a 28.8 modem (even faster with ISDN and T-1) and every single message will be individually placed in your recipients mail system instantaneously! Randomizing option allows you to break through any filters. This is a necessity to get mail through to AOL members. Create your messages in the built-in word processor. It has everything you need including spell check and color! Customization feature allows you to personally create your program. This will single-handedly generate additional sales for you and your clients. You'll love this feature! REQUIREMENTS Windows 95 or higher 8 MB RAM 486 or faster processor 10 MB free space on your hard drive **SPECIAL** ONLY $150.00** Call 1-800-298-7863 To Order Your Demo Today!! Recieve 250,000 email addresses & Stealth Mass Mailer for free!!(With Purchase) OTHER MAIL PROGRAMS Fresh 20 Million + Email Addresses on CD for only $90.00 Get 3 Stealth Mass Mailers with unlock codes for only $150.00 We also have Gold Rush for only $300.00 Email Adressee Extractor for $100.00 Caller ID for $100.00 Bulk Mate List Manager for $129.00 Desk Top Server 98 for $339.00 MX Lookup for $185.00 MUCH MORE Bulk Friendly Web Hosting On Foreign Backbone only $90.00 a month, Sex site Hosting, only $350.00 a month, 2 page Bulk Friendly web hosting only $60.00 month Also, call about a great rate of 8.9 cents long distance, even with 800/888 numbers!! 14.9 cents a minute calling cards(not prepaid) EARN MONEY TOO!!! 800 voice mail with unlimited calls, only $45.00 a month!!!!! Please leave information on the item that you are calling about. Thank you. Need to advertise a product or service? We can do it for you!! If you are already paying someone to do it, then call us and I bet we can beat them. Our fees usually start at $395.00 for 1.2 million, we even have lower rates. WE CAN ALSO ADVERTISE YOUR PRODUCTS OR SERVICES!!!! PLEASE CALL US FOR RATES ON THIS!!!!! EXCELLANT RATES!! From ABrigano at aol.com Mon May 25 17:35:46 1998 From: ABrigano at aol.com (ABrigano) Date: Mon, 25 May 1998 17:35:46 -0700 (PDT) Subject: [MVW] Mailing List Additions ... Message-ID: <93a5f2fe.356a0ab0@aol.com> Hello, Recently, MVW has undergone an expansion of it's mailing list. You have been placed on the mailing list for Mohawk Valley Wrestling. If you would like to be removed from the mailing list, please, feel free to e-mail abrigano at aol.com with the subject REMOVE and you will be removed from the list immediately. On the other hand, if you'd like to see some excellent e-wrestling cards that will knock your socks off, stay tuned and read our mail once and a while. You won't be dissapointed. I'll do my best to keep your intrest through each and every card. The 7 month old MVW as at it's hottest, and I want to share it with you. Thank You, Anthony Brigano From caj at math.niu.edu Mon May 25 18:54:38 1998 From: caj at math.niu.edu (Xcott Craver) Date: Mon, 25 May 1998 18:54:38 -0700 (PDT) Subject: Cite for "... [Spooks] Digital Steganography" In-Reply-To: <19980525142146.B3293@die.com> Message-ID: On Mon, 25 May 1998, Dave Emery wrote: => ----- Forwarded message from Bob Margolis ----- Hi, all. => "As a method to provide secure communications on the battlefield, we => are pursuing research in the area of digital steganography," says => Lisa Marvel, an electronics engineer at ARL's Information Science & => Technology Directorate. Lisa Marvel presented the paper, "Reliable Blind Information Hiding for Images" at the last Info Hiding Workshop (2nd annual) in April. Coauthored with C. Boncelet, Jr. (U. Delaware) and C. Retter (Also from US ARM), the paper describes spread-spectrum techniques for hiding a good 1-5 Kilobytes in a 512x512 greyscale image securely and w/ error correction. The proceedings aren't out yet, but one of the conference-goers was kind enough to put electronic versions of the papers online. See: http://www.cl.cam.ac.uk/~fapp2/ihw98/papers.html The ARM paper is in session 1. -Xcott ,oooooooo8 o ooooo at math.niu.edu --- http://www.math.niu.edu/~caj/ o888' `88 ,888. 888 888 ,8'`88. 888 "I have discovered a truly marvelous proof of 888o. ,oo ,8oooo88. 888 this statement, which, unfortunately, this margin `888oooo88 o88o o888o 888 is too small to contain. And my FUCKING word ____________________8o888'__processor won't let me resize it."_______________ From global8888 at yahoo.com Mon May 25 21:02:11 1998 From: global8888 at yahoo.com (global8888 at yahoo.com) Date: Mon, 25 May 1998 21:02:11 -0700 (PDT) Subject: The Internet Success ToolBox Message-ID: <> Note:We do not wish to send e-mail to anyone that does not want it so please send an e-mail to: global8889 at yahoo.com You will be removed promptly. ***************************************************************** "THE INTERNET SUCCESS TOOLBOX" The Most Complete Marketing Software Package Available Anywhere! This is what you will receive on CD-ROM: 1. Stealth Mass Mailer ($399.00 value) - This unique, first of it's kind - software that allows you to easily send 250,000 e-mail messages an hour. Simply enough by making a single connection to the Internet using a standard modem, and connecting to either 20 different mail servers, or a single mail server 20 times. This, easy to use, software is designed for the basic computer user to understand. It's as easy as imputing the mail server, selecting the list of e-mail recipients to send to, inserting your e-mail address, adding your subject line, selecting your sales letter, and pressing send. 2. E-Mail Pro Extractor ($350.00 value) - This one of a kind software program is designed to manage and clean up any list of e-mail addresses. It will purge duplicates, manage removes and delete undeliverables. It will also separate and categorize your list of e-mail addresses by domain names. The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple text files that anyone can download from AOL, CompuServe, the Internet, etc...These text files contain classified ads, forum messages, or data from the member directory. Each of these files are filled with e-mail addresses. 3. Check Deposit System ($125.00 value) - Check Deposit System Version 2.1 is a state of the art, revolutionary software that allows you to easily and legally process checks by fax, phone or Internet. The customer's signature on the check is not necessary. 4. 16 Million E-mail Addresses ($149.00 value) - We took a total of over 92 million e-mail addresses from many of the touted CD's that are out there (bought them all - some were $300+)! We added the millions we had in storage to those. When we combined them all, we had in excess of 100+ million addresses in one huge file. We then ran a super "sort/de-dupe" program against this huge list. It cut the file down to less than 25 million!! We then ran a program that contained 150+ keywords to remove addresses with vulgarity, profanity, sex-related names, postmaster, webmaster, flamer, abuse, spam, etc...Also we eliminated all .edu, .mil., org., gov., etc... After that list was run against the remaining list, it reduced it down to near 16 million addresses! So, you see, our list will save people hundreds of dollars buying all others that are out there on CD. Using ours will be like using the 100+ million that we started with, but a lot less money and a lot less time! If you order "The Internet Success Toolbox" for $395.00 within the next 7 days, you'll also receive the following awesome bonuses absolutely FREE. A value of over $600.00 !!! To order: ____ YES! I'm bursting with anticipation! Please send me "The Internet Success Toolbox" so I can start advertising my business to "millions of people" - absolutely FREE! I'm anxious to see how others are creating immediate "cash-flow explosions", and eliminating most of their advertising and marketing costs - and how I can do the same! Enclosed is $395. ____ YES AGAIN! Because I'm responding within 7 days, I will receive 6 BONUSES with a total value of $663.90 - absolutely FREE! They include: BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most Powerful and Proven Strategies that really work to place you at the Top of the Search Engines! BONUS #2 ($195 value): A FREE one year subcription to "The Internet Success Toolbox Newsletter" - my ticket to marketing and internet cash flow heaven! BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified Ad Sites on the Internet" - a virtual GOLDMINE! BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your Business on Automatic Pilot and Turn Your Marketing System Into a Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even When You Don't!!" BONUS #5 ($195 value): Unlimited technical support. Even though "The Internet Success Toolbox" will be simple to use, it's great to know support is always available - if and when you really need it! And last but not least . . . . BONUS #6 ($175 value): Order within 7 days and I'll also throw in a FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE lodging at one of over 30 "premier" resorts. Some vacation spots you can choose from include: Hawaii; Orlando, FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean; Cancun, Mexico; and many, many more! Hey, when you start making a TON of money, you'll wanna do some celebrating, won't you? So start packing those bags! That's it. A lot more than you bargained for isn't it? When you total all the goodies up, you're looking as a total value of $663.90! All yours - absolutely FREE - with your purchase of our amazing package "The Internet Success Toolbox " for only $395.00. And I'll even pay for shipping your package. You can have it in days. And start making money THE VERY SAME DAY! Anyway, I have a copy right here on my desk reserved for you. All I need is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES. ___Yes, Also send me info on obtaining a Merchant Account so that I can take credit cards for my business. ___I am interested in becoming a re-seller for your company. Please send re-seller information. Name _____________________________________________________ Street Address ____________________________________________ City)__________________State_______Zip_____________ Phone # (_____) ___________________________ Fax # (______) _____________________ E-mail Address _________________________ ___Visa ___MasterCard Total:$________ Account Number_____________________ Expiration Date____________________ I understand that all sales are final. ____________________________________ Signature To order by check: *********************************************************** Tape or paste your check here Fax it to us at: (425)379-9722 You do not need to send a hard copy of your check. The fax is all we need. (We are able to perform this service using our Check Deposit System Software) ************************************************************ * Orders by Credit Card are shipped IMMEDIATELY. Fax completed order form to: (425) 379-9722 * Orders by personal, business or credit card CHECK are shipped in 7-10 business days. * Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK or MONEY ORDER are shipped IMMEDIATELY. Mail to: SYS 11014 19th Ave SE Suite 305 Everett, WA 98208. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - From global8888 at yahoo.com Mon May 25 21:02:11 1998 From: global8888 at yahoo.com (global8888 at yahoo.com) Date: Mon, 25 May 1998 21:02:11 -0700 (PDT) Subject: The Internet Success ToolBox Message-ID: <> Note:We do not wish to send e-mail to anyone that does not want it so please send an e-mail to: global8889 at yahoo.com You will be removed promptly. ***************************************************************** "THE INTERNET SUCCESS TOOLBOX" The Most Complete Marketing Software Package Available Anywhere! This is what you will receive on CD-ROM: 1. Stealth Mass Mailer ($399.00 value) - This unique, first of it's kind - software that allows you to easily send 250,000 e-mail messages an hour. Simply enough by making a single connection to the Internet using a standard modem, and connecting to either 20 different mail servers, or a single mail server 20 times. This, easy to use, software is designed for the basic computer user to understand. It's as easy as imputing the mail server, selecting the list of e-mail recipients to send to, inserting your e-mail address, adding your subject line, selecting your sales letter, and pressing send. 2. E-Mail Pro Extractor ($350.00 value) - This one of a kind software program is designed to manage and clean up any list of e-mail addresses. It will purge duplicates, manage removes and delete undeliverables. It will also separate and categorize your list of e-mail addresses by domain names. The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple text files that anyone can download from AOL, CompuServe, the Internet, etc...These text files contain classified ads, forum messages, or data from the member directory. Each of these files are filled with e-mail addresses. 3. Check Deposit System ($125.00 value) - Check Deposit System Version 2.1 is a state of the art, revolutionary software that allows you to easily and legally process checks by fax, phone or Internet. The customer's signature on the check is not necessary. 4. 16 Million E-mail Addresses ($149.00 value) - We took a total of over 92 million e-mail addresses from many of the touted CD's that are out there (bought them all - some were $300+)! We added the millions we had in storage to those. When we combined them all, we had in excess of 100+ million addresses in one huge file. We then ran a super "sort/de-dupe" program against this huge list. It cut the file down to less than 25 million!! We then ran a program that contained 150+ keywords to remove addresses with vulgarity, profanity, sex-related names, postmaster, webmaster, flamer, abuse, spam, etc...Also we eliminated all .edu, .mil., org., gov., etc... After that list was run against the remaining list, it reduced it down to near 16 million addresses! So, you see, our list will save people hundreds of dollars buying all others that are out there on CD. Using ours will be like using the 100+ million that we started with, but a lot less money and a lot less time! If you order "The Internet Success Toolbox" for $395.00 within the next 7 days, you'll also receive the following awesome bonuses absolutely FREE. A value of over $600.00 !!! To order: ____ YES! I'm bursting with anticipation! Please send me "The Internet Success Toolbox" so I can start advertising my business to "millions of people" - absolutely FREE! I'm anxious to see how others are creating immediate "cash-flow explosions", and eliminating most of their advertising and marketing costs - and how I can do the same! Enclosed is $395. ____ YES AGAIN! Because I'm responding within 7 days, I will receive 6 BONUSES with a total value of $663.90 - absolutely FREE! They include: BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most Powerful and Proven Strategies that really work to place you at the Top of the Search Engines! BONUS #2 ($195 value): A FREE one year subcription to "The Internet Success Toolbox Newsletter" - my ticket to marketing and internet cash flow heaven! BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified Ad Sites on the Internet" - a virtual GOLDMINE! BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your Business on Automatic Pilot and Turn Your Marketing System Into a Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even When You Don't!!" BONUS #5 ($195 value): Unlimited technical support. Even though "The Internet Success Toolbox" will be simple to use, it's great to know support is always available - if and when you really need it! And last but not least . . . . BONUS #6 ($175 value): Order within 7 days and I'll also throw in a FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE lodging at one of over 30 "premier" resorts. Some vacation spots you can choose from include: Hawaii; Orlando, FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean; Cancun, Mexico; and many, many more! Hey, when you start making a TON of money, you'll wanna do some celebrating, won't you? So start packing those bags! That's it. A lot more than you bargained for isn't it? When you total all the goodies up, you're looking as a total value of $663.90! All yours - absolutely FREE - with your purchase of our amazing package "The Internet Success Toolbox " for only $395.00. And I'll even pay for shipping your package. You can have it in days. And start making money THE VERY SAME DAY! Anyway, I have a copy right here on my desk reserved for you. All I need is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES. ___Yes, Also send me info on obtaining a Merchant Account so that I can take credit cards for my business. ___I am interested in becoming a re-seller for your company. Please send re-seller information. Name _____________________________________________________ Street Address ____________________________________________ City)__________________State_______Zip_____________ Phone # (_____) ___________________________ Fax # (______) _____________________ E-mail Address _________________________ ___Visa ___MasterCard Total:$________ Account Number_____________________ Expiration Date____________________ I understand that all sales are final. ____________________________________ Signature To order by check: *********************************************************** Tape or paste your check here Fax it to us at: (425)379-9722 You do not need to send a hard copy of your check. The fax is all we need. (We are able to perform this service using our Check Deposit System Software) ************************************************************ * Orders by Credit Card are shipped IMMEDIATELY. Fax completed order form to: (425) 379-9722 * Orders by personal, business or credit card CHECK are shipped in 7-10 business days. * Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK or MONEY ORDER are shipped IMMEDIATELY. Mail to: SYS 11014 19th Ave SE Suite 305 Everett, WA 98208. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - From lottdin at hotmail.com Mon May 25 21:49:49 1998 From: lottdin at hotmail.com (Tony Grendair) Date: Mon, 25 May 1998 21:49:49 -0700 (PDT) Subject: A Lottery You can Control The stakes In! Message-ID: <19980526044859.14362.qmail@hotmail.com> A Lottery You Control the Odds IN? Read the first few lines and see if you aren't at least intrigued. Are you SURE you won't miss out? OK. So this is another MLM, BUT, this is the best one I've ever seen. Firstly, the cost to me for starting in on this program = $20 US plus postage. That's it. Second, you actually get something for your money. Something truly useful. The package you receive contains detailed reports of (1) How to start a small business, something very popular in today's economy (2) How to find Gov't auctions. You'ld be surprised how many there are (3) Home based business and (4) How to start an Answering service. Each of the reports is very inciteful and will get you at least wondering what it would be like to control your own destiny. PLUS, this program gives you the chance to raise the start up capital, or just make a bunch of money. This is a lottery you control the stakes at. With a little effort you can easily turn 20 dollars into much more. Think just 10 people over the entire Internet need to take a chance like I did. I only need a response of about .05%, that's .005 out of a hundred I reach with this program. This is my first time ever doing this and I can't see one reason it won't work and I'm a business student at one of the best schools in the country. Hey I might not need a summer job. Wouldn't that be sweet? Throw your hand in and with a little work this could be the greatest thing that ever happened. Remember, people get rich with these programs, that's why there out there, there is no reason it can't be you. Maybe nothing in this life is free but this may be as close as there is. Please accept my apology if this was sent to you in error! ******************************************************************* You are about to possibly make $50,000--in less than 90 days Read the enclosed program...THEN READ IT AGAIN! ******************************************************************** Dear Friend, If you are looking to make some real money, and you don't want to spend much money to do it then this is for you. This business will only cost you $20 to get into, and that's not much when you consider some of the other offers that you will receive. ********************************************************************* Testimonial: I am an Executive Director of a YMCA and would never do anything that I thought would be wrong. So please take a look at the business program that we are offering you. I think this is one of the safest investments that you can make, and the rewards are outstanding $$$$. It requires very little effort on your part, and no hard selling. Now that's what I've been looking for! Many people have paid off debts, bought houses, taken vacations, etc. with the money they have made through this business, and believe me that it does not take long before the money starts to come in. Within 5 to 7 days of sending your advertisement out via bulk e-mail you will start receiving orders for the reports. You will have $5 bills overflowing your mailbox or PO Box. Many people have to pick their mail up at the window because all of the mail will not fit into the box! Excited yet? I was very skeptical too when I first received an advertisement about this great business opportunity, and passed on it many times--just deleting them when I received the offers. Thank goodness someone sent me another chance. The money has been rolling in now for about 9 weeks. I have paid the money that I owed to state income tax, and paid off two other credit cards. I know that in another 30 to 40 days I will be debt free, and how many people can say that now days? We are only giving you the opportunity to help yourself to this outstanding money making opportunity. The rest is up to you, but think about this. I have only spent about $100--$20 to order the reports and $80 to send bulk emails, and I am almost debt free now. Within another 3 to 4 weeks I will be there--debt free, and I never thought that would happen. There is no other opportunity that costs so little to get in, and to make such large sums of money. I urge you to act now. I promise you will be very satisfied with the results. Butch Christy ****************************************** Please, if you have any questions about this program feel free to email me with your questions. I will be glad to help you to financial freedom. The following is the program and how it works, and please when you decide to act upon this great opportunity, follow all directions exactly. Making changes in the program in any way will result in lost income for you and others. Thanks for taking the time to look at this program, and best wishes. Jennifer Evans $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ This is a LEGAL, MONEYMAKING PHENOMENON PRINT this letter, read the directions, THEN READ IT AGAIN!!! You are about to embark on the most profitable and unique program you may ever see. Many times over, it has demonstrated and proven its ability to generate large amounts of money. This program is showing fantastic appeal with a huge and ever-growing on-line population desirous of additional income. This is a legitimate, LEGAL, money-making opportunity. It does not require you to come in contact with people, do any hard work, and best of all, you never have to leave the house, except to get the mail and go to the bank! This truly is that lucky break you've been waiting for! Simply follow the easy instructions in this letter, and your financial dreams will come true! When followed correctly, this electronic, multi-level marketing program works. Thousands of people have used this program to: -Raise capital to start their own business -Pay off debts -Buy homes, cars, etc., -Even retire! This is your chance, so don't pass it up! ____________________________________________________________ OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTI-LEVEL MARKETING PROGRAM ____________________________________________________________ Basically, this is what we do: We send thousands of people a product for $5.00 that costs next to nothing to produce and e-mail. As with all multi-level businesses, we build our business by recruiting new partners and selling our products. Every state in the U.S. allows you to recruit new multi-level business online (via your computer). The products in this program are a series of four business and financial reports costing $5.00 each. Each order you receive via "snail mail" will include: *$5.00 cash *The name and number of the report they are ordering *The e-mail address where you will e-mail them the report they ordered. To fill each order, you simply e-mail the product to the buyer. The $5.00 is yours! This is the EASIEST electronic multi-level marketing business anywhere! FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE STAGGERING BENEFITS!!!! ********INSTRUCTIONS********** This is what you MUST do: 1. Order all 4 reports shown on the list below (you can't sell them if you don't order them). *For each report, send $5.00 CASH, the NAME & NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, AND YOUR RETURN POSTAL ADDRESS (in case of a problem) to the person whose name appears on the list next to the report. * When you place your order, make sure you order each of the four reports. You will need all four reports so that you can save them on your computer and resell them. * Within a few days you will receive, via e-mail, each of the four reports. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. 2. IMPORTANT--DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than is instructed below in steps "a" through "d" or you will lose out on the majority of your profits. Once you understand the way this works, you'll also see how it doesn't work if you change it. Remember, this method has been tested, and if you alter it, it will not work. This is just the nature of the program. In order to achieve the multiplying phenomenon you must follow the steps. a. Look below for the listing of available reports. b. After you've ordered the four reports, replace the name and address under REPORT #1 with your name and address, moving the one that was there down to REPORT #2. c. Move the name and address that was under REPORT #2 down to REPORT#3. d. Move the name and address that was under REPORT #3 down to REPORT #4. e. The name and address that was under REPORT #4 is removed from the list and has NO DOUBT collected their 50 grand. Please make sure you copy everyone's name and address ACCURATELY!!! 3. Take this entire letter, including the modified list of names, and save it to your computer. Make NO changes to the instruction portion of this letter. 4. Now you're ready to start an advertising campaign on the WORLDWIDE WEB! Advertising on the WEB is very, very inexpensive, and there are HUNDREDS of FREE places to advertise. Another avenue which you could use for advertising is e-mail lists. You can buy these lists for under $20/2,000 addresses or you can pay someone a minimal charge to take care of it for you. BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY! 5. For every $5.00 you receive, all you must do is e-mail them the report they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This guarantees the e-mail THEY send out, with YOUR name and address on it, will be prompt because they can't advertise until they receive the report! ___________________________ AVAILABLE REPORTS ___________________________ ***Order Each REPORT by NUMBER and NAME*** Notes: - ALWAYS SEND $5 CASH FOR EACH REPORT - ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL - Make sure the cash is concealed by wrapping it in at least two sheets of paper. - On one of those sheets of paper, include: (a) the number and name of the report you are ordering, (b) your e-mail address, and (c) your postal address. __________________________________________________________ REPORT #1 "How to Start Your Own Home Based Business For Fun & Profit!" ORDER REPORT #1 FROM: KKyKo Rideau Town Center Post Office Box 30029 Kingston, ON Canada K7K 7B5 Please ensure sufficient postage, it is slightly more to mail to Canada. If you like I can include how I collected over 4000 email addresses for free and I'll include the list I compiled. Simply add five dollars to this order. _____________________________________________________________ REPORT #2 "An Insiders Handbook on U.S. Government Auction Sales" ORDER REPORT #2 FROM: U.S. Champs Post Office Box 1612 Hermitage, PA 16148 _____________________________________________________________ REPORT #3 "How To Make Money Without Leaving Your House!" ORDER REPORT #3 FROM: Caines 3622 Tiffany Lane West Middlesex, PA 16159 _____________________________________________________________ REPORT #4 "Earn Extra Money With a Home Based Answering Machine" ORDER REPORT #4 FROM: Timberlane Consultants 2627 Romar Drive Hermitage, PA 16148 _____________________________________________________________ HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$ _____________________________________________________________ Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people to participate on your first level. (Placing a lot of FREE ads on the Internet will EASILY get a larger response.) Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline members. Follow this example to achieve the STAGGERING results below. 1st level--your 10 members with $5..................................$50 2nd level--10 members from those 10 ($5 x100)..................$500 3rd level--10 members from those 100 ($5 x 1,000)..............$5,000 4th level--10 members from those 1,000 ($5 x 10,000)...........$50,000 THIS TOTALS ----------------->$55,550 Remember friends, this assumes that the people who participate only recruit 10 people each. Think for a moment what would happen if they got 20 people to participate! Most people get 100's of participants! THINK ABOUT IT!!!!! Your cost to participate in this is practically nothing (surely you can afford $20 for a chance to make $55,000). You obviously already have an Internet connection and e-mail is FREE!!! REPORT #3 shows you the most productive methods for bulk e-mailing and purchasing e-mail lists. Some list and bulk e-mail vendors even work on trade! About 50,000 new people get online every month! ********TIPS FOR SUCCESS********* *TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the directions accurately. *Send for the four reports IMMEDIATELY so you will have them when the orders start coming in because: When you receive a $5 order, you MUST send out the requested product/report to comply with the U.S. Postal & Lottery Laws, Title 18, Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also Code of Federal Regs. Vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money received". *ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE. *Be patient and persistant with this program. If you follow the instructions exactly, the results WILL undoubtedly be SUCCESSFUL! *ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED! ************YOUR SUCCESS GUIDELINE****************** Follow these guidelines to guarantee your success: If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue advertising until you do. Then, a couple of weeks later you should receive at least 100 orders for REPORT #2. If you don't, continue advertising until you do. Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to roll in! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a DIFFERENT report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you. If you want to generate more income, send another batch of e-mails and start the whole process again! There is no limit to the income you will generate from this business!! NOTE: If you need help with starting a business, registering a business name, how income tax is handled, etc., contact your local office of the Small Business Administration (a Federal agency) for free help and answers to questions. Also, the Internal Revenue Service offers free help via telephone and free seminars about business taxes. *******TESTIMONIALS******* This program does work, but you must follow it EXACTLY! Especially the rule of not trying to place your name in a different position, it won't work and you'll lose a lot of potential income. I'm living proof that it works. It really is a great opportunity to make relatively easy money, with little cost to you. If you do choose to participate, follow the program exactly, and you'll be on your way to financial security. Sean McLaughlin, Jackson, MS My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a cost accountant with a major U.S. Corporation and I make pretty good money. When I received the program I grumbled to Doris about receiving "junk mail". I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I "knew" it wouldn't work. Doris totally ignored my supposed intelligence and jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you so" on her when the thing didn't work....Well, the laugh was on me! Within two weeks she had received over 50 responses. Within 45 days she had received over $147,200 in $5 bills! I was shocked! I was sure that I had it all figured out and that it wouldn't work. I AM a believer now. I have joined Doris in her "hobby". I did have seven more years until retirement, but I think of the "rat race" and it's not for me. We owe it all to MLM. Frank T., Bel-Air, MD I just want to pass along my best wishes and encouragement to you. Any doubts you have will vanish when your first orders come in. I even checked with the U.S. Post Office to verify that the plan was legal. It definitely is! IT WORKS!!!!! Paul Johnson, Raleigh, NC The main reason for this letter is to convince you that this system is honest, lawful, extremely profitable, and is a way to get a large sum of money in a short time. I was approached several times before I checked this out. I joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received $36,470.00 in the first 14 weeks, with money still coming in. Sincerely yours, Phillip A. Brown, Esq. Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative that I am, I decided that the initial investment was so little that there was just no way I wouldn't get enough orders to at least get my money back. Boy, was I surprised when I found my medium-size post office box crammed with orders! For awhile, it got so overloaded that I had to start picking up my mail at the window. I'll make more money this year than in any 10 years of my life before. The nice thing about this deal is that it doesn't matter where in the U.S. the people live. There simply isn't a better investment with a faster return. Mary Rockland, Lansing, MI I had received this program before. I deleted it, but later I wondered if I shouldn't have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed another program. 11 months passed then it came...I didn't delete this one!...I made more than $41,000 on the first try!! Wilburn, Muncie, IN This is my third time to participate in this plan. We have quit our jobs, and will soon buy a home on the beach and live off the interest on our money. The only way on earth that this plan will work for you is if you do it. For your sake, and for your family's sake don't pass up this golden opportunity. Good luck and happy spending! Charles Fairchild, Spokane, WA NOW WHAT IS $20 FOR A CHANCE TO MAKE AN EXCESS OF $50,000? ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM!!!!!! ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From billp at nmol.com Tue May 26 06:58:49 1998 From: billp at nmol.com (bill payne) Date: Tue, 26 May 1998 06:58:49 -0700 (PDT) Subject: Appeals court notices Message-ID: <356AC83A.747B@nmol.com> Monday 5/26/98 7:39 AM John Young I looked at http://www.jya.com/nsa-cases.htm CALIFORNIA NORTHERN DISTRICT COURT Gilmore v. NSA Bernstein v. State U.S. COURT OF APPEALS, NINTH CIRCUIT Gilmore v. NSA [Court denied access to docket] Bernstein v. USA, et al 09/10/97 12/08/97 Open: Submitted Looks like Gilmore http://www.cygnus.com/~gnu/ is on his way to the Supreme Court. Too. We must all keep in mind that the government has loaded the courts with its own judges. I was told not to worry if I got caught doing illegal work breaking electronic locks for the FBI. The courts would cover for me. Not enough people took seriously what some were saying during the Vietnam war. Looks like those who screamed "Fascist pigs", unfortunately, were right. FASCISM - a political and economic movement, strongly nationalistic, magnifying the rights of the state as opposed to those of the individual, in which industry, though remaining largely under private ownership, and all administrative political units, are controlled by a strong central government. This morning I will file some papers for Morales with the court. And get forms for notice of appeal to the Tenth circuit. Let's all hope its not too late to make some PEACEFUL changes. And hope for settlement too. Later bill Counterfeiting Wiegand Wire Access Credentials Bill Payne October 16,1996 Abstract Wiegand wire access credentials are easy and inexpensive to counterfeit. Access Control & Security Systems Integration magazine, October 1996 [http://www/securitysolutions.com] published the article, Wiegand technology stands the test of time by PAUL J. BODELL, page 12 Many card and reader manufacturers offer Wiegand (pronounced wee-gand) output. However, only three companies in the world make Wiegand readers. Sensor Engineering of Hamden Conn., holds the patent for Wiegand, and Sensor has licensed Cardkey of Simi Valley, Calif., and Doduco of Pforzheim, Germany, to manufacture Wiegand cards and readers. ... A Wiegand output reader is not the same thing as a Wiegand reader, and it is important to understand the differences. In brief, Wiegand reader use the Wiegand effect to translate card information around the patented Wiegand effect in which a segment of a specially treated wire generates an electronic pulse when subjected to a specific magnetic field. If the pulse is generated when the wire is near a pick-up coil, the pulse can be detected by a circuit. Lining up several rows of wires and passing them by a cold would generate a series of pulses. Lining up two rows of wires - calling on row "zero bits" and the other "one bits" - and passing them by two different coils would generate two series of pulses, or data bits. These data bits can then be interpreted as binary data and used to control other devices. If you seal the coils in a rugged housing with properly placed magnets, and LED and some simple circuitry, you have a Wiegand reader. Carefully laminate the special wires in vinyl, and artwork, and hot-stamp a number on the vinyl, and you have a Wiegand card. IN THE BEGINNING Wiegand was first to introduce to the access control market in the late 1970s. It was immediately successful because it filled the need for durable, secure card and reader technology. Embedded in the cards, Wiegand wires cannot be altered or duplicated. ... Bodell's Last statement is incorrect. Tasks for EASILY counterfeiting Wiegand wire cards are 1 Locate the wires inside the card to read the 0s and 1s. 2 Build an ACCEPTABLE copy of the card. Bodell's clear explanation of the working of a Wiegand card can be visualized zero row | | | one row | | binary 0 1 0 0 1 representation Solutions to Task 1 A X-ray the card B MAGNI VIEW FILM, Mylar film reads magnetic fields ... Edmunds Scientific Company, catalog 16N1, page 205, C33,447 $11.75 is placed over the top of the Wiegand card. COW MAGNET, Cow magnetics allow farmers to trap metal in the stomachs of their cows. Edmunds, page 204, C31,101 $10.75 is placed under the card. Location of the wires is easily seen on the green film. Mark the position of the wires with a pen. Next chop the card vertically using a shear into about 80/1000s paper-match-sized strips. Don't worry about cutting a wire or two. Note that a 0 has the pen mark to the top. A 1 has the pen mark at the bottom. Take a business card and layout the "paper match"-like strips to counterfeit the card number desired. Don't worry about spacing. Wiegand output is self-clocking! Tape the "paper-match - like" strips to the business card. Only the FUNCTION of the card needs to be reproduced! History Breaking electronic locks was done as "work for others" at Sandia National Laboratories beginning in 1992 funded by the Federal Bureau of Investigation/Engineering Research Facility, Quantico, VA. The FBI opined that this work was SECRET/NATIONAL SECURITY INFORMATION. Details of the consequences of this work are covered in Fired Worker File Lawsuit Against Sandia Specialist Says He Balked When Lab Sought Electronic Picklock Software, Albuquer Journal, Sunday April 25, 1993 State-sanctioned paranoia, EE Times, January 22, 1996 One man's battle, EE Times, March 22, 1994 Damn the torpedoes, EE Times, June 6, 1994 Protecting properly classified info, EE Times, April 11, 1994 DOE to scrutinize fairness in old whistle-blower cases, Albuquerque Tribune, Nov 7 1995 DOE boss accelerates whistle-blower protection, Albuquerque Tribune, March 27, 1996 DOE doesn't plan to compensate 'old' whistle-blowers with money, Albuquerque Tribune September 27, 199 From twaweb at inet2.twa.com Tue May 26 11:12:53 1998 From: twaweb at inet2.twa.com (Trans World Specials) Date: Tue, 26 May 1998 11:12:53 -0700 (PDT) Subject: Trans World Specials Fare Sales Message-ID: <19980526153826.19097.qmail@inet2.twa.com> Welcome to Trans World Specials for May 26th, 1998. Fares are valid for travel originating 5/30/98 and returning 6/1/98 or 6/2/98. All tickets must be purchased May 29th. Have you been to www.twa.com lately? Enroll in Aviators or check your mileage portfolio online. Read about TWA's J.D. Power & Associates / Frequent Flyer Magazine Long Haul service award. On to this week's Trans World Specials ***********COACH FARES************ Roundtrip fares betweeen ST. LOUIS, MO and: Cedar Rapids, IA (CID) $79 Detroit, MI (DTW) $89 Wichita, KS (ICT) $89 Colorado Springs, CO (COS) $139 Boston, MA (BOS) $149 Roundtrip fares between BOSTON, MA and: Cedar Rapids, IA (CID) $149 Little Rock, AR (LIT) $149 St. Louis, MO (STL) $149 Wichita, KS (ICT) $149 Colorado Springs, CO (COS) $169 Roundtrip fares between CEDAR RAPIDS, IA and: St. Louis, MO (STL) $79 Detroit, MI (DTW) $99 Boston, MA (BOS) $149 Travel is not valid on Trans World Express flights 7000-7999. Call TWA at 1-800-221-2000 and book your your Trans World Special today. *******GETAWAY VACATIONS************ ORLANDO -- Econo Lodge Maingate Hawaiian includes: - roundtrip economy airfare - 2 nights hotel accommodations - airport transfers - Avis 4-door compact car rental - 2 for 1 Church Street Station admission - kids 12 and under eat FREE - just 1.5 miles to Walt Disney World main entrance - 2000 bonus Aviator Miles in addition to actual miles - from $239 departing New York (JFK) - from $245 departing St. Louis - from $255 departing Cincinnati, Columbus, Dayton Detroit, Indianapolis, Kansas City, Litte Rock, Milwaukee, Nashville, Oklahoma City, Omaha - from $299 departing Boston, Hartford, Philadelphia Pittsburgh TASTE OF EUROPE FROM $2139 includes: - roundtrip economy airfare - buffet breakfast daily - sightseeing - some dinners - travel by private luxury motorcoach - available for 8/20/98 departure - available from Los Angeles, San Francisco, Seattle - FIRST CLASS upgrade option for only $1099 each way - 5000 bonus Aviator Miles in addition to actual miles Call 1-800-GETAWAY( 438-2929) now and book your GETAWAY VACATION. ******************ALAMO************** ALAMO offers these low rates for an economy car valid 5/30/98 - 6/1/98 $17.99 Detroit, St. Louis $20.99 Boston, Little Rock $29.99 Colorado Springs For reservations call Alamo at 1-800-GO-ALAMO and request rate code RT and ID # 443833. For online reservations access Alamo at http://www.goalamo.com ***********HILTON HOTELS & RESORTS***** Hilton Hotels/Resorts offers this low rate valid the nights of 5/30/98 - 6/1/98 $67 Detroit Metro Airport Hilton Suites, Romulus, MI ( explore the many shopping malls or the Windsor Casino) For reservations call Hilton at 1-800-774-1500 and ask for Hilton Value Rates. Visit Hilton at http://www.hilton.com **********TERMS & CONDITIONS************** Airfare Terms and Conditions: GENERAL CONDITIONS: Fares shown are round trip, nonrefundable and are subject to change. Changes to itinerary are not permitted. Fares do not include Passenger Facility Charges of up to $12 depending on itinerary. Must use E-Ticketing for domestic travel. Credit card is the only form of payment accepted. Offer is not available in conjunction with any other discount, coupon or promotional offer. Seats are limited and may not be available on all flights or days of the week. Tickets must be purchased at time of booking and no later than 5/29/98. Standby passengers not allowed. DOM Monday (6/1) or Tuesday (6/2). Travel is effective 5/30/98 with all travel to be completed by 6/2/98. Minimum stay is 2 days. Maximum stay is 3 days. Getaway Conditions: ALL PACKAGES: Package include round-trip economy airfare from cities indicated. Price is per person based on double occupancy and is subject to change. Availability, restrictions, surcharges, blackouts and cancellation penalties apply. No other discounts or promotions are valid in conjunction with these packages. DOMESTIC CONDITIONS: Depart for Orlando Sunday-Wednesday and return Tuesday-Friday. Travel is valid 6/23/98-7/29/98 with all travel completed 7/31/98. Surcharges apply 7/12-7/31. Price does not include Passenger Facility Charges of up to $16 per person. Full payment due by 6/1/98. INTERNATIONAL CONDITIONS: Seats are limited and may not be available on all flights. Price does not include Passenger Facility Charges, US departure/arrival, agriculture, and security fees from point of origin of travel up to approximately $90 per person. Single supplement from $489. Full payment is required by 6/1/98. Car Rental Conditions: Taxes (including in California, VLF taxes ranging up to $1.89 per day), registrations fee/tax reimbursement, and airport access fees/taxes, if any, are extra. Optional CDW, liability insurance, fuel, additional driver fee, drop charges and other optional items are extra. Rates higher for renters under age 25. Rates valid for rentals commencing on Saturday and ending by 11:59 PM on Tuesday. Rates only valid during week in which they are published via TWA Internet site. A 24-hour advance reservation is required. Availability is limited. Hotel Conditions: Hilton Hotels and Resorts special rates are available only during the specific week in which they are published via the TWA Hot Deals Internet site and the HiltonNet Internet site. Limited availability; rooms at these Hilton Value Rates are sold on a first-come, first-served basis. Availability, rate, and terms of occupancy are not guaranteed and will be confirmed at time of reservation. Participating hotels, rates and terms are subject to change without notice. Single or double occupancy. Early check-in, late check-out subject to availability. No extra charge for children when they stay in parents' or grandparents' room; total room occupancy subject to local fire safety regulations and other applicable laws or regulations. Rates vary by season, do not include any other fees or charges, including without limitation state or local taxes or gratuities and are subject to change without notice. Advance booking required. Advance deposit may be required. Offer cannot be combined with any other special discounts, coupons, certificates, special rates, promotional offers, award stays, or meeting/group stays. Hilton reserves the right to cancel any Hilton Value Rate at any time without notice. Hilton is not responsible for the terms of other offers in the program, or for any electronic, computer, telephone, security, virus or any other problem or damage related to use of the program or its offers. For reservations call 1-800-221-2000 (domestic) or 1-800-892-4141 (international) or call your travel agent and ask for TWA's special Internet fares. From xena at best.com Tue May 26 11:30:02 1998 From: xena at best.com (Xena - Warrior Princess) Date: Tue, 26 May 1998 11:30:02 -0700 (PDT) Subject: Holograms Message-ID: EURO HOLOGRAM IS MISSING Somewhere between Paris and Munich, a unique hologram design, intended to deter counterfeiting of the new euro currency, has turned up missing. The French-made hologram was on its way to a high-security printer near Nuremberg for testing. One European Union monetary official called the disappearance "startling" and there's speculation that the EU may have to change the design of its high-denomination euro banknotes, due to be issued in 2002. The hologram was designed by a small business in Paris and was taken to be loaded onto an Air France flight at Roissy airport by Brink's security services. Officials in Paris say the theft bears the hallmarks of a well-organized crime, as only an expert would understand the significance of the hologram in the note-printing process. (Financial Times 21 May 98) From nobody at REPLAY.COM Tue May 26 21:43:13 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 26 May 1998 21:43:13 -0700 (PDT) Subject: Structure of MISTY Message-ID: <199805270443.GAA18680@basement.replay.com> http://www.mitsubishi.com/ghp_japan/misty/200misty.htm From jdobruck at kki.net.pl Wed May 27 02:50:01 1998 From: jdobruck at kki.net.pl (Jan) Date: Wed, 27 May 1998 02:50:01 -0700 (PDT) Subject: PGP v6.0 & OpenPGP Message-ID: <356BE23C.EB31683A@kki.net.pl> Greetings. I've heard these two are going to come out one day soon. What I'm interested in is what's so new in it that it's being called version 6.0... Thanks in advance. And my second message is about my archive. The reason why it hadn't been updated to something worthwhile is the fact that i need to spell-check the archives i download. There are tons of errors in them. It's just too bad that people don't spell check their own documents on the net. Sincerely, Jan From bulletingmarket3893 at ub.net.id Wed May 27 04:56:46 1998 From: bulletingmarket3893 at ub.net.id (bulletingmarket3893 at ub.net.id) Date: Wed, 27 May 1998 04:56:46 -0700 (PDT) Subject: SUBJECT: RE: MARKET BULLETIN!! Message-ID: <148785261852.OAA03652@mailrout4.ub.net.id> The celebrated Stanley Morgan StockMarket Newsletter projects new highs in all the major U.S. market indices. (Asia crisis=U.S. slowdown=lower interest rates=higher stock prices.) Our top stock selections include: Cisco Systems CSCO 76 Excite XCIT 53 Mark I Inds. MKII 1 1/8 We anticipate EXPLOSIVE upside movement in the above group. http://quote.yahoo.com/ Send no money, sample issue: Dept. WIN, P.O. Box 30499, Seven Mile Beach, Grand Cayman, B.W.I. From jmatk at tscm.com Wed May 27 16:34:30 1998 From: jmatk at tscm.com (James M. Atkinson, Comm-Eng) Date: Wed, 27 May 1998 16:34:30 -0700 (PDT) Subject: Fraud Alert - Frank Jones - Spyking Message-ID: Greetings, I regret to inform you that you may have been the victim of a serious hoax foisted by Frank Jones (aka: SpyKing). Many people, including the members of the media, have been swallowing what Frank Jones has to offer, simply because they neither understand the science or won't do even simple research on a vendor (hint: the TEMPEST, DATASCAN and similar products are an utter hoax). You may be interested in the following information regarding Frank Jones which we have listed on the Threat Profile Library. http://www.tscm.com/FNJspyking.html We would encourage you to examine the materials in the Threat Profile Library, and then to review your own dealings with the subject. We also recommend that you carefully review the documents, and then contact those agencies directly yourself (they would be happy to talk to you). Each of the agencies (such as NY PI Lisc. Board, and NY Police Department) will gladly provide you with authentication of the documents we present and will gladly send you copies of the original documents (just ask them). They will verify the documents are indeed genuine and were generated by their agencies. Of course Frank claims that all of the documents in the library have been forged and are counterfit (which is a hilarious claim). Please feel free to verify the documents, in fact we strongly encourage it!!! You may seriously want to reconsider your attendance at SpookTec98 as several of the victims (and "Guest Speakers") who attended last year were not at all amused (some of whom where burned when their promised "limo and free hotel room" never showed up). Good Luck, -jma ======================================================================= Everybody's into computers... Who's into yours?� ======================================================================= James M. Atkinson Phone: (978) 546-3803 Granite Island Group - TSCM.COM 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931 mailto:jmatk at tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From KevB428 at aol.com Wed May 27 23:59:06 1998 From: KevB428 at aol.com (KevB428 at aol.com) Date: Wed, 27 May 1998 23:59:06 -0700 (PDT) Subject: [OWC] Orangemen Wrestling Commision [ handbook v. 1 ] Message-ID: <30738df8.356d0611@aol.com> =========================== Kevin Riley Productions Presents =========================== /�������\���\ /������/����| / \ \ / /_____| | |���| | \/�\/ // | |___| | / \ \ /\ _ / �����| \_______/ \___/ \___/ \_______| =========================== Orangmen Wrestling Commission =========================== Frequently Asked Questions v.1.0 =========================== ================== Table of Contents A. Foreward B. Cards & Titles C. Rules D. Roleplaying Tips E. Application F. Staff ================== ================== A. Foreward ================== Hello folks, I'm Kevin Riley, and I'm making my _last_ attempt at making a federation great. This is make-it or break-it time for me, and I really am determined to bring this federation into the bigtime. The OWC stands for Orangemen Wrestling Commision, which is a regional federation (similiar to MVW, and also a friend of that fed) that is run out of none other than Syracuse, New York. It will not be having cards in Madision Square Garden, as it will start off slow, like most independants, and hopefully work its way up. This fed will actually start off holding their cards in a local nightclub in Syracuse that we all know as the Rave, which seats about three hundred people. This federation will be run by Carson Bordon, the current OWC President. He and Riley got a huge loan from a bank in Albany, New York, and now have made their last attempt at making a major federation. The recruiting has started, and calls have been made, contracts sent. So, are you ready to join the OWC and face some of the toughest, and newest competition that you've ever seen? If so, welcome! ================== B. Cards & Titles ================== The New York State Heavyweight Championship - This is definitly the big one. The top dawg will be the man holding this title and it will definitly be a title that a lot of people will be contender for. This title shall be defended every two weeks. The Syracuse Heavyweight Championship - This is the secondary title, and we'll also be heavily competed for. This is for the people not quite ready to make it onto the world title scene yet. This title will also be defended once every two weeks. Warriors of Syracuse Wrestling - This is the card that will be held once a week, on Sunday nights. There should be around three to four matches on each card and as the fed expands, the amount of matches will as well. There will also be interviews, special appearances, and everything that you'd come to expect from a normal wrestling television show! It will take place in the Rave, a local Syracuse night club that holds up to three hundred people total. The first card will be presented to you on the twenty first of June. It will feature more matches than the normal card, and will attempt to get _every_ single wrestler in the federation, somehow participating in a match or something of some sort. It will be a sort of supercard, but will be on Sunday, and called, the Warriors of Syracuse wrestling, like the normal weekly show. ================== C. Rules ================== I will accept a maxium of two roleplays a week and one in-ring. To start the OWC off, we'll be going with the one card a week format, if we get pushed to two cards a week, then it will be two in-rings, one for each card. Please be reminded, that this plan of roleplays is tentative, and could be changed. Strats will play a huge role in setting up angles, and will also count towards your matches and my decisions as to who wins or not. Some wrestlers, specifically heels, are particulary good at drawing heat, and getting themselves known quicker than others. That will also help out your chances. This is a perfect time to repeat that phrase that we all know, quality not quantity! ================== D. Roleplaying Tips ================== * Content The content of one's roleplay is not the length the roleplay but the one or many message(s) that the roleplay gets across in that length. Content is by far the most important part of a roleplay, and must be looked upon as essential. A roleplay without any content is just jabber and jargon thrown into a file. You must always have some sort of content in your roleplays. When you begin a roleplay, you must set a goal for amount of content you want to cover during the course of your OWC roleplay. Tell yourself what, in a brief rundown, that you want to tell everybody in this roleplay of yours. If you want to tell the whole OWC that you are here to stay and to pledge your allegiance to the OWC, then remember that fact while you are writing your roleplay. Never write a roleplay with out any topics to write about. If you want to know if your roleplay has any content, then read it over and ask yourself what the message you got across was. If you can't answer that question in a breif sentance or two, then the chances are, you have no body and content to your roleplay and you need to start over and try again. The more topics you have to discuss, the better. You can never have enough content. If you have enough topics to write 5 pages or so, then so be it and go though with it. Also, you should learn to elaborate on your topics and make them into a 'big deal'. If your topic is "I want to challenge Klonis to a match" then ask yourself all the possible questions to stimulate ideas! Ask yourself why you want to wrestle Klonis. Ask yourself how good of a chance you have at defeating Klonis. Ask yourself what type of match you want to challenge Klonis to. Ask youself when you want to wrestle Klonis! The possibilities are endless, people! Cover every area and aspect you can! Sometimes when I'm going to write a roleplay, it helps me to make a breif listing of the different things I want to cover during the course of the roleplay in chronological order. I then procede to turn the breif sentances into dialouge and description and under normal circumstances I come out with a somewhat decent roleplay that has both a point and a decent amount of reasoning behind it. It makes sense, people. The main thing you have to remember, though, when writing your roleplay ... is that you must develop your character. Get a good idea of what your character's all about by re-reading your application to the OWC, and then put that all across in the roleplay. If you're wrestler is a happy goofball, then play him as a happy goofball and don't have him take matches or wins and losses too seriuosly. If you wrestler is a hard-nosed technical wrestler obsessed with winning, then have him take things seriously and be quite angry when he loses. It's all about character development and if you don't have any idea how your character should act, then it's probably time to create a new one. * Length Length certainly isn't the most important part of your roleplay, but it is something that you must seriously consider if you're a newbie. You're roleplay MUST be at least a k or two to get anything across, in my opinion. Although it is hard to find the happy medium between too long and too short, you'll get there if you follow these steps! First of all, don't wear your topic down so much that nobody is going to be interested in reading it anymore. Cover what you need but don't exasperate the subject. Nobody wants to read a roleplay that's 20k and has no plot! Once you stop having fun writing your roleplay it's probably finished. But also, you must not send in a roleplay that is 3 lines long or even a paragraph long. In the OWC, everytime you send in a roleplay that is 5 or less lines, that's pretty much an automatic loss. Make your roleplay to the point but long enough so it'll take a few minutes to read and leave the reader with a good taste in their mouth and a good idea what your character is about. Touch base with the subject quite a bit and make it long enough. * Detail The next thing that you newbies must learn is that you must always create a beginning and a conclusion in your roleplays! At the beginning of your roleplay, you must _always_ give a breif description of your wrestler's setting and describe that wrestler. A setting description tells the who, what, where, when and why of the roleplay. A beginning is also put inside action bars which are () or [] or :: :: or {}. In a beginning, you should describe what the character is wearing, what his mood is like, where his is, what he's doing there, ect. For example, read the next paragraph which is one of my less recent descriptions and was written when I was a newbie to e- wrestling. Most should be about this length and decency. Maybe better. [The screen fades in to Klonis. He's sitting in a dark living room rocking back and forth on an easychair. He's wearing his street clothes which consist of a pair of faded denimn jeans, a black tank top, and a nike headband. His black hair is slicked back and his eyes are squinted and feirce. The only illumination in the room is cast by a fireplace with the embers slowly dying out. The cameraman gives him a closup as signals to come over to him.] Also, you must remember to add a conclusion. The conclusion is more of the same except it would say things like, Klonis is fading out, ect. Be careful not to make these too drab. It can get tricky to think up the setting some times. Another thing, is that you must watch the spelling in your roleplay and try to word things as efficiently and as nicely as possible. Go through the document numerous times to make sure you did not make any foolish spelling mistakes, make sure you add two spaces after a period, you inserted commas where needed, you did not have any fragments or run-ons. Don't make yourself look foolish by saying stuff like this: (Wrtler): "im cmin to getg you cuz of what you ded to me that tyme when u did dat thing.." ================== E. Application ================== IMPORTANT NOTE: This federation is taking a new approach. We will prefer that you all bring in _new_ characters that you've never before used. That way reputations and egos will not be as much of a problem. This is not mandatory, but I prefer it. * Your Name: (optional) * Your Age: (optional) * Your E-Mail Address: * Your IRC Nickname: * Wrestler's Name: * Age: * Hometown: * Hair Color: * Eye Color: * Height: (between 5'5" - 7'0") * Weight: (between 200 - 500) * Build: (stocky, muscular, trim, ect.) * Manager or Valet's Name: (optional) * Describe Manager or Valet: (optional) * Please describe your wrestler's ring style: (anything from technician to lucha to powerful, ect.) * Please describe your wrestler's gimmick/attitude/personality as much as you can: * Please give us a little background on your wrestler (perhaps a made-up history-- we just want to get a good idea of who your character is): * Entrance Music (please use an actual song, I don't want to see "The Giant's WCW Music"): * Describe your wrestler's entrance to the ring (does he have fireworks, special lights, anything he does before he gets to the ring... if you are creating a tag team, skip this category and fill out Tag Team Entrance on the Tag Team sheet instead): * Describe your wrestler's physical appearance (please be as descriptive as possible!): * Describe your wrestler's ring attire (again, please be descriptive!): * Taunts (does your wrestler do any taunts or celebrations to his opponent during the course of the matchup? If so, mark his celebrations here!) * What is the name of your wrestler's finisher? * What is the real name of the move? * List 10 - 15 moves your wrestler performs: ================== F. Staff ================== Fictional Staff: PRESIDENT - Carson Bordon HEEL COMMENTATOR - Max Femmia FACE COMMENTATOR - Nathan Liotta RING ANNOUNCER - Michael Morgan SENIOR REFEREE - Christopher Burk TIMEKEEPER - Otto Jeckel CHEIF OF SECURITY - Robert O'Connor Staff: PRESIDENT - Kevin Riley ASSISTANT BOOKER - Rick Baptist (Also a promoter, recruiter, pay per view writer.) CARD MATCH WRITER - Paul Clark CARD MATCH WRITER - ???????? CARD MATCH WRITER - ???????? PAY PER VIEW WRITER - Rick Baptist PAY PER VIEW WRITER - Jay Ralston PAY PER VIEW WRITER - Andru Edwards PAY PER VIEW WRITER - Thomas Smith PAY PER VIEW WRITER - Adam Graves ASSISTANT - Anthony Brigano (promoter, recruiter, and will keep rankings for the wrestlers and annals, which is a list of results for every card) [NOTE: If you can help in any of these spots, _please_ tell me. To keep this federation great, I'm going to need all the help I can get, this is _very_ important.] ============================= Special thanks to Anthony Brigano for helping me make this handbook, and helping make the macros, and well, helping recruiting! ============================= OWC, Orangemen Wrestling Commission Max Femmia, Nathan Liotta, Carson Bordon and all related names, characters and their likenesses are copyright and trademark Kevin Riley Productions (KRP) 1998. ============================= From LSaiz at atos-ods.com Thu May 28 01:21:02 1998 From: LSaiz at atos-ods.com (Luis Saiz) Date: Thu, 28 May 1998 01:21:02 -0700 (PDT) Subject: The exponent of the RSA public key must be odd.?? Message-ID: <356D1CA8.C39ABB94@atos-ods.com> OS/390 Integrated Cryptographic Service Facility Application Programmer's Guide Version 2 Release 5 Publication No. SC23-3976-02 : http://ppdbooks.pok.ibm.com:80/cgi-bin/bookmgr/bookmgr.cmd/DOCNUM/SC23-3976/CCONTENTS In several parts of the document it's specified that, as a restriction: > The exponent of the RSA public key must be odd. > It's there any (unknown to me) security reason to be this way, or it�s an implementation/standard option?? From jya at pipeline.com Thu May 28 05:14:00 1998 From: jya at pipeline.com (John Young) Date: Thu, 28 May 1998 05:14:00 -0700 (PDT) Subject: Public Key Royalties Message-ID: <199805281213.IAA04745@camel14.mindspring.com> [Forward] : : : Date: Thu, 28 May 1998 03:17:16 -0400 To: John Young From: Vin McLellan Subject: Public Key Royalties Hi John: You recently posted a note from a 5/7/98 GAO report[*] on federal (Bayh-Dole Act) funding for US research universities in which documented MIT's 1996 revenues from the commercialization of public key crypto. In an accompanying note, you raised a few questions about the historical background of PKC that I thought a deserved response. The politics of crypto in the US is burdened with enough shadowy plots that it behooves those of us who try to track the history of the industry to keep a grip on simple historical fact whenever we can. I personally think the key figures involved in the discovery of PKC -- certainly Whit Diffie, Martin Hellman, Ron Rivest and Len Adleman -- have for years been exemplary role-models of personal and intellectual discipline, professional openness, and forthright political engagment (in the best sense of the word). I wouldn't like to see the public's understanding of their contributions lost beneath another layer of Byzantine conspiracy theories. You wrote: >In a recent GAO report on governmental funding of university research >there is this note: > > In fiscal year 1996, the commercialization of the public key encryption > method, which was developed under grants from the Navy and NSF, > resulted in $271,875 in royalties to MIT. > >Does this refer to RSA or PGP? Did the Navy underwrite RSA's PK work? >If so does the USG have a secret stake in PGP, Network Associates >and RSA? > >More: did the Navy guide PK researchers based on the secret UK PK work >before Diffie-Hellman? Quick answers to your first questions: (1) RSA. RSA Data Security Inc.(RSADSI), a company started by the three inventors of the RSA cryptosystem was given a contract by MIT to commercialize the RSA cryptosystem. Under the terms of that contract, RSADSI pays royalties to MIT, which still owns the RSA patent. (2) Nope. The Office of Naval Research (ONI) did staff the "contracting office" responsible for administering DARPA funding for the MIT labs where Rivest, Shamir, and Adleman did their initial work -- but neither the Navy, nor DARPA, nor the NSA, nor the CIA, nor the Feebees supported the subsequent development of public key cryptography at RSADSI (the company started by the three inventors which was subsequently given an exclusive contract by MIT to commercialize the RSA algorithm.) (3) No secret stake in RSADSI -- so say the sworn documents filed with the SEC before the 1996 merger of RSADSI and SDTI. PGP was not developed at MIT. PGP has never paid royalties to MIT. I don't actually know if there is, or ever was, any relationship or federal "stake" in PGP Inc. or Network Associates Inc., but I doubt it. (I also think your suggestion, without evidence, is a fairly gratuitous slander against all these firms -- given the historic interest of US government agencies in weakening non-government crypto and/or forcing independent cryptographic vendors to corrupt their designs with backdoors to allow surreptitous government access to encrypted messages and files.) As you may recall, I do a lot of consulting for Security Dynamics (SDTI), which purchased RSADSI in 1996. I sent your questions over to Ron Rivest, and he asked me to pass along his response: >The work on RSA at MIT was supported by NSF grant MCS76-14294 and ONR >(Office of Naval Research) grant N00014-67-A-0204-0063. (See the >footnote on the original RSA paper.) I note that the ONR is the >contracting office for a DARPA grant here; the "Navy" as such was not >involved. > >(The grants listed above did not even specify cryptography in their >proposals, and it was more of a courtesy than anything else to >acknowledge their support on the RSA paper, since they were supporting >other research in algorithms and such.) > >As a consequence of this support, the U.S. government does not have to >pay royalties on the "RSA patent" (U.S. patent 4,405,829.) This is a >standard arrangement for government-supported research; the government >doesn't want to have to pay twice for the work. > >There is no "secret stake" by the government in RSA. The royalty-free >license of the patent is their only involvement. > >There was no contact, influence, or involvement from any government >source regarding our development of RSA. Assuming (correctly, I >believe) that the Diffe-Hellman paper (New Directions in Cryptography) >was developed independently of any similar developments in the U.K., >then the academic development of the concept of public-key, and our >consequent development of RSA, were totally independent of whatever >developments happened earlier in the U.K. > >Indeed, given the reaction from the government that we've seen ever >since, trying to control and/or suppress public-key technology, it is >extremely bizarre to conjecture that the government in any way >encouraged it early on or gave technical advice based on work in the U.K. I suggest anyone interested in the work on "dual key" cryptography by British government cryptographers in the early 1970s will want to read Jame Ellis' fascinating paper, published last December by the British government, at: http://www.cesg.gov.uk/ellisint.htm There was also a brief but helpful NYT article by Peter Wayner, available at: http://www.nytimes.com/library/cyber/week/122497encrypt.html There have doubtless been numerous breakthroughs and great inventions in the shadowy world of government cryptography. Unfortunately, the hostility of this (and most governments) have shown toward allowing such privacy-enabling technologies to fall into the hands of mere citizens will probably mean that we will have to wait for those inventions to be rediscovered and thus made available to the free world by others. I think we were all lucky that public key crypto -- the necessary foundation for on-line electronic commerce, which in turn is seen by many as potentially the economic engine for 21st Century -- was discovered, or rediscovered, by mere citizens who looked first to its personal and commercial implications. I don't think there was a chance in hell that GCHQ, or the NSA (which also claims to have separately discovered PKC ten years before Hellman and Diffie conceived of it) could have recognized its personal or commercial potential... or would have allowed it to come into the widespread use we see today if, perchance, they _had_ foreseen that potential. Please feel free to post this. Thanks again for all your work collecting the treasure trove of documents you have at jya.com. It's an invaluable resource. Surete, _Vin ----- "Cryptography is like literacy in the Dark Ages. Infinitely potent, for good and ill... yet basically an intellectual construct, an idea, which by its nature will resist efforts to restrict it to bureaucrats and others who deem only themselves worthy of such Privilege." _ A thinking man's Creed for Crypto/ vbm. * Vin McLellan + The Privacy Guild + * 53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548 [End Forward] * See report: http://jya.com/rced-98-126.txt (184K) From jya at pipeline.com Thu May 28 06:27:32 1998 From: jya at pipeline.com (John Young) Date: Thu, 28 May 1998 06:27:32 -0700 (PDT) Subject: USG to Sue Other Wintel Message-ID: <199805281327.JAA06789@camel14.mindspring.com> New York Times reports today that the FTC is shortly to file a major anti-trust suit against Intel, "charging the company with abusing its position as the dominant manufacturer of mircoprocessor chips." http://www.nytimes.com From sergon at alice.dp.ua Wed May 27 15:55:49 1998 From: sergon at alice.dp.ua (Sergey Bobok) Date: Thu, 28 May 1998 06:55:49 +0800 Subject: No Subject Message-ID: <199805272108.OAA21191@cygint.cygnus.com> From Doug.Beattie at GSC.GTE.Com Thu May 28 06:59:56 1998 From: Doug.Beattie at GSC.GTE.Com (Beattie, Doug) Date: Thu, 28 May 1998 06:59:56 -0700 (PDT) Subject: The exponent of the RSA public key must be odd.?? Message-ID: <8D3B7E46799CCF118D9D00805FE28A1E03E6AB09@ndhm06.ndhm.gtegsc.com> The exponent must be relatively prime to (p-1)(q-1) where p and q are prime numbers. Doug On Thursday, May 28, 1998 4:14 AM, Luis Saiz [SMTP:LSaiz at atos-ods.com] wrote: > OS/390 Integrated Cryptographic Service Facility Application > Programmer's Guide Version 2 Release 5 Publication No. SC23-3976-02 > : > http://ppdbooks.pok.ibm.com:80/cgi- > bin/bookmgr/bookmgr.cmd/DOCNUM/SC23-3976/CCONTENTS > > > > In several parts of the document it's specified that, as a > restriction: > > > > The exponent of the RSA public key must be odd. > > > It's there any (unknown to me) security reason to be this way, or > it�s > an implementation/standard option?? > > From sunder at brainlink.com Thu May 28 07:41:57 1998 From: sunder at brainlink.com (Sunder) Date: Thu, 28 May 1998 07:41:57 -0700 (PDT) Subject: The exponent of the RSA public key must be odd.?? In-Reply-To: <356D1CA8.C39ABB94@atos-ods.com> Message-ID: <356D7682.D989D46B@brainlink.com> How many prime numbers do you know of that are even? Luis Saiz wrote: > > OS/390 Integrated Cryptographic Service Facility Application > Programmer's Guide Version 2 Release 5 Publication No. SC23-3976-02 : > http://ppdbooks.pok.ibm.com:80/cgi-bin/bookmgr/bookmgr.cmd/DOCNUM/SC23-3976/CCONTENTS > > In several parts of the document it's specified that, as a restriction: > > > The exponent of the RSA public key must be odd. > > > It's there any (unknown to me) security reason to be this way, or it�s > an implementation/standard option?? -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From LSaiz at atos-ods.com Thu May 28 08:55:03 1998 From: LSaiz at atos-ods.com (Luis Saiz) Date: Thu, 28 May 1998 08:55:03 -0700 (PDT) Subject: The exponent of the RSA public key must be odd.?? In-Reply-To: <356D1CA8.C39ABB94@atos-ods.com> Message-ID: <356D88D7.1D480241@atos-ods.com> Sunder wrote: > How many prime numbers do you know of that are even? > One: 2 ;-) OK, I've never realized that e and d must both be co-prime with respect to (p-1)(q-1), only that ed=1 mod((p-1)(q-1)), and I didn't saw the implication. Sorry for this stupid question, next time I'll do more mathematics before. > Luis Saiz wrote: > > > > OS/390 Integrated Cryptographic Service Facility Application > > Programmer's Guide Version 2 Release 5 Publication No. SC23-3976-02 : > > http://ppdbooks.pok.ibm.com:80/cgi-bin/bookmgr/bookmgr.cmd/DOCNUM/SC23-3976/CCONTENTS > > > > In several parts of the document it's specified that, as a restriction: > > > > > The exponent of the RSA public key must be odd. > > > > > It's there any (unknown to me) security reason to be this way, or it�s > > an implementation/standard option?? > > -- > > =====================================Kaos=Keraunos=Kybernetos============== > .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. > ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ > <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ > ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. > .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... > ======================= http://www.sundernet.com ========================== From caj at math.niu.edu Thu May 28 12:40:04 1998 From: caj at math.niu.edu (Xcott Craver) Date: Thu, 28 May 1998 12:40:04 -0700 (PDT) Subject: The exponent of the RSA public key must be odd.?? In-Reply-To: <356D88D7.1D480241@atos-ods.com> Message-ID: On Thu, 28 May 1998, Luis Saiz wrote: > OK, I've never realized that e and d must both be co-prime with respect to (p-1)(q-1), > only that ed=1 mod((p-1)(q-1)), and I didn't saw the implication. Actually, that the exponent must be odd is much more immediate: If ed = 1 mod(p-1)(q-1), then ed = 1 + multiple*(p-1)(q-1) = 1 + multiple*(even #) = 1 + even # = odd #. If either e or d were even, this couldn't be true. -Xcott [This same argument, by the way, is how you prove that e and d must both be co-prime to phi(n). Just let C be any divisor of phi(n), and replace "even" with "divisible by C" and "odd" with "not divisible by C"] From billp at nmol.com Thu May 28 12:41:06 1998 From: billp at nmol.com (bill payne) Date: Thu, 28 May 1998 12:41:06 -0700 (PDT) Subject: Payne v. NSA: Plaintiff's Motion and Objection Message-ID: <356DBB9A.44E8@nmol.com> John Young Just saw whp052898.htm Payne v. NSA: Plaintiff's Motion and Objection May 28, 1998 at http://www.jya.com/crypto.htm THANK YOU SO MUCH. And for http://www.mckennacuneo.com/practice/Quitam/QU02519960901.html too! We need visibility to get this HORRIBLE MESS SETTLED. PEACEFULLY! There are other ways of settling matters. Aggrieved Shiite Muslims have a fair record at other means of settlement http://www.netlink.co.uk/users/impact/namir/martyrs.htm#allvictims I want to get this settled and revise my book for the 80c52. http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 and maybe do something more with shift registers too http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs= Best bill From jya at pipeline.com Thu May 28 12:51:37 1998 From: jya at pipeline.com (John Young) Date: Thu, 28 May 1998 12:51:37 -0700 (PDT) Subject: Asymmetric Warfare Message-ID: <199805281951.PAA25901@camel14.mindspring.com> Date: Wed, 27 May 1998 15:34:10 -0500 From: "90. USAFnews" 980734. Special operations commander outlines future threats by Capt. John Paradis 16th Special Operations Wing Public Affairs HURLBURT FIELD, Fla. (AFNS) -- More Chechnyas. If a military strategist needed to look at a good model for the typical future conflict, the war torn republic of Chechnya comes to mind, said Gen. Peter J. Schoomaker, U.S. Special Operations Command commander in chief. Speaking recently to about 2,000 Hurlburt Field troops at the 55th Aircraft Maintenance Unit hangar, Schoomaker said the only certainty in the future of warfare is that security challenges will be more ambiguous and will follow less traditional paths. Looking at Chechnya as an example of future conflict, confrontation will likely differ from the more conventional and familiar "total war" by the inclination of future adversaries to use "psychological terror" and the influence of international media, the Internet and even cell phones to employ open brutality as an information warfare tactic. Russian President Boris Yeltsin, determined to crush the secessionist drive of the tiny, mainly Muslim southern republic, ordered about 40,000 troops into Chechnya in December 1994. What was planned as a quick campaign turned into a long and costly war, in which the outnumbered rebels time and again dealt heavy blows to a demoralized Russian military. It's such "asymmetric" opponents like separatists, rebel groups, insurgents and terrorists that U.S. special operations forces will need to prepare for -- enemies who won't attack U.S. strategic strengths, but will instead target U.S. vulnerabilities by executing unorthodox measures to gain success, Schoomaker said. "That's the future. More Chechnyas," the general said. "We are going to see more conflict of this nature because it's a much different world we're facing." From glowing at americanteleport.com Thu May 28 13:25:39 1998 From: glowing at americanteleport.com (glowing at americanteleport.com) Date: Thu, 28 May 1998 13:25:39 -0700 (PDT) Subject: HOW DO YOU HANDLE AN ERRANT WIFE? Message-ID: <00caa5558121c58MAIL@americanteleport.com> .................................................................................................................... Your address was gathered from a detailed search. This is not spam and we are sorry for any inconveinence. If you wish to be removed from this advertiser's future mailings, please reply with the subject "Remove" and our software will automatically block you from their future mailings. .................................................................................................................... SPANKING, OTK, PADDLING, SWITCHING ?? HOW DO YOU HANDLE AN ERRANT WIFE, GIRLFRIEND, DAUGHTER, OTHER (OK MOTHER). WANT TO DISPENSE TRUE DISCIPLINE OR JUST HAVE SOME FUN? WATCH A VIDEOTAPE OR REALLY USE A TOY OF YOUR CHOICE? PUT SOMEONE IN THEIR PLACE...FOR GOOD? WE HAVE THE TOYS, ( http://www.glowingresults.com/glowingresults/paddles/index.htm ) THE TOOLS, ( http://www.glowingresults.com/glowingresults/restraints/index.htm ) AND WE CAN SHOW YOU HOW IT'S DONE ( http://www.glowingresults.com/glowingresults/videos/index.htm) ... REAL SPANKING/PADDLING ACTION VIDEOTAPES NO 'FLUFF....THE REAL STUFF !! ___________________________________________________________________ This is a sample of just a story !! Our Videotapes Show Real Punishment of Actual Adults !! WARNING!! This story contains details of the real punishment of an adult. M/F, O.T.K. , SPANKING and PADDLING, NUDITY, and KINKY SEX. If you are offended by this type of material please do not open this object!! If you are not then please enjoy it !! We try to please !! http://www.glowing-results.com ___________________________________________________________________ "So, what are you gonna do...spank me?" The poor salesgirl blushed a deep red as those words came flying out of Lindas' mouth. I looked at her for a moment then said, "That's exactly what you need young lady, something to adjust this attitude of yours!" Linda flushed slightly at this announcement (she always does right before) gave me a nasty look and began to turn away, I grabbed the sleve of her coat to stop her. As I pulled her around to face me the 'look' became her pout, there was little resistance as I propelled her towards the door of the shop. "Keep that gift there," I said to the clerk, "we'll be back in a few minutes." We had talked about a semi-public spanking for her, when a few others knew what would happen to her. There was also the prospect of an accidental audience. 7 PM, the parking lot was dimly lit, there were a lot of cars and I had parked close to the center of the lot. It was a chilly night but about to 'warm-up' for Linda! Her heels made a sharp 'click' 'click' as we walked across the cold pavement. "Shit...I have to go back in there and face her...don't I?" "Yes, that's the idea, tears, sore bottom and all!" "Oh shit...does it have to be too...hard?" "You know the idea, red face, red ass, as hard as I can spank in the back seat." "Just your hand...only a spanking...nothing else?" "No, not my hand at all. I brought that little clear paddle that we bought from 'Glowing Results' just for tonight, I wanted to make sure that there were tears. Remember how much that stings?" We arrived at the car, I directed her to the passengers side rear door. After a fast look around at the other vehicles I turned Linda to face me, shook my finger in front of her nose and said, "Get in the back seat young lady, you've earned this one!" The pout was still there as she turned and entered the back door, I closed it firmly. Sliding in on the drivers side, I turned to face Linda. Mother was about to get a REAL spanking!! ____________________________________________________________________ From billp at nmol.com Thu May 28 14:09:20 1998 From: billp at nmol.com (bill payne) Date: Thu, 28 May 1998 14:09:20 -0700 (PDT) Subject: Mrs [Delicate Touch] Hanks Message-ID: <356DD1B6.771F@nmol.com> Thursday 5/28/98 2:48 PM John Young J Orlin Grabbe On return from my walk this afternoon, I spoke with Mrs [Delicate Touch] Hanks http://207.33.92.15/art/va/artworkSearch.html$search http://www.eslawrence.com/Hankspage.htm http://www.artcorner.com/ http://www.sea-art.com/hadleyhouse/hanks/index.cfm http://www.eslawrence.com/hankprint.htm http://www.birchgrove.com/artists/steve%20hanks.htm http://www.artsource1.com/hanks.html http://www.nice-things.com/hanks.html who lives just down the street from us. I asked her if the large edition being built on top of the previous single-story home was going to be a studio. She responded in American. �Yah� Occasionally I see some REALLY GOOD LOOKING women outside Hanks� home. We REALLY should get this UNFORTUNATE MATTER settled before it gets WORSE. And it looks like it is getting WORSE. http://www.jya.com/whp052898.htm Later bill From one4evil at juno.com Thu May 28 16:10:38 1998 From: one4evil at juno.com (Nalus Optic) Date: Thu, 28 May 1998 16:10:38 -0700 (PDT) Subject: Lack of net access blows: Message-ID: <19980528.071047.4222.8.one4evil@juno.com> Cyberpunks, Que pasa? My name is D and I am new to the list...I will most likely just be lurking for a while, till I get a visit from the Duel Pentium II 266, 128megs of RAM, running Linux on one PII and Win98 on the Other Fariy...She should be along by the end of the summer... Anywhoo, the point of the subject is that at this point and time I don't have net access so I was hopeing someone out there would send me the FAQ that is talked of in the welcome message. It can be found at: anonymous ftp to rtfm.mit.edu:pub/usenet-by-group/sci.crypt At least I think that is where it is at... I thank who ever is nice enough to send it to me...Also, maybe post a message to me as soon as you send it...That way I don't end up with like all of you sending it and Juno kicking my ass again for flooding there box. TNX, D. _____________________________________________________________________ You don't need to buy Internet access to use free Internet e-mail. Get completely free e-mail from Juno at http://www.juno.com Or call Juno at (800) 654-JUNO [654-5866] From 62627874 at 19214.com Thu May 28 17:39:35 1998 From: 62627874 at 19214.com (62627874 at 19214.com) Date: Thu, 28 May 1998 17:39:35 -0700 (PDT) Subject: No Subject Message-ID: <199702170025.GAA08056@nowhere.com> Phonenumbers all over the world www.PhoneNumbers.net From tcmay at got.net Thu May 28 18:01:02 1998 From: tcmay at got.net (Tim May) Date: Thu, 28 May 1998 18:01:02 -0700 (PDT) Subject: Asymmetric Warfare In-Reply-To: <199805281951.PAA25901@camel14.mindspring.com> Message-ID: At 12:49 PM -0700 5/28/98, John Young wrote: >Date: Wed, 27 May 1998 15:34:10 -0500 >From: "90. USAFnews" > >980734. Special operations commander outlines future threats >by Capt. John Paradis >16th Special Operations Wing Public Affairs > >HURLBURT FIELD, Fla. (AFNS) -- More Chechnyas. If a military strategist >needed to look at a good model for the typical future conflict, the war >torn republic of Chechnya comes to mind, said Gen. Peter J. Schoomaker, >U.S. Special Operations Command commander in chief. .... Yes, Chechnya is the model for the U.S. to follow: the Central Authority attempting to crush a local rebellion by shelling cities, razing farms, shooting suspected rebels without trials, and blockading entire provinces to starve them into submission. As the United States increasingly moves toward police state status and chooses smaller nations to pick on (Panama, Somalia, Haiti, etc.), the Armed Forces will come to resemble a domestic army. Something the Founders were adamantly opposed to (between "no standing army" (ha!), Washington's warning about avoiding foreign wars, and Posse Comitatus, which forbids a domestic role for the Army). >It's such "asymmetric" opponents like separatists, rebel groups, >insurgents and terrorists that U.S. special operations forces will need >to prepare for -- enemies who won't attack U.S. strategic strengths, but >will instead target U.S. vulnerabilities by executing unorthodox >measures to gain success, Schoomaker said. > Sounds good to me, attacking the Central Authority. We need to launch our own crippling attacks on the U.S. military infrastructure--it has become a cancer on the nation. Hacking their computers and misdirecting Galaxy 4 were only the opening shots in this new war. Crypto is our strongest weapon. They know it. And they want it crippled. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From caj at math.niu.edu Thu May 28 18:16:15 1998 From: caj at math.niu.edu (Xcott Craver) Date: Thu, 28 May 1998 18:16:15 -0700 (PDT) Subject: Lack of net access blows: In-Reply-To: <19980528.071047.4222.8.one4evil@juno.com> Message-ID: On Thu, 28 May 1998, Nalus Optic wrote: > Cyberpunks, > > Que pasa? My name is D and I am new to the list...I will most > likely just be lurking for a while, till I get a visit from the Duel > Pentium II 266, 128megs of RAM, running Linux on one PII and Win98 on the > Other Fariy...She should be along by the end of the summer... Hey, if you're a BeOS developer (and you can become one for free,) United Micro will give you a discount on a dual PII-266 system w/ 128 Megs. I have just such a beast, and it ain't bad. SMP rocks. Haven't tried to put Windows on it, though. > Anywhoo, the point of the subject is that at this point and time > I don't have net access so I was hopeing someone out there would send me > the FAQ that is talked of in the welcome message. It can be found at: > anonymous ftp to rtfm.mit.edu:pub/usenet-by-group/sci.crypt Well sir, there's about 4 FAQs there, one of which is in 10 parts. What do you want? There's the Cryptography FAQ (the big one), the snake-oil FAQ, the RSA-Cryptography-today FAQ, and the SSL talk list FAQ. The 10 parts of the big one: Overview Public-key Cryptography Net Etiquette Digital Signatures Basic Cryptology Technical Miscellany Mathematical Cryptology Other Miscellany Product Ciphers References They range in size from 1-20 k, and ~100 k for the whole thing. -Xcott ,oooooooo8 o ooooo at math.niu.edu -- http://www.math.niu.edu/~caj/ o888' `88 ,888. 888 888 ,8'`88. 888 "In Geometry, there is no royal hyperspace 888o. ,oo ,8oooo88. 888 wormhole." --Buck Euclid in the 25th century `888oooo88 o88o o888o 888 ____________________8o888'_________________________________________________ From cons0005 at algonquinc.on.ca Thu May 28 19:27:54 1998 From: cons0005 at algonquinc.on.ca (cons0005 at algonquinc.on.ca) Date: Thu, 28 May 1998 19:27:54 -0700 (PDT) Subject: D.A.R.E. and a Bullpup In-Reply-To: <199805211707.NAA14117@panix2.panix.com> Message-ID: <199805290226.WAA15318@algnet.algonquinc.on.ca> Date sent: Thu, 21 May 1998 13:56:38 -0700 To: cypherpunks at cyberpass.net From: Tim May Subject: D.A.R.E. and a Bullpup Send reply to: Tim May > I often wear a t-shirt around town which reads: > > > D. A. R. E. > > I turned in my parents > and all I got was this > lousy t-shirt > I think you should get one: If your a nigger, I'm Aryan.  http://www.geocities.com/CapitolHill/Senate/8018/ http://wabakimi.carleton.ca/~nmarion/ http://www.engsoc.carleton.ca/~jproud/yash/ (For when you're bored)-PGPd Mail Preferred From nobody at nsm.htp.org Thu May 28 20:08:12 1998 From: nobody at nsm.htp.org (nobody at nsm.htp.org) Date: Thu, 28 May 1998 20:08:12 -0700 (PDT) Subject: Timmy Mc Veigh Message-ID: <19980529030659.16949.qmail@nsm.htp.org> Text of essay said written by Timothy McVeigh - something to think about. May 28, 1998 Web posted at: 10:10 p.m. EDT (0210 GMT) (AP) -- The June 1998 issue of Media Bypass Magazine includes this essay it says was written by Timothy McVeigh: The administration has said that Iraq has no right to stockpile chemical or biological weapons ("weapons of mass destruction") -- mainly because they have used them in the past. Well, if that's the standard by which these matters are decided, then the U.S. is the nation that set the precedent. The U.S. has stockpiled these same weapons (and more) for over 40 years. The U.S. claims that this was done for deterrent purposes during its "Cold War" with the Soviet Union. Why, then, is it invalid for Iraq to claim the same reason (deterrence) -- with respect to Iraq's (real) war with, and the continued threat of, its neighbor Iran? The administration claims that Iraq has used these weapons in the past. We've all seen the pictures that show a Kurdish woman and child frozen in death from the use of chemical weapons. But, have you ever seen these photos juxtaposed next to pictures from Hiroshima or Nagasaki? I suggest that one study the histories of World War I, World War II and other "regional conflicts" that the U.S. has been involved in to familiarize themselves with the use of "weapons of mass destruction." Remember Dresden? How about Hanoi? Tripoli? Baghdad? What about the big ones -- Hiroshima and Nagasaki? (At these two locations, the U.S. killed at least 150,000 non-combatants -- mostly women and children -- in the blink of an eye. Thousands more took hours, days, weeks, or months to die.) If Saddam is such a demon, and people are calling for war crimes charges against him and his nation, whey do we not hear the same cry for blood directed at those responsible for even greater amounts of "mass destruction" -- like those responsible and involved in dropping bombs on the cities mentioned above? The truth is, the U.S. has set the standard when it comes to the stockpiling and use of weapons of mass destruction. Hypocrisy when it comes to the death of children? In Oklahoma City, it was family convenience that explained the presence of a day-care center placed between street level and the law enforcement agencies which occupied the upper floors of the building. Yet when discussion shifts to Iraq, any day-care center in a government building instantly becomes "a shield." Think about that. (Actually, there is a difference here. The administration has admitted to knowledge of the presence of children in or near Iraqi government buildings, yet they still proceed with their plans to bomb -- saying that they cannot be held responsible if children die. There is no such proof, however, that knowledge of the presence of children existed in relation to the Oklahoma City bombing.) When considering morality and "mens rea" (criminal intent) in light of these facts, I ask: Who are the true barbarians? Yet another example of this nation's blatant hypocrisy is revealed by the polls which suggest that this nation is greatly in favor of bombing Iraq. In this instance, the people of the nation approve of bombing government employees because they are "guilty by association" -- they are Iraqi government employees. In regard to the bombing in Oklahoma City, however, such logic is condemned. What motivates these seemingly contradictory positions? Do people think that government workers in Iraq are any less human than those in Oklahoma City? Do they think that Iraqis don't have families who will grieve and mourn the loss of their loved ones? In this context, do people come to believe that the killing of foreigners is somehow different than the killing of Americans? I recently read of an arrest in New York City where possession of a mere pipe bomb was charged as possession of a "weapon of mass destruction." If a two-pound pipe bomb is a "weapon of mass destruction," then what do people think that a 2,000-pound steel-encased bomb is? I find it ironic, to say the least, that one of the aircraft that could be used to drop such a bomb on Iraq is dubbed "The Spirit of Oklahoma." This leads me to a final, and unspoken, moral hypocrisy regarding the use of weapons of mass destruction. When a U.S. plane or cruise missile is used to bring destruction to a foreign people, this nation rewards the bombers with applause and praise. What a convenient way to absolve these killers of any responsibility for the destruction they leave in their wake. Unfortunately, the morality of killing is not so superficial. The truth is, the use of a truck, a plane, or a missile for the delivery of a weapon of mass destruction does not alter the nature of the act itself. These are weapons of mass destruction -- and the method of delivery matters little to those on the receiving end of such weapons. Whether you wish to admit it or not, when you approve, morally, of the bombing of foreign targets by the U.S. military, you are approving of acts morally equivalent to the bombing in Oklahoma City. The only difference is that this nation is not going to see any foreign casualties appear on the cover of Newsweek magazine. It seems ironic and hypocritical that an act as viciously condemned in Oklahoma City is now a "justified" response to a problem in a foreign land. Then again, the history of United States policy over the last century, when examined fully, tends to exemplify hypocrisy. When considering the use of weapons of mass destruction against Iraq as a means to an end, it would be wise to reflect on the words of the late U.S. Supreme Court Justice Louis Brandeis. His words are as true in the context of Olmstead as they are when they stand alone: "Our government is the potent, the omnipresent teacher. For good or ill, it teaches the whole people by its example." Sincerely, Timothy J. McVeigh From die at pig.die.com Thu May 28 20:10:26 1998 From: die at pig.die.com (Dave Emery) Date: Thu, 28 May 1998 20:10:26 -0700 (PDT) Subject: Satellite processing (was Re: DRUDGE-REPORT-EXCLUSIVE pablum) In-Reply-To: <7iF8Pe1w165w@decode.com> Message-ID: <19980528231016.A16286@die.com> On Thu, May 28, 1998 at 06:22:16PM -0700, Tim May wrote: > > ROMs currently have no sensitivity to cosmic rays or alpha particles from > natural radioactivity in the environment, and are not expected to. Single > event upsets typically happen with cross-coupled static RAM cells or with > dynamic RAMs. _Some_ errors happen in logic circuits, including > microprocessors, but not many. > > No doubt some examples of reported errors in ROM circuits can be found, but > I suspect the errors are either in the decode logic or elsewhere, and > certainly not in the mask-programmable bits or the blown fuse sections. > Lots of ROM types exist, so I don't want to try to list all major types > here. > > Some EAROMs (Electrically Alterable) or EEPROMs (Electrically Erasable) are > sensitive to some radiation events, but not nearly as sensitive as RAM > chips are. The IEEE Transactions on Nuclear Science, the December issue of > every year, is devoted to reporting on actual sensitivity levels and > physical mechanisms. I certainly defer to your expertise, as I have no particular knowlage of radiation effects aside from reading an occasional technical paper or article touching on the subject tangentially. What I should have said in any case is damage to Flash EPROM or other electrically programmed EPROM, as several people have pointed out that fuse and mask programmed ROMs are not at all subject to single event radiation damage. I suppose that ROMs on board a satellite could easily afford to be masked types, but of course there still are sound engineering reasons to keep ROM'd code as minimal, simple and straighforward as possible, especially when it cannot ever be changed and hundreds of millions of dollars of satellite depends on it. -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From snow at smoke.suba.com Thu May 28 21:41:40 1998 From: snow at smoke.suba.com (snow) Date: Thu, 28 May 1998 21:41:40 -0700 (PDT) Subject: Holy QPRNF... In-Reply-To: <199805050043.TAA22628@baker.math.niu.edu> Message-ID: <199805290335.WAA01861@smoke.suba.com> > http://biz.yahoo.com/prnews/980504/ca_live_pi_1.html > Summary: Digimarc and Live Picture, Inc., team up to offer watermarking > services. > || ``Until very recently, the creative community was extremely skeptical of > || licensing and marketing their work over the Web, which they viewed as an > || absolute free-for-all,'' said Doug Dawirs, director of online services at > || The Workbook. ``Now these same people and companies are jumping in with > || both feet.'' > I hope no content creators mistakenly think that this is electronic > content protection (possibly, one can say an aid to detect _unintentional_ > illicit use, but not intentional theft), or else there will be a > free-for-all of a legal kind a little further down the road. I work for a company who displays much of their work on the Web, and we are often sited by Digimarc as a "customer". We (AFAICT) stoped bothering with their product (probably an older version) simply because it didn't work. I can take any image where the watermark IS NOT visible, and make it so that your scanning software doesn't work, yet most people wouldn't notice a bloody thing. Suckerware. From StanSqncrs at aol.com Thu May 28 22:10:22 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Thu, 28 May 1998 22:10:22 -0700 (PDT) Subject: Timmy Mc Veigh Message-ID: <97a8ae6d.356e42ee@aol.com> In a message dated 5/28/98 10:41:37 PM Central Daylight Time, nobody at nsm.htp.org quotes: << ... It seems ironic and hypocritical that an act as viciously condemned in Oklahoma City is now a "justified" response to a problem in a foreign land. Then again, the history of United States policy over the last century, when examined fully, tends to exemplify hypocrisy. ... >> I tell you folks, that's some of the best written propaganda I've ever seen. Here's it's only faults that I see. Tim McVeigh is now taking the position that the OKCity bombing was a bad thing. I don't ever recall him ever taking that position before. And, while his post recognizes the old saying '2 wrongs don't make a right', the post still goes against that saying (thanks to his history.) But he's definitely got some valid points as to how it relates to the USA's use of weapons of mass destruction and Iraq, it's an excellent argument for that. Stan From StanSqncrs at aol.com Fri May 29 01:10:32 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Fri, 29 May 1998 01:10:32 -0700 (PDT) Subject: A Plug Message-ID: <82a314d7.356e6c59@aol.com> Hey look, Nobody's expressed interest in joining FreeGroup, but he can't come in anomonously because of the 'machine' involved with my list. So, the only way he can do it (and remain anonomous) is by coming in under a different alias (since the other one's been uncovered, IMHO.) But, if he simply applies now under a different alias, he knows that I know it's him, so I need to give him cover, so I'm going to give a little FreeGroup plug to all the Cypherpunks, so I won't really know it's him that's applying, when he does. In reality, other Cypherpunks are also very welcome to join. So Cypherpunks, here's something you (almost) missed by not being in FreeGroup, posts that show that the right-wing stole the anti-FBI/Government sentiment card from guess who, us Liberals! We never took it as far as they did, though. We aren't that stupid :-) And if somehow my memory fails and I already posted this (and any others) here, let me apologize in advance (though somehow, I doubt anyone will mind (except perhaps any FBI agents that might be viewing ;-) ) But before we get to the FBI (a favorite on this list, from my obvservations), first we talk about other government agencies - ====== Subj: The Arch Angel Date: 5/27/98 To: [FreeGroup] Bet some of you newcomers wonder where the right-wing got the idea that being anti-government might be a popular idea. I'll tell you where. They got it from us liberals ... Around here (thanks to Fred), this guy is known as the 'Arch Angel Arlo'. He was my favorite political composer of the era - ====== Alices Resturant Alice's Restaurant Massacree - by Arlo Guthrie This song is called Alice's Restaurant, it's a - bout Alice - and the restaurant But Alice's Restaurant is not the name of the restaurant that's - just the name of the song That's why I call the song Alice's Restaurant You can get anything you want, at Alice's Restaurant You can get anything you want - at Alice's Restaurant Walk right in it's around the back - just a half a mile from the railroad track You can get anything you want, at Alice's Restaurant Now it all started 2 Thanksgivings ago thats on 2 years ago on Thanksgiving when my friend and I went up to visit Alice at the Restaurant, but - Alice doesn't live in the Restaurant, she - lives in the church nearby the restaurant in the bell tower, with her husband Ray and, Fasha the dog and living in the bell tower like that they got a lot of room downstairs where the pews used to've been, having all that room, seein' how they took out all the pews, they decided that they didn't have to take out their garbage for a long time. We got up there, we found all the garbage in there and we decided it'd be a - friendly gesture for us to take the garbage down to the city dump. So we took the half-a-ton of garbage put it in the back of a red VW microbus took shovels and rakes and impliments of destruction and - headed on toward the city dump. Well we got there there's a big sign and a chain across the dump saying "closed on Thanksgiving" and, we had never heard of a dump closed on Thanksgiving before and with - tears in our eyes we drove off into the sunset looking for - another place to put the garbage. We didn't find one - 'Till we came to a side road and off the side of the side road was another 15 foot cliff and, at the bottom of the cliff was another pile of garbage and, we decided that 1 big pile was better than 2 little piles and rather than bring that one up, we decided to throw ours down. That's what we did. Drove back to the church had a Thanksgiving dinner that couldn't be beat went to sleep and didn't get up until the next morning, when we got a phone call from Officer Obie. Said "Kid - we found your name on an envelope at the bottom of a half-a-ton of garbage and - just wanted to know if you had any information about it" and I said "yes sir Officer Obie, I cannot tell a lie - I put that envelope under that garbage." After speaking to Obie for about 45 minutes on the telephone we finally arrived at the truth of the matter and said that we had to go down and pick up the garbage and, also had to go down and speak to him at the Police Officer station so we got in the red, VW microbus with the shovels and rakes and implements of destruction and headed on towards the Police Officer station. Now friends, there was only 1 of 2 things Obie could've done at the Police station, and the 1st was that he could've givin us a medal for being so brave and honest on the telephone, which wasn't very likely, and we didn't expect it, and the other thing was, that he could've bawled us out and told us never to be seen driving garbage around the vicinity again. Which is what we expected, but when we got to the Police Officer station, there was a 3rd possibility that we hadn't even counted upon, and we was both immediatly arrested. Handcuffed and I said Obie "I - don't think I can pick up the garbage with these handcuffs on." Said "Shut up kid, get in the back of the patrol car" and that's what we did, sat in the back of the patrol car and drove to the quote "scene-of-the-crime" unquote. I want to tell you about the town of Stockbridge, Massachusetts where this happened here, they got 3 stop signs - 2 police officers and 1 police car, but when we got to the "scene-of-the-crime", there was 5 police officers and 3 police cars - being the biggest crime of the last 50 years and everybody wanted to get in the newspaper story about it. And they was using up all kinds of cop equipment that they had hanging around the Police Officer station. They was taking plaster tire track footprints dog smellin' prints, and they took twenty-seven 8 by 10 color glossy photographs, with circles and arrows and a paragraph on the back of each one explaining what each one was to be used as evidence against us. Took pictures of the approach, the getaway, the northwest corner, the southwest corner, and that's not to mention the ariel photography. After the ordeal, we went back to the jail Obie said he was gonna put us in the cell, said "Kid, I'm gonna put you in the cell, I want your wallet and your belt." I said "Obie, I can understand you wanting my wallet so I don't have any money to spend in the cell but what do you want my belt for?" Said "Kid - we don't want any hangins." Said "Obie, did you think I was gonna hang myself for littering?" Obie said he was making sure, and friends, Obie was 'cause he took out the toilet seat so I couldn't hit myself over the head and drown. And he took out the toilet paper so I couldn't bend the bars, roll out, roll the toilet paper out the window, slide down the roll and have an escape. Obie was making sure, and it was about 4 or 5 hours later, that Alice, remember Alice? It's a song about Alice. Alice came by and with a few nasty words to Obie on the side - bailed us out of jail, we went back to the church, had another Thanksgiving dinner that couldn't be beat and didn't get up until the next morning, when we all had to go to court. We walked in, sat down. Obie came in - with the twenty-seven 8 by 10 color glossy pictures with circles and arrows and a paragraph on the back of each one, sat down. Man came in said "All rise." We all stood up and Obie stood up with the twenty-seven 8 by 10 color glossy pictures and the Judge walked in, sat down with a seeing-eye dog and he sat down. We sat down. Obie looked at the seeing-eye dog. And then at the twenty-seven 8 by 10 color glossy pictures with the circles and arrows and a paragraph on the back of each one - and looked at the seeing-eye dog. And then at the twenty-seven 8 by 10 color glossy pictures with the circles and arrows and a paragraph on the back of each one and began to cry - 'cause Obie came to the realization, that it was a typical case - of 'American Blind Justice', and there was nothing he could do about it, and the Judge wasn't gonna look at the twenty-seven 8 by 10 color glossy pictures with the circles and arrows and a paragraph on the back of each one explaining what each one was to be used as evidence against us. And we was fined fifty dollars and had to - pick up the garbage in the snow, but - that's not what I came to tell you about. Came to talk about the draft. They got a building down in New York City it's called 'Whitehall Street' where you walk in and get injected, inspected, detected, infected, neglected and selected. I went down to get my physical examination one day and I walked in, sat down - got good and drunk the night before so I looked and felt my best when I went in that mornin'. 'Cause I wanted to look like the all American kid from New York City. Man I wanted, I wanted to feel like the all, I wanted to be - the all American kid, from New York and I walked in, sat down I was hung down, brung down, hung up and all - kinds of mean, nasty, ugly things, and I walked in, I sat down, they gave me a piece of paper that said "Kid - see the Psychiatrist, room 6O4. And - I went up there, said "Shrink, I wanna kill. I mean I wanna, wanna kill. Kill. I wanna, wanna see, I wanna see blood and gore and guts and veins in my teeth. Eat dead burnt bodies. I mean kill. Kill. KILL. KILL." And I started jumping up and down, yellin' "KILL. KILL." And he started jumping up and down with me with me, and we was both jumpin' up and down, yelling "KILL. KILL." And the Sergeant came over, pinned a medal on me, sent me down the hall, said "You're our boy." Didn't feel to good about it, uh, proceeded down the hall getting more injections, inspections, detections, neglections, and all - kinds of stuff that they was doin' to me at the thing there and I was there for 2 hours, 3 hours, 4 hours - I was there a long time goin' through all kinds of mean, nasty, ugly things and I - was, just having a tough time there and they was inspecting, injecting every - single part of me, and they was leavin' no place untouched. Proceeded through and I - when finally came to see the very last man, I walked in, I walked in, sat down after a whole big thing there, and I walked up and said "What do ya want". He said "Kid, we only got one question - have you ever been arrested?" I proceeded to tell him the story of the 'Alice's Restaurant Massacree' with - full orchestration and five part harmony and stuff like that and then all the phenomina "Stop It Right There" said "Kid - did you ever go to court?" I proceeded to tell him the story of the twenty-seven 8 by 10 color glossy pictures with the circles and arrows, and a paragraph on the back of each one "Stop It Right There" and said "Kid - I want you to go over and sit down on that bench that says 'Group W' - NOW KID!" I, and I, I walked over to the, to the bench there, and there is - there's Group W's where they, where they put ya, if you may not be moral enough to, to join the Army, after committing your special crime and - there was all kinds of mean, nasty, ugly looking people on the bench there - mother rapers - father stabbers - father rapers! - father rapers sittin' right there on the bench next to me and, one, they was mean and nasty and ugly, and horible and crime, fighting guys was sittin' on the bench. And the meanest, ugliest, nastiest one - the meanest father raper of them all, was coming over to me, and he was mean and ugly and nasty and horible and all kinds of things, and he sat down next to me and said "Kid - what did ya get?" I said "I didn't get nothin', I had to pay fifty dollars and pick up the garbage". He said "What were you arrested for, kid?" and I - said "Littering" - and they all moved away from me on the bench there and the hairy eyeball, and all kinds of mean, nasty things, 'till I said "and creating a nuisance" and they all came back, shook my hand and we had a great time talkin' about crime, mother stabbin', mother raping, and all kinds of groovy things that we was talkin' about on the bench. And everything was fine, we was smoking cigarettes and all kinds of things, until the Sergeant came over - had some paper in his hand, said "Kids - This piece of papers got 47 word 37 sentences 58 word we want to know detail of the crime time crime and any kind of thing you got to say time and tune about the crime unknown arresting officers name and everything you got to say..." and he talked for 45 minutes, and nobody understood a word that he said, but we had fun filling out the forms and playing with the pencils on the bench there and - I filled out the 'Massacree' with the 4 part harmony and - wrote it down there, just like it was and everything was fine and I - put down the pencil and turned over the piece of paper and there - there on the other side - in the middle of the other side - away from everything else on the other side - in parenthesis - capital letters - quotated - read the following words. "Kid - have you rehabilitated yourself?" I went over to the Sergeant and said "Sergeant, you've got a - lot of damn gall to ask me if I've rehabilitated myself, I mean - I mean - I mean, I just, I'm sittin' here on the bench, I mean I'm sitting on the Group W bench - because you want to know if I'm moral enough to join the Army, burn women, kids houses and villages after being a litterbug." He looked at me and said "Kid - we don't like your kind - and we're going to send your fingerprints off to Washington" and friends - somewhere in Washington enshrined in some little folder is a - study in black and white - of my fingerprints. And the only reason why I'm singing you this song now is because you may know somebody in a similar situation - or YOU may be in a similar situation and if you're in a situation like that - there's only one thing you can do is, walk into the shrink wherever you are, just walk in and say "Shrink - You can get anything you want at Alice's Resaurant" and walk out. Ya know, if 1 person, just 1 person does it they'll think he's really sick and they wont take him. And if 2 people, 2 people do it - in harmony - they may think they're both faggots and won't take either of 'em. And if 3 people do it - 3, can you imagine 3 people walking in singing a bar of 'Alice's Restaurant' and walking out? They may think it's an organization. And can you, can you imagine 5O people a day? I said 5O people a day walking in singing a bar of 'Alice's Restaurant' and walking out. And friends they may think it's a movement, and that's what it is. The 'Alice's Restaurant Anti-Massecree' movement, and all you got to do to join, is sing it the next time it comes around on guitar - with feeling. So we'll wait 'till it comes around on the guitar here and sing it when it does - here it comes - You can get anything you want, at Alice's Restaurant You can get anything you want - at Alice's Restaurant Walk right in it's around the back - just a half a mile from the railroad track You can get anything you want, at Alice's Restaurant That was horrible. You want to end war and stuff you got to sing loud. You could put alot, I've been singing this song now for about 25 minutes - I could sing it for another 25 minutes - I'm not proud - or tired - so we'll wait 'till it comes around again and - this time with 4 part harmony and feeling - we're just waiting for it to come around is what we're doing - allright now - You can get anything you want, at Alice's Restaurant, excepting Alice You can get anything you want - at Alice's Restaurant Just walk right in it's around the back - just a half a mile from the railroad track and you can get anything you want, at Alice's Restaurant Da da da da da dum, at Alice's Restaurant! ====== Stan, FreeGroup - "Just Say It!" http://members.aol.com/whtsametau/FreeGroup.html From StanSqncrs at aol.com Fri May 29 01:15:33 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Fri, 29 May 1998 01:15:33 -0700 (PDT) Subject: More Government Bashing Message-ID: <32235dca.356e6e78@aol.com> Ah yes, a bit of local police bashing, courts bashing and draft bashing. Here's a little more local police bashing with a tiny bit of FBI bashing thrown in to segue into the next post - @@@@@@ Subj: Another Cop Bashing Story Date: 5/28/98 To: [FreeGroup] Again, I can't resist - ===== Motorcycle (Significance of the Pickle) Song - Arlo Guthrie I don't want a pickle Just want to ride on my motorsickle And I don't want a tickle I'd rather ride on my motorsickle And I don't want to die Just want to ride on my motorcy - cle You know, it's been about 12 years now that, I've been singing this dumb song. You know, it's amazing, it's amazing that somebody could get away with singing a song this dumb for that long. But you know, hey you know what's more amazing than that is that, is that uh, somebody could make a living singing a song this dumb. But, that's America! You know, I told about everything there was to tell about it. When I wrote it, how come, why, what for, but you know the one thing, that I always used to neglect to explain, was the significance of the pickle. It was the time I was riding my bike, I was going down a mountain road. I was doing 150 miles an hour. On one side of the mountain road there was a mountain, and on the other side there was nothin', it was just a cliff in the air. But I wasn't paying attention you know I was just driving down the road. All of a sudden by accident, a string broke off my guitar. It broke you know right there went flying across the road that way, wrapped itself around a yield sign. Well the sign didn't break, it didn't come out of the ground, the string stayed wrapped around it. Stayed in the other end of my guitar, I held on to my guitar with one hand. I held on to the bike with the other. I made a sharp turn off the road. Luckily I didn't go into the mountain. I went over the cliff. I was doing 150 miles an hour sideways, and 500 feet down at the same time. Hey, I was looking for the cops, 'cause you know, hey I knew that you know it, it was illegal. Well, I knew that it was it. I knew I didn't have long, to live in this world. And in my last remaining seconds in the world I knew that it was my obligation to, write one last farewell song to the world. Took out a piece of paper, I pulled out a pen, and it didn't write I, I had to put another ink cartridge in it. I sat back and I thought for awhile and then it come to me, it come like a flash, like a vision burnt across the clouds. I just wrote it down. I learned it right away. I don't want a pickle, just want to ride on my motorsickle. And I don't want a tickle, I'd rather ride on my motorsickle. And I don't want to die, just, want to ride on my motorcy - cle. Hey I, you know, I knew it wasn't the best song I ever wrote, but I didn't have time to change it. But you know the most amazing thing was, that I didn't die, I landed on the top of a police car, and it died. I come into town, I come into town at a screaming 175 miles an hour singing my new motorcycle song. I stopped out in front of the deli and out in front of the deli was a man, eating the most tremendous pickle, a pickle the size of four pregnant watermelons, just a huge monster pickle. He walked up to me, pushed a pickle in my face and started asking me questions. It was about the same time I noticed a pickle in my face I noticed a cord hanging from the long end of the pickle going up his sleeve down his shirt into his pants and shoes out into a briefcase he had near his feet. I knew it wasn't a ordinary pickle. But it was about the same time I noticed the cord hanging out ot the pickle that a 4 foot cop arrived, with a 5 foot gun. A cop that one time, must have been around 6 foot 3, but was met at the bottom of a mountain, by a flying, singing, writing, weirdo freak. He walked up and with one tremendous hand he grabbed the pickle away from the other guy. He threw it, a hundred feet, straight up in the air. And while the pickle was half way between going up and coming down, he took out his gun and put a 3 inch bullet hole right through the long end of the pickle. It started coming back down. He stuck out his foot. He caught the pickle on his big toe. And balancing the pickle on his big toe he reached his huge hand into his little pocket, pulled out a 10 foot ticket. He borrowed my pen, he wrote it up, then he rolled it up, and stuffed it in the bullet hole in the middle of the pickle, took the pickle with the ticket and shoved it down my throat. It was at that very moment, that the pickle with the ticket was going down my throat that, I knew for sure that, that I didn't want a pickle. I don't want a pickle I just want to ride on my motorsickle And I don't want a tickle I'd rather ride on my motorsickle And I don't want to die Just want to ride on my, motorcy - cle @@@@@ And on to the meat of the matter, the FBI - @@@@@ Subj: Re: Another Cop Bashing Story + FBI Bashing Date: 5/29/98 To: [FreeGroup] << YES!!! I actually do have an original copy! It's on the album "ARLO" . I'll work on that transcript this weekend. I also have "Hobo's Lullaby" Pretty cool stuff dude! >> Ok, then you deserve this - ====== The Pause of Mr. Claus - Arlo Guthrie (introduction) This next song, we're going to dedicate to a great American organization. Tonight, I'd like to dedicate this, to our boys, in the FBI. Well, wait a minute, it's hard to be a FBI man. I mean, first of all to be a FBI man you have to be over 40, years old. And the reason is, that it takes at least 25 years with the organization, to be that much of a bastard. Now, it's true you just can't join, you know it kinda it needs a atmosphere where your natural bastardness, can grow and develop and, take a meaningful shape in today's complex society. But that's not why I want to dedicate the song to the FBI. I mean the job that they have to do, is a drag! I mean they have to follow people around. You know, that's part of their job. Follow me around. I'm out on the highway, and I'm drivin' down the road, and I run out of gasoline and I pull over to the side of the road, they got to pull over too, make believe they ran out. You know, I go to get some gasoline, they have to figure out whether they should stick with the car, or follow me! Suppose I don't come back and they're staying with the car. Or if I fly on the airplanes. I can fly half- fare because I'm 12 - 22, and they got to pay the full fare. But, well, what the thing is when you pay the full fair, you have to get on the airplane first so that they know how many seats are left over for the half-fair kids. Allright and sometimes there aren't any seats left over and, sometimes there are but that doesn't mean you have to go! Well suppose he gets on and fills up the last seat. So you can't get on, then he gets off, then you can get on! What's he going to do? Wait, well, it's a drag for him. But that's not, that's not why I want to dedicate the song to the FBI. During, during these hard, days, and hard weeks, everybody always has it bad once in a while, you know you, you have a bad time of it, and you always has a friend that says "hey man, you ain't got it that bad, look at that guy." And you look at that guy, and he's got it worse than you! And it makes you feel better that there's somebody that's got it worse than you. But think of the last guy. For one minute, think of the last guy. Nobody's got it worse than that guy. Nobody, in the whole world, that guy, he's so alone in the world, that, he doesn't even have a street to lay in for a truck to run him over. He's out theeerre, with nothing. Nothin's happening for that cat. And all that he has to do to, create a little excitement in his, own life, is to bum a dime from somewhere, call up the FBI, say "FBI?" they say "yes?" say "I dig Uncle Ho and Chairman Mao and their friends are coming over for dinner.", hang up the phone. And within two minutes, and not two minutes from, when he hangs up the phone but two minutes from when he first put the dime in, they got 30,000 feet of tape rollin'. Files on tape, pictures, movies, dramas, actions on tape. But then they send out a half a million people all over the entire world, the globe, they find out all they can about this guy. 'Cause there's a number of questions involved in this guy. I mean if he was the last guy in the world, how did he get a dime to call the FBI? There are plenty of people that aren't the last guy, that can't get dimes, he comes along and he gets a dime! I mean if, if he had to bum a dime to call the FBI, how was he going to serve dinner for all those people? *How could the last guy make dinner for all those people?* And if he could make dinner, and was gonna make dinner, then why did he call the FBI? And they find out all of those questions within two minutes! And that's the, that's the great thing about America! I mean, this is the only country in the world, I mean well it's it's not the only country in the world that could find stuff out in two minutes, but it's the only country in the world that would take two minutes for that guy! Well other countries would say "Hey, he's the last guy, screw him!", you know? But, but in America there is no discrimination. And there is no hypocracy, 'cause they'll get anybody. And that's, that's a wonderful thing, about America. And that's why tonight, I'd like to dedicate it to every, FBI man in the audience. I know, you can't say nothin' you know. You can't get up and say, "Hi!", you know, 'cause then everybody knows, that you're a FBI man, that's a drag for you, and your friends! They're not really your friends, are they. I mean so you can't get up and say nothing 'cause otherwise, you got to get sent back, to the factory. And that's, that's a drag for you and an expense for the government. And that's a drag for you. We're going to sing you this Christmas Carol. It's for all you bastards out there in the audience tonight. It's called 'The Pause of Mr. Claus'. Why do you sit there so strange Is it because you are beautiful You must think you are deranged Why do police guys beat on peace guys? You must think Santa Claus wierd He-e has lo-ong hair and a beard Giving his presents for free Why do police guys mess with peace guys? Let's get Santa Clause 'Cause Santa Claus has a red suit, he's a communist And a beard and long hair, must be a pacifist What's in the pipe that he's smoking??????? Mr. Claus sneaks in your house at night he must be a dope-fiend, to put you uptight Why do police guys, beat on peace guys? @@@@@ What can I say? We have alot of fun. Stan, FreeGroup - "Just Say It!" http://members.aol.com/whtsametau/FreeGroup.html From Mia.Westerholm at DataFellows.com Fri May 29 06:03:16 1998 From: Mia.Westerholm at DataFellows.com (Mia Westerholm) Date: Fri, 29 May 1998 06:03:16 -0700 (PDT) Subject: Data Fellows Announces F-Secure FileCrypto Message-ID: <3.0.2.32.19980529144257.00a239e0@smtp.DataFellows.com> For immediate release 29 May 1998 DATA FELLOWS ANNOUNCES F-SECURE FILECRYPTO New Product Provides Centrally Managed On-the-Fly Protection For Sensitive Data on Personal Computers Helsinki, Finland, May 29, 1998 -- Data Fellows, a leading developer of data security software, today announced F-Secure FileCrypto, the latest addition to the company�s award-winning cryptographic product line. F-Secure FileCrypto will provide strong, on-the-fly encryption for confidential data in the Microsoft Windows 95/98 and NT 4.0 environments. "F-Secure FileCrypto is the only file encryption product on the market designed for companies with thousands of PCs," says Mr. Camillo Sars, Product Manager, Data Fellows. "The protection of confidential files has never been this easy. F-Secure FileCrypto is centrally installed over the entire network, and automatically encrypts all open and temporary files. The process is completely transparent to end-users, requiring no action from them at all." F-Secure FileCrypto is managed from a central location. The administrator can define a security policy for all installed copies of the software. The recommended basic policy is encrypting all directories on the local hard drive. The program also features a key retrieval function. If a user forgets the password that allows access to encrypted files, the Administrative Key Recovery function manages the situation safely and easily. According to Mr. Sars: "F-Secure FileCrypto is the first and only product to integrate strong real-time encryption into the Windows file system. It automatically encrypts data before it gets stored on the hard disk, protecting sensitive information even in the most demanding situations. If a PC is improperly turned off, or if a laptop computer�s batteries go dead, any open or temporary files will be encrypted and safe." F-Secure FileCrypto also has a feature which allows users to send encrypted e-mail to other users. Encrypted e-mail can be decrypted with a password. F-Secure FileCrypto uses well-known fast block cipher algorithms. Either the three-key 3DES, or the Blowfish algorithm, can be selected. Both algorithms have been analyzed by the world�s leading cryptographers and are known to be strong and safe. "Files protected by F-Secure FileCrypto are not accessible to computer freaks, hackers, or even cryptography experts. Each file is encrypted with a random session key. Breaking a single key would give someone access to only one file, and the job would consume trillions of years of computer time," says Mr. Sars. F-Secure FileCrypto for Windows NT 4.0 will be available in July 1998, from Data Fellows� resellers around the world. F-Secure FileCrypto for Windows 95 and 98 will be available later this year. About Data Fellows Data Fellows is one of the world�s leading developers of data security software. The company�s groundbreaking F-Secure products provide a unique combination of globally available strong encryption and revolutionary anti-virus software. The integrated F-Secure software family provides complete security solutions for enterprises of any size. It includes file encryption and IPsec communication encryption products, VPN gateways, SSH-based secure remote management software, easy-to-use solutions for distributed DNS management, and a full range of anti-virus products for workstations, servers and gateways. Data Fellows is also the developer of the award-winning F-PROT Professional anti-virus engine, which is now an integral part of the multiple engine structure of F-Secure Anti-Virus. Data Fellows has offices in San Jose, California, and Helsinki, Finland. In addition, it offers a worldwide network of technical support, training and distribution in over 80 countries. Since the company was founded in 1988, its annual net sales growth has consistently been over 80%. Data Fellows belongs to an elite group of companies with a triple-A rating from Dun&Bradstreet. The company is privately owned. For further information, please contact Data Fellows Ltd., Finland: Mr. Camillo Sars, Product Manager Tel. +358 9 859 900 Fax. +358 9 8599 0599 E-Mail: Camillo.Sars at DataFellows.com Data Fellows Inc., USA: Mr. Petri Laakkonen, President Tel. +1 408 938 6700 Fax +1 408 938 6701 E-mail: Petri.Laakkonen at DataFellows.com Visit our web site at http://www.DataFellows.com ���������������������������������������������������� Mia.Westerholm at DataFellows.com http://www.DataFellows.com Data Fellows Ltd. PL 24 FIN-02231 ESPOO, FINLAND Tel. +358 9 859 900 Fax. +358 9 8599 0599 From iu87y at hotmail.com Fri May 29 07:12:45 1998 From: iu87y at hotmail.com (kj87u) Date: Fri, 29 May 1998 07:12:45 -0700 (PDT) Subject: VENTURE CAPITAL OPPORTUNITY Message-ID: <199805293650TAA36479@76tg54@hotmail.com.nationwide.net> VENTURE CAPITAL BUSINESS AND CAREER OPPORTUNITY Our corporation, through our expanding partners network, and in conjunction with varied and substantial investment groups, provides venture capital, equity and debt funding to corporate clients nationwide. We are currently expanding our system and are seeking a professional individual as our associate, who in turn, will qualify clients for our services. There is an $8,250 investment. To receive an extensive package of printed information, please call our voice mail system at 214-373-2032 and leave your complete name and mailing address. This is a ONE time mailing only. It will NOT be repeated. You are NOT on any mailing list, and your name is DELETED after you receive this message. If this message is not of interest to you, we are sorry for the intrusion. You DO NOT have to email us to remove your name. From listmaster at extensis.com Fri May 29 13:01:38 1998 From: listmaster at extensis.com (listmaster at extensis.com) Date: Fri, 29 May 1998 13:01:38 -0700 (PDT) Subject: Extensis Plug-ins are Compatible with Adobe Photoshop 5.0 Message-ID: As an Extensis customer you will be happy to know that all Extensis products are now Photoshop 5.0 compatible. You can download the latest versions off of our web site for free. These updates are available for all Extensis Photoshop plug-ins including: Intellihance 3.0.2, Mask Pro 1.0, PhotoFrame 1.0, and PhotoTools 2.0.2. Simply visit the Extensis site at http://products.extensis.com/updates/ to get your FREE download. For additional information on Extensis please visit http://www.extensis.com/ For Extensis Customer Service please call 1-800-796-9798. _________________________________________________________________ PS. We have made every effort to ensure this message is being sent only to people who have expressed interest in Extensis products. If we have sent this to you in error, please accept our apologies and reply with REMOVE in the subject line and your email address in the body for automatic exclusion from future communications. If you know someone who would like to be on our mailing list have them send an email to listmaster at extensis.com with ADD in the subject line and their email address in the body. From billp at nmol.com Fri May 29 18:10:42 1998 From: billp at nmol.com (bill payne) Date: Fri, 29 May 1998 18:10:42 -0700 (PDT) Subject: FOIA fee waiver denial lawsuit Message-ID: <356F5BAC.6D4D@nmol.com> Friday 5/29/986:52 PM UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA John Gilmore ) Arthur R. Morales ) William H. Payne ) ) Plaintiffs, ) ) Lieutenant General Kenneth A. Minihan, USAF ) Director, National Security Agency ) National Security Agency ) 9800 Savage Road ) Fort George G. Meade, MD 20755-6000 ) ) Defendant ) ____________________________________________) DEMAND FOR JURY TRIAL Gilmore http://www.cygnus.com/~gnu/ Hope you got my three phone messages. My belief is that NO ONE has ever sued over a FOIA fee waiver denial. BECAUSE of the VISIBILITY that John Young has given NSA lawsuits http://www.jya.com/nsa-cases.htm I think that it is a propitious time to sue NSA in the District of Columbia over a FOIA fee waiver denial. Pro se for economic and LEGAL reasons. And, of course, we should try to get some crypto patents at the same time. I have some ideas for keying crypto devices http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=0 Let me know your thoughts. By secure communications, of course bill Friday 5/15/98 3:48 PM By e-mail and US mail Lieutenant General Kenneth A Minihan, USAF Director, National Security Agency National Security Agency 9800 Savage Road Fort George G. Meade, MD 20755-6000 Dear General Minihan: Purposes of the letter are to 1 appeal a FOIA fee waiver denial. 2 continue to explore settlement possibilities of our current lawsuit. 30 March Joann H. Grube, Deputy Director of Policy, NSA, wrote in response to my Friday February 27, 1998 attached letter to you There are 706 cases ahead of your in our processing queue. .. Please be advised that your request for a waiver of fees has been denied. Public knowledge of how much taxpayer NSA has likely squandered ATTEMPTING to build public key crypto chips certainly in the public interest. Therefore, I appeal Grube's denial. Grube wrote Any person notified on an adverse determination may, within 60 days after notification of the determination, file an appeal to the NSA/CSS Freedom of Information Act Appeal Authority. The appeal shall be in writing and addressed to the NSA/CSS FOIA Appeal Authority, ... General Minihan, Grube apparently is attempting to invent her own FOIA appeal rules instead of follow federal law. Whenever a FOIA request is denied, the agency must inform the requester of the reasons for the denial and the requester's right to appeal the denial to the head of the agency. I ask that you educate and possibly reprimand Grube for her failure to properly state law. As you may be aware (6)(A) Each agency, upon any request for records made under paragraph (1), (2), or (3) of this subsection, shall-- (i) determine within ten days \1\ (excepting Saturdays, Sundays, and legal public holidays) after the receipt of any such request whether to comply with such request and shall immediately notify the person making such request of such determination and the reasons therefor, and of the right of such person to appeal to the head of the agency any adverse determination; and And you may also be aware ------------------------------------------------------------------------- \1\ Under section 12(b) of the Electronic Freedom of Information Act Amendments of 1996 (Pub. L. 104-231; 110 Stat. 3054), the amendment made by section 8(b) of such Act striking ``ten days'' and inserting ``20 days'' shall take effect on October 3, 1997. ------------------------------------------------------------------------- (ii) make a determination with respect to any appeal within twenty days (excepting Saturdays, Sundays, and legal public holidays) after the receipt of such appeal. If on appeal the denial of the request for records is in whole or in part upheld, the agency shall notify the person making such request of the provisions for judicial review of that determination under paragraph (4) of this subsection So I expect a response to this appeal within the time allotted to you by law. Our lawsuit has attracted international attention on Internet. http://www.jya.com/whp050898.htm http://www.jya.com/whp-10usca.htm http://www.jya.com/whp043098.htm http://www.jya.com/mf050998.htm http://jya.com/whpfiles.htm http://www.jya.com/crack-a5.htm http://caq.com/cryptogate http://www.aci.net/kalliste/speccoll.htm http://www.aci.net/kalliste/nukearse.htm Partially, perhaps, as the result of the about .5 million dead Iranian Shiite Muslims. Or maybe judicial misconduct? Morales and I plan to appeal to the Tenth in event that Morales' dismissal is upheld. Further, we feel that YOU must be held accountable. Therefore we will appeal your removal from our lawsuit. But this is sure to cost the taxpayer much more money. And failure to fairly settle these unfortunate matters raises the possibility of a understandable, or opportunistic, retaliatory attack for NSA's bungled spy sting on Iran by the aggrieved or their enemies. Innocent people may be harmed. Both alternatives are unpleasant to think about. Therefore, Morales and I continue to offer to engage in settlement talks with YOU. I cannot find your e-mail address Therefore I will forward the e-mail copy of this FOIA appeal /settlement letter to Ray Kammer of NIST [http://www.nist.gov so that Kammer can possibly forward an e-mail to you. I am not reading e-mail. Sincerely, William Payne 13015 Calle de Sandias Albuquerque, NM 87111 505-292-7037 3 From bd1011 at hotmail.com Fri May 29 21:28:25 1998 From: bd1011 at hotmail.com (Nobuki Nakatuji) Date: Fri, 29 May 1998 21:28:25 -0700 (PDT) Subject: When write high-speed implementation, Message-ID: <19980530042752.25126.qmail@hotmail.com> When write high-speed implementation, Is S-box written by hexadecimal or written by decimal? Thanks. ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From verify at nytimes.com Fri May 29 22:20:20 1998 From: verify at nytimes.com (New York Times subscription robot) Date: Fri, 29 May 1998 22:20:20 -0700 (PDT) Subject: Welcome to The New York Times on the Web Message-ID: <199805300520.BAA28225@content9a.nytimes.com> Welcome, coderpunk, Thank you for registering for The New York Times on the Web. **************************** ABOUT YOUR REGISTRATION **************************** Your subscriber ID is coderpunk You selected your password at registration. Your e-mail address is cypherpunks at toad.com We encourage you to print this message and save it for future reference. If you have any questions about your registration we can find your account using the ID and e-mail address listed above. Unless you chose otherwise, your ID and password have been saved on your computer so that you do not have to enter them each time you visit our site. Please keep in mind that you can enter this ID and password on any computer to reach our Web site, so if you change computers or install a new browser, there is no need to re-register. If you forget your password, please do not re-register. You can retrieve your password in the Help Center by clicking "Help" anywhere on the site. For more information about the site and your registration, please visit the Help Center at: http://www.nytimes.com/subscribe/help/ ***************************************** ABOUT THE NEW YORK TIMES ON THE WEB ***************************************** The New York Times on the Web combines the quality news coverage, authority and integrity of The New York Times with the immediacy, utility and depth of the Internet. Our site includes daily contents from The Times, news updates every ten minutes from the Associated Press and throughout the day from New York Times editors, a low-cost 365-day archive of New York Times articles, and original reporting exclusive to the Web in CyberTimes. The Times on the Web also features: ** Up-to-the-minute sports scores and statistics ** Current weather conditions and 5-day forecasts for over 1,500 cities worldwide ** A searchable library of more than 50,000 book reviews ** Custom stock portfolios ** Searchable Real Estate and Help Wanted listings ** Subscription service to the Crossword Puzzle, Bridge and Chess columns Thank you for registering. Visit us again soon at: http://www.nytimes.com ***************************************** Please do not reply to this message. If you did not authorize this registration, someone has mistakenly registered using your e-mail address. We regret the inconvenience; please FORWARD this message to cancel at nytimes.com and we will remove it from our records. From snow at smoke.suba.com Fri May 29 22:35:11 1998 From: snow at smoke.suba.com (snow) Date: Fri, 29 May 1998 22:35:11 -0700 (PDT) Subject: D.A.R.E. and a Bullpupy In-Reply-To: <199805290226.WAA15318@algnet.algonquinc.on.ca> Message-ID: <199805300534.AAA05884@smoke.suba.com> > If your a nigger, I have this buddy who did some time on a narcotics charge. He occasionally talks about some of the white folks he met while inside. Seems many of them were associated with white power groups, and tried on several occasions to recruit him. He said that the funniest thing about them was their consistent inability to spell properly, or to use anything vaguely resembling appropriate grammer or puncuation when writing. From forgot at nytimes.com Sat May 30 02:10:05 1998 From: forgot at nytimes.com (forgot at nytimes.com) Date: Sat, 30 May 1998 02:10:05 -0700 (PDT) Subject: NYT Account Request Message-ID: <199805301001.FAA22489340@inbox.nytimes.com> You have requested your ID and password for The New York Times on the Web. Please follow the instructions below. 1. Please make a note of your subscriber ID: nifft 2. Next, to get the password for this account, using your Web browser go to this unique URL: http://verify.nytimes.com/forgot/snp.cgi?ul=nifft~598571 This page will allow you to choose a new password. Make sure you have copied the address EXACTLY as it appears here. (If you're getting an "Error" page, the address was probably entered incorrectly. See "Help With Copying and Pasting" at the bottom of this e-mail.) 3. Follow the instructions on the screen to choose a new password. After you have entered a password you will automatically enter our Web site. The New York Times on the Web Customer Service forgot at nytimes.com ******************** Help With Copying and Pasting 1. Using the mouse, highlight the entire Web address, (e.g. http://verify.nytimes.com/forgot/snp.cgi?ul=nifft~598571) shown above in step 2. It's essential to highlight the entire address, even if it extends over two lines. 2. Under the Edit menu at the top of your screen, select "Copy". 3. Go into your Web browser (open it if it's not already opened). 4. Click in the "Netsite" or "Address" bar -- the place in your Web browser where it says what Web address you're currently looking at -- and delete the address that's currently there. 5. In the blank "Netsite" or "Address" bar, paste the address by selecting the "Edit" menu at the top of your screen and choosing "Paste". 6. Press Enter. 7. Follow the instructions to choose a new password. ******************** If you did not request your ID and password for your NYT Web registration, someone has mistakenly entered your e-mail address when requesting their password. Please simply ignore this message, or, if you wish, you may go to the address above to select a new password for your account. From Adidas9062 at aol.com Sat May 30 11:56:19 1998 From: Adidas9062 at aol.com (Adidas9062 at aol.com) Date: Sat, 30 May 1998 11:56:19 -0700 (PDT) Subject: HYPER PORN!!! Message-ID: � To: Adidas9062 at aol.com Subject: Fwd: HYPER PORN!!! From: Adidas9062 at aol.com Date: Sat, 30 May 1998 13:28:43 EDT To: Adidas9062 at aol.com Subject: HYPER PORN!!! From: Adidas9062 at aol.com Date: Fri, 29 May 1998 22:12:59 EDT The World's Best Free Porn

CLICK HERE

FREE Trail Membership! services: teens, sluts, pics, avi's, streaming video, gifs, jpgs, gay, lesbian, chicks, animals, studs, toys, and chat. Totally legal, service is free for up to 1 week, no obligation. Absolutly no underage pornography! This service also contains possible adult gaming links. please hit reply and enter "-remove " & your email address to be removed From susangray32 at aol.com Sat May 30 14:14:36 1998 From: susangray32 at aol.com (Ann) Date: Sat, 30 May 1998 14:14:36 -0700 (PDT) Subject: Where's my graduation present? Message-ID: MEGA$NETS=MEGABUCK$ ANYBODY CAN DO THIS. NO APPLICATION NO INVENTORY NO MEETING NO PRODUCTION REQUIREMENT NO BRAINER, EVEN A MONKEY COULD DO THIS!!! JUST $$CASH$$ LOTS & LOTS & LOTS OF CASH !!$$!!$$!! This is one of the most simple and yet brilliant plans ever created. Everybody wins! BUT you must follow it exactly!! If you do the soon you will be laughing all the way to the bank. You are holding information in your hands on a home-based business concept of the next century! This is a networking breakthrough of enormous potentials! And it is here now and ready to help you earn the kind of income you deserve! Welcome to the majors. MEGA$NETS combines 3 of the most powerful income opportunities of our time....computers, mail order, and network marketing. Together, they offer you a home-based business you can work full or part-time. MEGA$NETS is an easy to use yet sophisticated software program to help the average person get in on the fabulous profits being made in the computer networking age. Most of us know the future is in computers. An estimated 150,000 new people are getting on the internet each month! MEGA-PROFITS will be earned with computers whether you and I are involved or not. So why not get involved Now? The IBM compatible MEGA$NETS software disk cost just $20, yet it is designed to bring you a tremendous income within a remarkable short period of time. HERE'S HOW IT WORKS Purchase the MEGA$NETS software disk for just $20 from the person sharing this opportunity with you. Load it into your PC. You will be impressed with the professional appearance of the software and how easy it is to operate! The Menu includes access to a complete set of instructions. you also receive seperate written and step by step instructions,so you do not even need to be familiar with computers! STEP 1. The computer will ask you to type in your own name & address. Be sure this information is correct. Once you click to the next screen, your information will be permanently locked into the program. No one can remove it!!! STEP2. Next you will see the names and addresses of 5 on your screen. Now move to the next screen and click on " Purchase Orders". Your printer will automatically produce a seperate Purchase Order for each of those 5 vendors. Simply mail the orders, enclose a Self Addressed Stamped Envelope and money order OR cash for $20 with each. In return for your orders and payment, the 5 vendors will each send you a different code number. Your total expenditure is $120: $20 for your original program disk and 5x20 for your codes. STEP 3. Enter these into the computer program where it tells you to do so, and now you are able to make copies of your disk. YOU CANNOT MAKE COPIES OF DISKS WITHOUT THES 5 CODES. The program will not let you. STEP 4. Once you enter the 5 codes you can now duplicate the disk and sell each duplicated disk to other people who own or have access to a compatible PC. They will want to buy because of the profit potential they too will have! Selling is not difficult, Most people see the opportunity just by reading this letter. WHAT DO BUYERS DO? When your customer loads your duplicated disk, they will be instructed to do the same as you. They will purchase the computer codes they need to "unlock" their program ( just like you did ) and begin to duplicate the disk, as many times as they wish. Before they duplicate, your name and address will have automatically been added into the system as an additional code vendor and one name will have been deleted. This is no different than removing a name from your rolodex. One name is added, one is removed. MONEY MAKER LIKE YOU HAVE NEVER SEEN!!! This is what could happen. If you sell a minimum of 6 disks for $20 each, you will have back your original $120 ( Except for the cost of some blank disks). If those 6 people sell just 6 each all of those 36 disks will list your name and address as a code vendor. 36 people will now send you $20 each along with a Purchase Orders generated by their disk ( total potential here is another $720 ). All you do is enter the Purchase Order information into your program and your computer will automatically print out the codes they have purchased from you. This takes about 30 seconds. Mail the codes to your customers right away! Remember, the sooner they get their codes, the sooner your name will be duplicated again and again! Now when those 36 people sell to 6 people each, your name will automatically move to the next position on ther screen. As one of the five code vendors, 216 (36 x 6) will each be sending you $20 for your codes ( which they must have to let them make copies they can sell ). That's $4320 to add to your first $720...which add up to $5040 so far. And that's only the start of it! if the 216 people sell to only 6 others each, and your name moves to the 3rd position on everybodys screen, potentially 1,296 people will be sending you $20...which is $25,920 PLUS the $5,040 you received earlier. The potential earning so far could total $30,960 ! THE MULTIPLIER EFFECT ( Here is where it becomes AWESOME !) Your next payment in the 4th position could be $20 times 7776, which is $155,520 .. Add that to your previous $30,960, and the grand total is $186,480... when the 5th and final position is reached, your name disappears from future duplicated disks. By then your TOTAL INCOME COULD BE $1,119,600!! AND REMEMBER THAT'S IF EVERYONE IN YOUR GROUP ONLY SOLD 6 DISKS. CAN YOU SELL MORE THAN SIX DISKS? YES! MEGA$NETS allows you to make as manys disks as you wish. The 5 codes you buy have licensed you to duplicate as many disks as you want. The software will even calculate the results with whatever number you choose. NO ONE CAN CHEAT YOU!! That's right , it's impossible to cheat MEGA$NETS software! No names and addresses can be erased to put in the names of "friends", and the software is programmed to generate constantly changing codes, nothing works! You are a true computer software vendor and provider of valuable computer information codes that only you can provide for your customers. The MEGA$NETS Business System disk was developed by a professional commercial computer programmer. It looks professional and works professionally. ( Some of today's best whiz-kids have tried to break the system and failed.) In addition, MEGA$NETS checks itself for viruses. If it finds any modifications, it would simply refuse to run, so your system is fully protected without damaging your files. The distribution process is a similar safeguard. By holding a duplicate of the software within itself, MEGA$NETS makes absolutely sure that each copy is the same as the original, but with your personalized information. Let's take a mintue and truly understand what this business is all about. First of all, it is NOT an investment. You are purchasing a product: a computer software program with a 100% MONEY BACK GUARANTEE. Next, you can buy codes that will unlock the program so you can make duplicated disks and sell them. Soon, customers will be requesting codes from you. You become a vendor. You have something your customers need. That's real sales! That's real business! Isn't that what American businesses do every day of the week? Don't they get paid for selling someone a product, a service or just some information? IS THIS LEGAL? As we have seen, MEGA$NETS is like any other legal information-driven company. First, you sell the software program which includes valuable marketing information your customers can use for any business. Secondly,as an information vendor, you will be selling valuable computer codes to your customers.Thirdly, you will be developing a mailing list out of your customers that can help you in promoting other customers that can help you in promoting other income opportunities you may want to offer. Huge multi-billion dollar worldwide companies do this every hour of the day. MEGA$NETS is no different,we just use network marketing to get the job done.Plus, there are NO MEETINGS TO ATTEND and no corporate headquaters or hot-shot executives who can change the plan or grab your earnings. In effect, you are the owner and CEO of your own computer software network marketing company! All you have to do now is purchase your disk and you are on your way to earnings potential that will bring you financial independence! Just be ready to handle the volume! You are now in the computer software mail order business. Treat this like a real business and it can earn you the income of a real business! MEGA$INCOME. DONT WAIT. DO IT NOW!!! LOADS OF CASH AWAITS YOU!!! Call to hear live testimonials on MEGA$NETS ( It's FREE !!) (888) 220-5808 To Order Your MEGA$NETS Disk Send $20 Cash OR Money Order Payable To : ( INCLUDE Self Addressed Stamped Envelope ) GES P.O. BOX 601162 SAN DIEGO, CA 92160 ACT NOW !!! MEGA$NETS Comes with a 100% Money Back Guarantee!! From jya at pipeline.com Sat May 30 17:11:12 1998 From: jya at pipeline.com (John Young) Date: Sat, 30 May 1998 17:11:12 -0700 (PDT) Subject: BXA's KR Agents, NSA's Cult Message-ID: <199805310011.UAA11401@camel8.mindspring.com> BXA published yesterday its guidelines for getting approval as a Key Recovery Agent: http://jya.com/bxa-kraguide.htm The House Select Committee on Intelligence "has concluded that very large changes in the National Security Agency's culture and method of operations need to take place ... and that NSA will not meet its Unified Cryptologic Architecture (UCA) goals without tackling head-on some very fundamental internal obstacles." Even so, as others earlier noted here, the Committee has ruled out lifting encryption export controls. http://jya.com/ciise.htm From billp at nmol.com Sat May 30 18:03:02 1998 From: billp at nmol.com (bill payne) Date: Sat, 30 May 1998 18:03:02 -0700 (PDT) Subject: Kirtland Air Force Base Message-ID: <35709AFC.7DD3@nmol.com> Saturday 5/30/98 5:15 PM J Orlin Grabbe Masanori Fushimi Orline just saw Spies Turn to High Tech Info Ops both at at http://www.aci.net/kalliste/ and http://www.jya.com/crypto.htm Friday at noon, after Lunch with Morales, I ventured onto Kirtland AFB through the Wyoming gate. In order to get into the National Atomic Museum I had to produce 1 Drivers license 2 proper car registration 3 proof of insurance. The airman who was to check 1,2,and 3 was busy on the phone. The airman was reading serial numbers on a bullet-proof vest. I asked the airman who THEY were afraid of. The airman responded, 1 gangs 2 militias The airman quipped that while he was unlucky enough to lose on a lottery ticket, he might be unfortunate enough to take bullet. Therefore, the airman said he was wearing a bullet-proof vest, even in about 90F weather. I went to the museum and bought two FIRST ATOMIC BOMBARDMENT, 50th ANNIVERSARY refrigerator magnets, like the one I sent to John Young. I mailed the one to Orlin, but I have the one for Masanori pasted on the side on one of my computers. Masanori, the book Decision to Use the Atomic Bomb by Gar Alperovitz presents fairly good evidence some in US government nuked Hiroshima and Nagasaki merely to impress the Russians. Unfortunately, as we can see by the current government crypto debacle, overall intellect of the US government has not improved much since 1945. And maybe has decreased. Masanori, one positive side of the unfortunate matter is that LOTS MORE people are reading your scientific papers. http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=0 Let�s all, of course, hope for settlement of these regrettable matters. Later and, of course, Allahu akbar bill From gnu at toad.com Sat May 30 18:04:35 1998 From: gnu at toad.com (John Gilmore) Date: Sat, 30 May 1998 18:04:35 -0700 (PDT) Subject: FOIA fee waiver denial lawsuit In-Reply-To: <356F5BAC.6D4D@nmol.com> Message-ID: <199805310104.SAA02100@toad.com> Hi folks -- sorry to add to your mail load. Disbelieve any assertions or ideas that Bill Payne offers, about a joint lawsuit including me and him as plaintiffs. I could never aspire to match his level of effectiveness at pursuing complaints against the government. John Gilmore From StanSqncrs at aol.com Sun May 31 14:26:58 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Sun, 31 May 1998 14:26:58 -0700 (PDT) Subject: FYI Message-ID: <4b356dc0.357114cb@aol.com> If you've heard rumors about Amway being a cult, it's true. It's part of the right-wing/ChristianCoalition cult. If anyone wants to see my evidence, let me know. Stan From StanSqncrs at aol.com Sun May 31 17:36:52 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Sun, 31 May 1998 17:36:52 -0700 (PDT) Subject: FYI Message-ID: <322a25d9.3571f777@aol.com> Someone wrote me in private - << Yes, we want to see On Sun, 31 May 1998 StanSqncrs at aol.com wrote: > If you've heard rumors about Amway being a cult, it's true. It's part of the > right-wing/ChristianCoalition cult. If anyone wants to see my evidence, let > me know. >> I caught an Amway employee (works in Ada and everything) on a music list engaging in the censorship of the messages in that band's music. But first, a who's who of the people involved in the war on the Arts/Music - gopher://gopher.igc.apc.org/00/orgs/alternet/demval/cultwars You'll notice Mr. and Mrs. Richard DeVos of the DeVos foundation listed, his son runs Amway, and Richard was the guy who started it (along with another person). Here's my Amway employee threatening to use Amway lawyers against someone (me) simply trying to speak on a music list - ===== In a message dated 4/27/98 8:43:23 AM Central Daylight Time, Russell_Gorton at amway.com writes: << ... buddy. I'm just down the hall from a team of about 80 high-powered lawyers who are fledgling experts in Internet harassment issues (amway.com is a very-flamed, very-hacked, very high-profile domain. >> << --Russell Thomas Gorton Amway Corporation (yup, the direct-sell soap empire) Ada, Michigan, USA >> ===== Of course, I do admit, that I do speak from a left POV. ;-) You see, the band is a band called Camel, and I like to talk about their lyrics. One song's lyrics I posted was this one - ===== 'Refugee' - 'Stationary Traveer' (lyrics by Susan Hoover) There's a rumour flying through the air Paranoia's creeping everywhere. You're gonna raise a wall - to draw the line You say you've got your reasons I hear them all the time You say it's talking treason and a crime ... to question why Don't you know I've seen this all before? History repeats itself once more. I don't want to go - and I can't stay You say you've got your reasons I hear them all the time You say it's talking treason and a crime ... to question why I don't want to be a refugee, I just want a single guarantee. I don't want to be a refugee I JUST WANT THE RIGHT TO DISAGREE. ===== Basicly, Russell is part of a right-wing gang working the Camelogue list. It is documented here - http://members.aol.com/whtsametau/ofir.html. It's called The Humpheads. When you get the the code - "&y", though, haven't updated that. Here's something I snuck to the Camelogue list - ===== 3) Fish. X-tian fish. You can find a real one here on &y's server (if not in the supposed user's address ;-) ) - http://www.roadkill.com/~dpgerdes/ But these guys don't like to do business with folk other than their own, that's why they use that symbol. Here's where &y's X-tian fish is - "&y". Take the & and remove the top loop of it in your mind, and it certainly looks MUCH like an X-tian fish! That's how I found &y's picture, I looked for that symbol on his server. You see, his compadres know what to look for. Can you say "right-wing conspiracy"? Sure, I knew ya could! ===== &y (Andy) Burnett is the "moderator nazi" (his words) of that list. He has no real info about himself on his facad server - Roadkill Consulting (www.roadkill.com). But he had a picture stashed (in a 5 meg movie) in a place that only his right-wing buddies (or someone observing the right-wing conspiracy) would think to click. On one of his supposed user's boring pages at the very bottom in fine print where he thanks "&y" for his webspace, and the "&y" is a link. So, if you also see a bunch of evidence against folk other than the Amway employee, remember, that Amway employee is part of a gang, and that accomplices in crimes are JUST as guilty as the actual trigger-person, therefore, you need to know what his compadres are also doing. Stan, 'Wall of Reality' Webring http://members.aol.com/RealityWal/ From troen444 at worldnet.att.net Sun May 31 17:57:39 1998 From: troen444 at worldnet.att.net (troen444 at worldnet.att.net) Date: Sun, 31 May 1998 17:57:39 -0700 (PDT) Subject: Earn $100 every time OUR phone rings... Message-ID: <199806010057.RAA03064@toad.com> ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!! $100 goes to you for EVERY sale that the company closes! Does the idea of making at least $1,000 per week beginning your 2nd week of doing business excite you? How about never having to sell a thing to your customer and never having to talk to ANYONE to make money? I don't know how this could get any easier. Take a look at my latest WEEKLY commission checks: http://www.cyberdue.com/fortune/ EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company! The number one home based business for the 2nd year in a row, Fortune 5000 is a member of the Better Business Bureau and the U.S. Chamber of Commerce. WHAT THIS BUSINESS WILL DO FOR YOU: * Handles all your calls, closes your sales, and sends you WEEKLY commission checks! * It pays you a $100 commission (that's over 50% of the total sale) for EVERY sale. CHECKS put $$$ in your pocket in less than your first week or two... Quick commission earnings build and maintain motivation. ALL YOU DO IS ADVERTISE the toll-free number and your ID number. * You can get STARTED TODAY. Just advertise the business toll-free number with your ID # and let this business CLOSE YOUR SALES every day... They do all the work and YOU GET PAID FOR IT! * You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds, Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets $10,000... not too bad. There is nothing else out there that will provide you with an immediate income beginning THIS WEEK with minimal effort. Before you call, I want you to think about the quality of the live operators handling your call. I am convinced you will not find a better team of closers for your own personal sales. You will clearly understand what I am talking about once you call. PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!! 1-800-811-2141 You will be asked for ID #50030 when you call. (Live operators are available from 8 AM-10 PM CST Monday through Saturday and will be able to answer any questions you may have.) Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951 or 888-731-3457 (all toll free). From waconsult at yahoo.com Sun May 31 21:24:26 1998 From: waconsult at yahoo.com (waconsult at yahoo.com) Date: Sun, 31 May 1998 21:24:26 -0700 (PDT) Subject: 4 U Message-ID: <> Hello there, I make a habit of deleting mail I have not yet read, as I'm sure you do also. Please read this one though, you might find this interesting. "I recently lost my high paying job from a major computer corporation due to their loss of a major contract. They messed up, but that whole department of 15 people including myself are hung out to dry. Corporate America at it's finest. I have not had luck yet finding another job, as my skills were very specific to that company and not really worth anything to another company. During the time I worked there, I also bought and sold real estate like those guys on TV. (yes, you can do that and make it work for you too) The key is I made it work. I was fairly successful until the 'Nightmare on Pleasant St.' as my friends and I call it ... I lost most of my money in that one bad deal and I was no longer financially secure and I relied heavily on my income from my FORMER JOB. As you've already heard, I lost that too and I started to look for other things I could make money to help me get back on my feet. So, I started to read all of the JUNK that people have mailed to me. Let me tell you, I can't believe some of the things out there ... what a waste of time. Until I saw this. Hold on. I know you are (like I was) ready to stop reading right here I implore you not to. I (like you) am NOT some non-educated fool. I have made much money for myself in Real Estate, which is not an easy business. I am a rather competent business man. At least finish reading this until the end. BETTER STILL: PRINT THIS LETTER AND READ IT IN COMFORT OVER, AND OVER. Here is what I saw ... * I only needed $20 extra dollars to try this * this is making money for people who at least tried a little, so why not me too? In desperation, I sent the four 5 dollar bills and got the reports. As I always have, I MADE this work for me too. I took much time and effort to learn about e-mail (which is a great and FREE tool!!) and how to send lots of it. 19 days after my first mailing of this, I have received roughly 8,450 responses. (trust me, when my fianc�e` saw 8,450 five dollar bills on the kitchen table, she no longer laughed at me for trying this)" Matthew of Basqiuat in Evanston, IL wrote. Here is a special offer to help you. When you order any of the reports from EDHAY, PO BOX 13511, Sacramento CA 95815 or as long as the above address is on the address list below, you will receive the step-by-step instructions on HOW YOU CAN MAKE $250,000 THROUGH THIS PROGRAM in addition to 10,000 e-mail addresses to start e-mailing your offers immediately. It took some time and expense to put this together so please add another $5 for handling the addresses and the instructions. They will come to you in a .txt format. You will get the list of addresses and instructions with your report. If you follow the directions in this e-mail and be prepared to eventually set aside about an hour each day to follow up (and count your money!), you will make it. You don't need to be a computer whiz, but I'll bet you already are. If you can open an envelope, remove the money, and send an e-mail message, then you're on your way to the bank. Take the time to read this so you'll understand how easy it is. If I can do this, so can you! SAVE THIS E-MAIL IN A FOLDER OF YOUR CHOICE BY CLICKING ON 'Save As' IN THE 'File' MENUE AT THE TOP LEFT CORNER OF THIS WINDOW. GIVE IT AN APPROPRIATE FILE NAME AND CHOOSE 'Plain Text' AS THE FILE TYPE FORMAT. THAT WAY, YOU WILL HAVE A COPY OF THIS FOR FUTURE USE. This is a LEGAL, MONEY-MAKING PHENOMENON. PRINT this letter, read the directions, THEN READ IT AGAIN!!! You are about to embark on the most profitable and unique program you may ever see. Many times over, it has demonstrated and proven its ability to generate large amounts of cash. This program is showing fantastic appeal with a huge and ever-growing on-line population desirous of additional income. This is a legitimate, LEGAL, money-making opportunity. It does not require you to come in contact with people, do any hard work, and best of all, you never have to leave the house, except to get the mail and go to the bank! This truly is that lucky break you've been waiting for! Simply follow the easy instructions in this letter, and your financial dreams will come true! When followed correctly, this electronic, multi-level marketing program works perfectly ... 100% EVERY TIME! Thousands of people have used this program to: - Raise capital to start their own business - Pay off debts - Buy homes, cars, etc., - Even retire! This is your chance, so don't pass it up! GO FOR IT NOW! Ed Hay ******* P R O G R A M O V E R V I E W ******* Basically, this is what we do: We send thousands of people a product for $5.00 that costs next to nothing to produce and e-mail. As with all multi-level businesses, we build our business by recruiting new partners and selling our products. Every state in the U.S. allows you to recruit new business online (via your computer). The products in this program are a series of four business and financial reports costing $5.00 each. Each order you receive via "snail mail" will include: * $5.00 cash * The name and number of the report they are ordering * The e-mail address where you will e-mail them the report they ordered To fill each order, you simply e-mail the product to the buyer. THAT'S IT! The $5.00 is yours! This is the EASIEST electronic business anywhere! FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE STAGGERING BENEFITS! ******* I N S T R U C T I O N S ******* This is what you MUST do: 1. Order all 4 reports shown on the list below (you can't sell them if you don't order them): * For each report, send $5.00 CASH, the NAME & NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR RETURN POSTAL ADDRESS (in case of a problem) to the person whose name appears on the list next to the report. * When you place your order, make sure you order each of the four reports. You will need all four reports so that you can save them on your computer and resell them. * Within a few days you will receive, via e-mail, each of the four reports. Save them on your computer so they will be accessible for you to send reports to the 1,000's of people who will order them from you. 2. IMPORTANT-- DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than is instructed below in steps "a" through "e" or you will lose out on the majority of your profits. Once you understand the way this works, you'll also see how it doesn't work if you change it. Remember, this method has been tested, and if you alter it, it will not work. a. Look below for the listing of available reports. b. After you've ordered the four reports, replace the name and address under REPORT #1 with your name and address, moving the one that was there down to REPORT #2. c. Move the name and address that was under REPORT #2 down to REPORT #3. d. Move the name and address that was under REPORT #3 down to REPORT #4. The name and address that was under REPORT #4 is removed from the list and has NO DOUBT collected their 50 grand. e. Please make sure you copy everyone's name and address ACCURATELY!!! 3. Take this entire letter, including the modified list of names, and save it to your computer. Make NO changes to the instruction portion of this letter. 4. Now you're ready to start an e-mail campaign on the World Wide Web! E-mailing is very, very inexpensive. You can buy e-mail lists for under $20/2,000 addresses or you can pay someone a minimal charge to take care of it for you. For additional $5, you will receive 10,000 e-mail addresses and the step-by-step instructions on HOW YOU CAN MAKE $250,000 through this program when you order any of the reports from me, EDHAY, PO BOX 13511, Sacramento CA 95815. START YOUR E-MAIL CAMPAIGN IMMEDIATELY! 5. For every $5.00 you receive from interested participants, all you must do is e-mail them the report they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This will guarantee that the e-mail THEY send out, with YOUR name and address on it, will be prompt because they can't send their e-mails until they receive the reports! ******* R E P O R T S ******* Notes: - ALWAYS SEND $5 CASH FOR EACH REPORT - Order Each REPORT by NUMBER and NAME - ALWAYS SEND YOUR ORDER VIA REGULAR MAIL - Make sure the cash is concealed by wrapping it in at least two sheets of paper - On one of those sheets of paper, include: (a)the number & name of the report you are ordering, (b)your e-mail address, and (c)your postal address. ______________________________________________ REPORT #1 "HOW TO REORGANIZE YOUR TIME TO ACCOMIDATE A HOME BASED BUSINESS" ORDER REPORT #1 FROM: WA Consult 2511 S Illinois Ave, Suite 35 Carbondale, IL 62901 ______________________________________________ REPORT #2 "MAJOR CORPORATIONS AND E-MAIL" ORDER REPORT #2 FROM: EDHAY PO BOX 13511 Sacramento, CA 95853 ______________________________________________ REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: SMINC 1435 Warner Street, Suite 8 Chico, CA 95926 ______________________________________________ REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS" ORDER REPORT #4 FROM: Basqiuat PO BOX 1663 Evanston, IL 60205 ______________________________________________ ******* H O W D O E S I T W O R K ? ******* Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people to participate on your first level. (Placing a lot of FREE ads on the internet will EASILY get a larger response.) Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline members. Follow this example to achieve the STAGGERING results below. 1st level--your 10 members with $5.........................$50 2nd level--10 members from those 10 ($5 x 100)............$500 3rd level--10 members from those 100 ($5 x 1,000).......$5,000 4th level--10 members from those 1,000 ($5 x 10,000)...$50,000 -------------------------------------------------------------- A TOTAL OF.............................................$55,550 -------------------------------------------------------------- Remember friends, this assumes that the people who participate only recruit 10 people each. Think for a moment what would happen if they got 20 people to participate! Most people get 100's of participants! THINK ABOUT IT! Your cost to participate in this is practically nothing (surely you can afford $20). You obviously already have an internet connection and e-mail is FREE!!! REPORT#3 shows you the most productive methods for bulk e-mailing and purchasing e-mail lists. Some list & bulk e-mail vendors even work on trade! About 50,000 new people get online every month! ******* T I P S F O R S U C C E S S ******* * TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the directions accurately. * Send for the four reports IMMEDIATELY so you will have them when the orders start coming in because when you receive a $5 order, you MUST send out the requested product/report to comply with the U.S. Postal & Lottery Laws, Title 18,Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also Code of Federal Regs. Vol. 16, Sections 255 and 436, which state that 'a product or service must be exchanged for money received.' * ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE. * Be patient and persistent with this program. If you follow the instructions exactly, the results WILL undoubtedly be SUCCESSFUL! * ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED ******* S U C C E S S G U I D E L I N E ******* Follow these guidelines to guarantee your success: * If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue advertising until you do. * Then, a couple of weeks later you should receive at least 100 orders for REPORT #2. If you don't, continue advertising until you do. * Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to roll in! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a DIFFERENT report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you If you want to generate more income, send another batch of e-mails and start the whole process again! There is no limit to the income you will generate from this business! NOTE: If you need help with starting a business, registering a business name, how income tax is handled, etc., contact your local office of the Small Business Administrations (a Federal agency) for free help and answer to questions. Also, the Internal Revenue Service offers free help via telephone and free seminars about business taxes. ******* T E S T I M O N I A L S ******* ______________________________________________ This program does work, but you must follow it EXACTLY! Especially the rule of not trying to place your name in a different position, it won't work and you'll lose a lot of potential income. I'm living proof that it works. It really is a great opportunity to make relatively easy money, with little cost to you. If you do choose to participate, follow the program exactly, and you'll be on your way to financial security. Sean McLaughlin, Jackson, MS ______________________________________________ My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a cost accountant with a major U.S. Corporation and I make pretty good money. When I received the program I grumbled to Doris about receiving "junk mail." I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I "knew" it wouldn't work. Doris totally ignored my supposed intelligence and jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you so" on her when the thing didn't work ... well, the laugh was on me! Within two weeks she had received over 50 responses. Within 45 days she had received over $147,200 in $5 bills! I was shocked! I was sure that I had it all figured and that it wouldn't work. I AM a believer now. I have joined Doris in her "hobby." I did have seven more years until retirement, but I think of the "rat race" and it's not for me. We owe it all to MLM. Frank T., Bel-Air, MD ______________________________________________ The main reason for this letter is to convince you that this system is honest, lawful, extremely profitable, and is a way to get a large amount of money in a short time. I was approached several times before I checked this out. I joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received $36,470.00 in the first 14 weeks, with money still coming in. Sincerely yours, Phillip A. Brown, Esq. ______________________________________________ Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative that I am, I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back. Boy, was I surprised when I found my medium-size post office box crammed with orders! For awhile, it got so overloaded that I had to start picking up my mail at the window. I'll make more money this year than any 10 years of my life before. The nice thing about this deal is that it doesn't matter where in the U.S. the people live. There simply isn't a better investment with a faster return. Mary Rockland, Lansing, MI ______________________________________________ I had received this program before. I deleted it, but later I wondered if I shouldn't have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed another program ... 11 months passed then it came ... I didn't delete this one! ... I made more than $41,000 on the first try!! D. Wilburn, Muncie, IN ______________________________________________ This is my third time to participate in this plan. We have quit our jobs, and will soon buy a home on the beach and live off the interest on our money. The only way on earth that this plan will work for you is if you do it. For your sake, and for your family's sake don't pass up this golden opportunity. Good luck and happy spending! Charles Fairchild, Spokane, WA ______________________________________________ ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM!!! If you are not interested, we apologize for the intrusion. From waconsult at yahoo.com Sun May 31 21:24:26 1998 From: waconsult at yahoo.com (waconsult at yahoo.com) Date: Sun, 31 May 1998 21:24:26 -0700 (PDT) Subject: 4 U Message-ID: <> Hello there, I make a habit of deleting mail I have not yet read, as I'm sure you do also. Please read this one though, you might find this interesting. "I recently lost my high paying job from a major computer corporation due to their loss of a major contract. They messed up, but that whole department of 15 people including myself are hung out to dry. Corporate America at it's finest. I have not had luck yet finding another job, as my skills were very specific to that company and not really worth anything to another company. During the time I worked there, I also bought and sold real estate like those guys on TV. (yes, you can do that and make it work for you too) The key is I made it work. I was fairly successful until the 'Nightmare on Pleasant St.' as my friends and I call it ... I lost most of my money in that one bad deal and I was no longer financially secure and I relied heavily on my income from my FORMER JOB. As you've already heard, I lost that too and I started to look for other things I could make money to help me get back on my feet. So, I started to read all of the JUNK that people have mailed to me. Let me tell you, I can't believe some of the things out there ... what a waste of time. Until I saw this. Hold on. I know you are (like I was) ready to stop reading right here I implore you not to. I (like you) am NOT some non-educated fool. I have made much money for myself in Real Estate, which is not an easy business. I am a rather competent business man. At least finish reading this until the end. BETTER STILL: PRINT THIS LETTER AND READ IT IN COMFORT OVER, AND OVER. Here is what I saw ... * I only needed $20 extra dollars to try this * this is making money for people who at least tried a little, so why not me too? In desperation, I sent the four 5 dollar bills and got the reports. As I always have, I MADE this work for me too. I took much time and effort to learn about e-mail (which is a great and FREE tool!!) and how to send lots of it. 19 days after my first mailing of this, I have received roughly 8,450 responses. (trust me, when my fianc�e` saw 8,450 five dollar bills on the kitchen table, she no longer laughed at me for trying this)" Matthew of Basqiuat in Evanston, IL wrote. Here is a special offer to help you. When you order any of the reports from EDHAY, PO BOX 13511, Sacramento CA 95815 or as long as the above address is on the address list below, you will receive the step-by-step instructions on HOW YOU CAN MAKE $250,000 THROUGH THIS PROGRAM in addition to 10,000 e-mail addresses to start e-mailing your offers immediately. It took some time and expense to put this together so please add another $5 for handling the addresses and the instructions. They will come to you in a .txt format. You will get the list of addresses and instructions with your report. If you follow the directions in this e-mail and be prepared to eventually set aside about an hour each day to follow up (and count your money!), you will make it. You don't need to be a computer whiz, but I'll bet you already are. If you can open an envelope, remove the money, and send an e-mail message, then you're on your way to the bank. Take the time to read this so you'll understand how easy it is. If I can do this, so can you! SAVE THIS E-MAIL IN A FOLDER OF YOUR CHOICE BY CLICKING ON 'Save As' IN THE 'File' MENUE AT THE TOP LEFT CORNER OF THIS WINDOW. GIVE IT AN APPROPRIATE FILE NAME AND CHOOSE 'Plain Text' AS THE FILE TYPE FORMAT. THAT WAY, YOU WILL HAVE A COPY OF THIS FOR FUTURE USE. This is a LEGAL, MONEY-MAKING PHENOMENON. PRINT this letter, read the directions, THEN READ IT AGAIN!!! You are about to embark on the most profitable and unique program you may ever see. Many times over, it has demonstrated and proven its ability to generate large amounts of cash. This program is showing fantastic appeal with a huge and ever-growing on-line population desirous of additional income. This is a legitimate, LEGAL, money-making opportunity. It does not require you to come in contact with people, do any hard work, and best of all, you never have to leave the house, except to get the mail and go to the bank! This truly is that lucky break you've been waiting for! Simply follow the easy instructions in this letter, and your financial dreams will come true! When followed correctly, this electronic, multi-level marketing program works perfectly ... 100% EVERY TIME! Thousands of people have used this program to: - Raise capital to start their own business - Pay off debts - Buy homes, cars, etc., - Even retire! This is your chance, so don't pass it up! GO FOR IT NOW! Ed Hay ******* P R O G R A M O V E R V I E W ******* Basically, this is what we do: We send thousands of people a product for $5.00 that costs next to nothing to produce and e-mail. As with all multi-level businesses, we build our business by recruiting new partners and selling our products. Every state in the U.S. allows you to recruit new business online (via your computer). The products in this program are a series of four business and financial reports costing $5.00 each. Each order you receive via "snail mail" will include: * $5.00 cash * The name and number of the report they are ordering * The e-mail address where you will e-mail them the report they ordered To fill each order, you simply e-mail the product to the buyer. THAT'S IT! The $5.00 is yours! This is the EASIEST electronic business anywhere! FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE STAGGERING BENEFITS! ******* I N S T R U C T I O N S ******* This is what you MUST do: 1. Order all 4 reports shown on the list below (you can't sell them if you don't order them): * For each report, send $5.00 CASH, the NAME & NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR RETURN POSTAL ADDRESS (in case of a problem) to the person whose name appears on the list next to the report. * When you place your order, make sure you order each of the four reports. You will need all four reports so that you can save them on your computer and resell them. * Within a few days you will receive, via e-mail, each of the four reports. Save them on your computer so they will be accessible for you to send reports to the 1,000's of people who will order them from you. 2. IMPORTANT-- DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than is instructed below in steps "a" through "e" or you will lose out on the majority of your profits. Once you understand the way this works, you'll also see how it doesn't work if you change it. Remember, this method has been tested, and if you alter it, it will not work. a. Look below for the listing of available reports. b. After you've ordered the four reports, replace the name and address under REPORT #1 with your name and address, moving the one that was there down to REPORT #2. c. Move the name and address that was under REPORT #2 down to REPORT #3. d. Move the name and address that was under REPORT #3 down to REPORT #4. The name and address that was under REPORT #4 is removed from the list and has NO DOUBT collected their 50 grand. e. Please make sure you copy everyone's name and address ACCURATELY!!! 3. Take this entire letter, including the modified list of names, and save it to your computer. Make NO changes to the instruction portion of this letter. 4. Now you're ready to start an e-mail campaign on the World Wide Web! E-mailing is very, very inexpensive. You can buy e-mail lists for under $20/2,000 addresses or you can pay someone a minimal charge to take care of it for you. For additional $5, you will receive 10,000 e-mail addresses and the step-by-step instructions on HOW YOU CAN MAKE $250,000 through this program when you order any of the reports from me, EDHAY, PO BOX 13511, Sacramento CA 95815. START YOUR E-MAIL CAMPAIGN IMMEDIATELY! 5. For every $5.00 you receive from interested participants, all you must do is e-mail them the report they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This will guarantee that the e-mail THEY send out, with YOUR name and address on it, will be prompt because they can't send their e-mails until they receive the reports! ******* R E P O R T S ******* Notes: - ALWAYS SEND $5 CASH FOR EACH REPORT - Order Each REPORT by NUMBER and NAME - ALWAYS SEND YOUR ORDER VIA REGULAR MAIL - Make sure the cash is concealed by wrapping it in at least two sheets of paper - On one of those sheets of paper, include: (a)the number & name of the report you are ordering, (b)your e-mail address, and (c)your postal address. ______________________________________________ REPORT #1 "HOW TO REORGANIZE YOUR TIME TO ACCOMIDATE A HOME BASED BUSINESS" ORDER REPORT #1 FROM: WA Consult 2511 S Illinois Ave, Suite 35 Carbondale, IL 62901 ______________________________________________ REPORT #2 "MAJOR CORPORATIONS AND E-MAIL" ORDER REPORT #2 FROM: EDHAY PO BOX 13511 Sacramento, CA 95853 ______________________________________________ REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: SMINC 1435 Warner Street, Suite 8 Chico, CA 95926 ______________________________________________ REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS" ORDER REPORT #4 FROM: Basqiuat PO BOX 1663 Evanston, IL 60205 ______________________________________________ ******* H O W D O E S I T W O R K ? ******* Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people to participate on your first level. (Placing a lot of FREE ads on the internet will EASILY get a larger response.) Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline members. Follow this example to achieve the STAGGERING results below. 1st level--your 10 members with $5.........................$50 2nd level--10 members from those 10 ($5 x 100)............$500 3rd level--10 members from those 100 ($5 x 1,000).......$5,000 4th level--10 members from those 1,000 ($5 x 10,000)...$50,000 -------------------------------------------------------------- A TOTAL OF.............................................$55,550 -------------------------------------------------------------- Remember friends, this assumes that the people who participate only recruit 10 people each. Think for a moment what would happen if they got 20 people to participate! Most people get 100's of participants! THINK ABOUT IT! Your cost to participate in this is practically nothing (surely you can afford $20). You obviously already have an internet connection and e-mail is FREE!!! REPORT#3 shows you the most productive methods for bulk e-mailing and purchasing e-mail lists. Some list & bulk e-mail vendors even work on trade! About 50,000 new people get online every month! ******* T I P S F O R S U C C E S S ******* * TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the directions accurately. * Send for the four reports IMMEDIATELY so you will have them when the orders start coming in because when you receive a $5 order, you MUST send out the requested product/report to comply with the U.S. Postal & Lottery Laws, Title 18,Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also Code of Federal Regs. Vol. 16, Sections 255 and 436, which state that 'a product or service must be exchanged for money received.' * ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE. * Be patient and persistent with this program. If you follow the instructions exactly, the results WILL undoubtedly be SUCCESSFUL! * ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED ******* S U C C E S S G U I D E L I N E ******* Follow these guidelines to guarantee your success: * If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue advertising until you do. * Then, a couple of weeks later you should receive at least 100 orders for REPORT #2. If you don't, continue advertising until you do. * Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to roll in! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a DIFFERENT report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you If you want to generate more income, send another batch of e-mails and start the whole process again! There is no limit to the income you will generate from this business! NOTE: If you need help with starting a business, registering a business name, how income tax is handled, etc., contact your local office of the Small Business Administrations (a Federal agency) for free help and answer to questions. Also, the Internal Revenue Service offers free help via telephone and free seminars about business taxes. ******* T E S T I M O N I A L S ******* ______________________________________________ This program does work, but you must follow it EXACTLY! Especially the rule of not trying to place your name in a different position, it won't work and you'll lose a lot of potential income. I'm living proof that it works. It really is a great opportunity to make relatively easy money, with little cost to you. If you do choose to participate, follow the program exactly, and you'll be on your way to financial security. Sean McLaughlin, Jackson, MS ______________________________________________ My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a cost accountant with a major U.S. Corporation and I make pretty good money. When I received the program I grumbled to Doris about receiving "junk mail." I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I "knew" it wouldn't work. Doris totally ignored my supposed intelligence and jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you so" on her when the thing didn't work ... well, the laugh was on me! Within two weeks she had received over 50 responses. Within 45 days she had received over $147,200 in $5 bills! I was shocked! I was sure that I had it all figured and that it wouldn't work. I AM a believer now. I have joined Doris in her "hobby." I did have seven more years until retirement, but I think of the "rat race" and it's not for me. We owe it all to MLM. Frank T., Bel-Air, MD ______________________________________________ The main reason for this letter is to convince you that this system is honest, lawful, extremely profitable, and is a way to get a large amount of money in a short time. I was approached several times before I checked this out. I joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received $36,470.00 in the first 14 weeks, with money still coming in. Sincerely yours, Phillip A. Brown, Esq. ______________________________________________ Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative that I am, I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back. Boy, was I surprised when I found my medium-size post office box crammed with orders! For awhile, it got so overloaded that I had to start picking up my mail at the window. I'll make more money this year than any 10 years of my life before. The nice thing about this deal is that it doesn't matter where in the U.S. the people live. There simply isn't a better investment with a faster return. Mary Rockland, Lansing, MI ______________________________________________ I had received this program before. I deleted it, but later I wondered if I shouldn't have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed another program ... 11 months passed then it came ... I didn't delete this one! ... I made more than $41,000 on the first try!! D. Wilburn, Muncie, IN ______________________________________________ This is my third time to participate in this plan. We have quit our jobs, and will soon buy a home on the beach and live off the interest on our money. The only way on earth that this plan will work for you is if you do it. For your sake, and for your family's sake don't pass up this golden opportunity. Good luck and happy spending! Charles Fairchild, Spokane, WA ______________________________________________ ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM!!! If you are not interested, we apologize for the intrusion. From nobody at REPLAY.COM Sun May 31 21:30:13 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 31 May 1998 21:30:13 -0700 (PDT) Subject: printed materials exports Message-ID: <199806010430.GAA16099@basement.replay.com> "A printed book or other printed material setting forth encryption source code is not itself subject to the EAR...." From I95 at nym.alias.net Sun May 31 17:19:55 1998 From: I95 at nym.alias.net (Interstate 95) Date: Mon, 1 Jun 1998 08:19:55 +0800 Subject: Lack of net access blows: Message-ID: <19980601001615.23933.qmail@nym.alias.net> On Thu, 28 May 1998, Nalus Optic wrote: > > Cyberpunks, > > Que pasa? My name is D and I am new to the list...I will most > likely just be lurking for a while, till I get a visit from the Duel > Pentium II 266, 128megs of RAM, running Linux on one PII and Win98 on the > Other Fariy...She should be along by the end of the summer... You mean one machine with dual processors? You can't run two operating systems concurrently on an SMP machine. You can install two operating systems and choose which one to run, of course. > Anywhoo, the point of the subject is that at this point and time > I don't have net access so I was hopeing someone out there would send me > the FAQ that is talked of in the welcome message. It can be found at: > > anonymous ftp to rtfm.mit.edu:pub/usenet-by-group/sci.crypt > > At least I think that is where it is at... > > I thank who ever is nice enough to send it to me...Also, maybe > post a message to me as soon as you send it...That way I don't end up > with like all of you sending it and Juno kicking my ass again for > flooding there box. This is complicated by the fact that there are several FAQs in that directory. One, combined, is 100K. Juno has a message limit of around 64K, meaning that the FAQ would have to be split, and I don't know what the upper limit is on the size of a mailspool at Juno. My suggestion is to sneak into a public university computer lab, sit down at a machine then FTP it and put it on a floppy. Most of the people in these labs don't ask questions because getting carded tends to really tick the students off. If they do, say you left your ID card in your car, that you're very sorry, that you usually don't get asked for it when you walk in, that you're taking class, that you only need about 5 minutes of time, and that you'll remember it next time. From verify at nytimes.com Sun May 31 17:23:57 1998 From: verify at nytimes.com (New York Times subscription robot) Date: Mon, 1 Jun 1998 08:23:57 +0800 Subject: Welcome to The New York Times on the Web Message-ID: <199805310413.AAA28990@content9a.nytimes.com> Welcome, nyt_blows, Thank you for registering for The New York Times on the Web. **************************** ABOUT YOUR REGISTRATION **************************** Your subscriber ID is nyt_blows You selected your password at registration. Your e-mail address is cypherpunks at toad.com We encourage you to print this message and save it for future reference. If you have any questions about your registration we can find your account using the ID and e-mail address listed above. Unless you chose otherwise, your ID and password have been saved on your computer so that you do not have to enter them each time you visit our site. Please keep in mind that you can enter this ID and password on any computer to reach our Web site, so if you change computers or install a new browser, there is no need to re-register. If you forget your password, please do not re-register. You can retrieve your password in the Help Center by clicking "Help" anywhere on the site. For more information about the site and your registration, please visit the Help Center at: http://www.nytimes.com/subscribe/help/ ***************************************** ABOUT THE NEW YORK TIMES ON THE WEB ***************************************** The New York Times on the Web combines the quality news coverage, authority and integrity of The New York Times with the immediacy, utility and depth of the Internet. Our site includes daily contents from The Times, news updates every ten minutes from the Associated Press and throughout the day from New York Times editors, a low-cost 365-day archive of New York Times articles, and original reporting exclusive to the Web in CyberTimes. The Times on the Web also features: ** Up-to-the-minute sports scores and statistics ** Current weather conditions and 5-day forecasts for over 1,500 cities worldwide ** A searchable library of more than 50,000 book reviews ** Custom stock portfolios ** Searchable Real Estate and Help Wanted listings ** Subscription service to the Crossword Puzzle, Bridge and Chess columns Thank you for registering. Visit us again soon at: http://www.nytimes.com ***************************************** Please do not reply to this message. If you did not authorize this registration, someone has mistakenly registered using your e-mail address. We regret the inconvenience; please FORWARD this message to cancel at nytimes.com and we will remove it from our records.