From jya at pipeline.com Fri May 1 07:07:46 1998
From: jya at pipeline.com (John Young)
Date: Fri, 1 May 1998 07:07:46 -0700 (PDT)
Subject: Ajtai Lattice Patent
Message-ID: <199805011407.KAA02703@dewdrop2.mindspring.com>
30 April 1998, Micropatent:
Cryptosystem employing worst-case difficult-to solve lattice
problem (Assignee -- International Business Machines
Corporation)
Abstract: A cryptosystem and cryptographic method are
provided for performing tasks such as encoding/decoding,
signing messages, and verifying identity. The system and
method employ a problem which is difficult to solve in the
worst case. Because of the worst-case nature of the
problem employed, a system and method according to the
invention has advantageous level of security, In a class of
preferred embodiments, the difficult problem is one of the
recognized difficult problems associated with the mathematical
theory of lattices. These problems include finding short
vectors and sets of basis vectors from a lattice. Cryptographic
protocols are performed, using these problems.
Ex Claim Text: A cryptographic communications system A
comprising: a communications channel; means for generating
a public key and a corresponding private key based on an
instance of a problem, the problem being difficult to solve in
the worst case, the instance of the problem being difficult to
solve, commensurate with the difficulty of the worst-case
solution of the problem; and means for performing a
cryptographic communication protocol, employing the public
and private keys generated by the means for generating, with
another cryptographic communications system B over the
communications channel.
Patent Number: 5737425
Issue Date: 1998 04 07
Inventor(s): Ajtai, Miklos
If you would like to purchase a copy of this patent, please call
MicroPatent at 800-648-6787.
From corvuscorvax at hotmail.com Fri May 1 08:34:52 1998
From: corvuscorvax at hotmail.com (Corvus Corvax)
Date: Fri, 1 May 1998 08:34:52 -0700 (PDT)
Subject: Bad, bad, bill
Message-ID: <19980501153418.25294.qmail@hotmail.com>
NYT this morning reports the that the Digital Millenium Copyright Act
was adopted by the Senate Judiciary Committee:
"WASHINGTON - The Senate Judiciary Committee on Thursday adopted the
Digital Millennium Copyright Act, which takes a new step toward
protecting creative content in cyberspace by outlawing the equipment
used to commit a copyright infringement, not just the act or intent of
illegally copying material.
...
Most visibly absent was any exemption for devices used in encryption
research, an issue Senate leaders said they hope to work out before the
bill goes to the floor. "
There's been a good deal of discussion of this issue around here, to be
sure. But I think maybe it bears repeating that even with some kind of
narrow exemption for "encryption research", this bill is conveniently
poised to be used not only against Evil Copyright Infringers, but also
against the kind of troublemakers that expose, for instance, the
deliberate weakening of GSM authentication.
Gawd. What bullshit.
571830573294323629934765012348436263285853260687657402192238
Corvus Corvax
324908584730535672342307543875016719214012473014020239437239
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
From billp at nmol.com Fri May 1 09:26:02 1998
From: billp at nmol.com (bill payne)
Date: Fri, 1 May 1998 09:26:02 -0700 (PDT)
Subject: US legal system
Message-ID: <3549F6B2.542F@nmol.com>
Friday 5/1/98 10:02 AM
Yaman Akdeniz
The US court system has largely deteriorated to become part of the US
Federal bureaucracy
[aka Big Brother ... or probably more accurate, the Great Satan
http://www.aci.net/kalliste/speccoll.htm and
http://caq.com/CAQ/caq63/caq63madsen.html].
1 Judges and court clerks try to do what they want whether it conflicts
with law or not.
2 Lawyers and the US court system attempt to make it appear that there
IS NO LEGAL
REMEDY POSSIBLE without hiring a lawyer. And the client will most
likely lose both
money and the case.
Morales and I [http://jya.com/whpfiles.htm] are trying to change 1 and
2.
Later
bill
Wednesday 4/1/98 11:02 AM
Certified Return receipt requested
Proctor Hug Jr
Chief Judge, Ninth Circuit
50 West Liberty
Street
Reno, NV 89501-1948
(702) 784-5631
784-5166 fax
Dear judge Hug:
Purposes of this letter-affidavit are to file criminal complaint affidavits against
1 judge Marilyn Hall Patel for not properly processing a criminal violation of the Privacy Act,
2 former Ninth Circuit chief judge J Clifford Wallace for not properly processing criminal complaint affidavits for
a felony perjury violation by Sandia National Laboratories lawyer Gregory Cone,
b judge Fern Smith for not properly processing a felony perjury violation by Sandia National Laboratories
lawyer Gregory Cone.
c Albuquerque FBI special agent in charge Thomas Kneir for sending FBI agents Kohl and Schum to my
home in an attempt to intimidate me from exercising my civil rights.
d Margret D. Thomas, Judicial Assistant to the Honorable Marilyn Hall Patel, for not forwarding a valid
criminal complaint affidavit regarding a criminal violation of the Privacy Act to Patel.
Brief history would be valuable for your understanding of this matter.
Sandia has long been involved with the security of America's nuclear arsenal. As they announce on their website: "We are funded primarily by the U.S. Department of Energy to design all the non-nuclear opponents of the nation's nuclear weapons"
http://www.sandia.gov/">http://www.sandia.gov/).
This includes the cryptographic locks used to secure the nukes.
NSA supplies the algorithms and implementation guidelines to Sandia.
http://www.aci.net/kalliste/nukearse.htm
In about 1982 I became project leader of the Missile Secure Cryptographic Unit [MSCU].
The MSCU was funded by the National Security Agency [NSA].
As a result of my about 4 year work with NSA, I was given access to its cryptographic algorithms by one document and many electronic schematics.
I wrote a book
ISBN: 0125475705
Title: Embedded Controller Forth For The 8051 Family
Author: Payne
Cover: Hardback/Cloth
Imprint: Academic Press
Published: September 1990
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
about the software technology we used for the MSCU.
In 1986 I transferred to build the data authenticator for the Department of Energy's Deployable Seismic Verification System [DSVS]for the Comprehensive Test Ban Treaty [CTBT].
NSA liaison for the DSVS/CTBT project offered information to me that NSA regarded former president Reagan as one of the US's foremost traitors for the reason
First, U.S. President Ronald Reagan informed the world on national television that the United States was
reading Libyan communications. This admission was part of a speech justifying the retaliatory bombing of
Libya for its alleged involvement in the La Belle discotheque bombing in Berlin's Schoeneberg district,
where two U.S. soldiers and a Turkish woman were killed, and 200 others injured. Reagan wasn't talking
about American monitoring of Libyan news broadcasts. Rather, his "direct, precise, and undeniable proof"
referred to secret (encrypted) diplomatic communication between Tripoli and the Libyan embassy in East
Berlin.
http://www.aci.net/kalliste/speccoll.htm
which is further explained at http://caq.com/CAQ/caq63/caq63madsen.html
It may be the greatest intelligence scam of the century: For decades, the US has routinely intercepted and
deciphered top secret encrypted messages of 120 countries.
In early 1992 a Sandia labs director decided that he and his subordinates were going to enter the data authentication business.
The director transferred me to break electronic locks for the Federal Bureau of Investigation.
This work was funded by the FBI/Engineering Research Facility [FBI/ERF], Quantico, VA.
I ordered about $200,000 of the FBI/ERF's money buying two copies of electronic locks.
One lock I ordered was the Hirsch Scramblepad electronic lock.
In about 1991 I was following progress of lawsuits in the district of Northern California,
The first two cases to directly address the issue of intermediate copying both originated in California's
Northern District Court. They are Atari v. Nintendo and Sega v. Accolade. In both cases, the district court
found that intermediate copying was NOT fair use.
[The New Use of Fair Use: Accessing Copyrighted Programs Through
Reverse Engineering, Stephen B. Maebius, Journal of the Patent and
Trademark Office Society, June 1993, 75, n6, p433]
Judge Fern Smith presided in both cases.
Reason I was following Atari v Nintendo was that I my Forth book I have two chapters on reverse engineering software.
One chapter contains a computer program which copied a ROM BIOS to diskette.
Smith's decisions made my intermediate copying program illegal.
In a strong opinion she [Fern Smith] wrote in March 1991, when granting Nintendo's request for a
preliminary injunction against Atari, she lambasted Atari's lawyers for thievery.
I was given the job assignment to copy the ROMs of Hirsch's 8051-based Scramblepad electronic lock to reverse engineer them to hopefully allow me to modify the locks for allow surreptitious entry.
I refused to engage in illegal activity for the FBI.
The termination letter seen at http://jya.com/whpfiles.htm states
This is to advise you that effective July 27, 1992, you will be terminated from Sandia National Laboratories.
This action is the results of your flagrant attack on a valued Sandia customer and repeated insensitivity to
security/classification requirement. These acts violate Sandia National Laboratories Code of Conduct,
specifically the Personal Conduct section,, and the Safeguarding Information and Records Section. ...
for my whistleblowing SAND report on the National Security Agency's deficient work and refusing to mark classified on a report I and Danny Drummond wrote on how to fake Wiegand Wire access entry credentials for the FBI.
Both I and my EEOC complaint officer Ray Armenta were never able to determine exactly why I was fired.
However March 22, 1997 I received copies of the enclosed
1 April 15, 1994 letter to EEOC director Charles Burtner from Sandia Diversity Leadership director
Michael G. Robles.
2 July 27, 1997 Termination of Employment memorandum containing my signature.
3 DISCIPLINARY REVIEW COMMITTEE MINUTES, July 16, 1992.
4 DISCIPLINARY REVIEW COMMITTEE MINUTES, July 6, 1989.
5 September 6, 1995 letter from EEOC Investigator Larry J.
Trujillo to Richard Gallegos.
from Sandian Richard Gallegos.
Sandia lawyer Harold Folley previously stated that no documents existed.
The Privacy Act states
(d) Access to Records.--Each agency that maintains a system
of records shall--
(1) upon request by any individual to gain access
to his record or to any information pertaining to him
which is contained in the system, permit him and upon
his request, a person of his own choosing to accompany
him, to review the record and have a copy made of all
or any portion thereof in a form comprehensible to him,
except that the agency may require the individual to
furnish a written statement authorizing discussion of
that individual's record in the accompanying person's
presence;
The Sandia Disciplinary Review Committee NEVER interviewed me to check the veracity of their statements.
The Privacy Act states
(2) permit the individual to request amendment of a record pertaining to
him and--
The statements in the SDRC are incorrect. I followed all Sandia procedures known to me. I did nothing wrong.
I had no opportunity to defend myself. My rights guaranteed under the Constitution, Bill of Rights, Article XIV.
Section 1. All persons born or naturalized in the United States, and
subject to the jurisdiction thereof, are citizens of the United States
and of the State wherein they reside. No State shall make or enforce any
law which shall abridge the privileges or immunities of citizens of the
United States; nor shall any State deprive any person of life, liberty,
or property, without due process of law; nor deny to any person within
its jurisdiction the equal protection of the laws.
have been violated.
C My permission was never asked to release these records to Gallegos.
As you may realize about the Privacy Act
(b) Conditions of Disclosure.--No agency shall disclose any
record which is contained in a system of records by any means
of communication to any person, or to another agency, except
pursuant to a written request by, or with the prior written
consent of, the individual to whom the record pertains ...
The Privacy Act allows imposition of criminal penalties for those like members of the SDRC, Robles, Burtner, and Trujillo who
(i)(1) Criminal Penalties.--Any officer or employee of an
agency, who by virtue of his employment or official position,
has possession of, or access to, agency records which contain
individually identifiable information the disclosure of which
is prohibited by this section or by rules or regulations
established thereunder, and who knowing that disclosure of the
specific material is so prohibited, willfully discloses the
material in any manner to any person or agency not entitled to
receive it, shall be guilty of a misdemeanor and fined not more
than $5,000.
(2) Any officer or employee of any agency who willfully
maintains a system of records without meeting the notice
requirements of subsection (e)(4) of this section shall be
guilty of a misdemeanor and fined not more than $5,000.
I forward criminal complaint affidavits on the above individuals to selected magistrate judge Marilyn Hall Patel.
Patel ignored my complaints.
I return to the subject of breaking electronic locks for the FBI/ERF.
Smith's two decisions were overturned on appeal.
However, both cases have been overruled on appeal. In the
ground-breaking Atari decision, the Federal Circuit held
that intermediate copying was a fair use. The Sega
decision, which was appealed to the Ninth Circuit Court of
Appeals, similarly overruled the district court and held
that intermediate copying may be fair use.
Sandia patents and trademark lawyer Gregory A. Cone in the enclosed affidavit for a ADEA lawsuit I filed in the District of New Mexico stated
AFFIDAVIT OF GREGORY A. CONE
Gregory A. Cone, being duly sworn, deposes and states:
1. I am employed by Sandia Corporation. I am an attorney
admitted to practice law in the State of California and before the
U. S. Patent and Trademark Office and concentrate on legal issues
related to patent and copyright law. In that capacity, I am
familiar with activities at the Sandia National Laboratories
("Sandia") as they related to what is sometimes referred to as
"reverse engineering ." ...
[I]t is the general view at Sandia that disassembly of "object
code" under such circumstances constitutes a "fair use" of
copyrighted software under 17 U.S.C. article 107 and is thus
permissible. Sandia bases its view on Sega Enterprises v.
Accolade, Inc. 977 F.2d 1510, 24 U.S.P. Q. 2d 1561 (9th Cir.
1992), amended, 1993 U. S. App. LEXIS 78, and Atari Games Corp
v. Nintendo of America, Inc, 975 F.2d 832 (Fed. Cir.
1992). ...
FURTHER, Affidavit sayeth naught.
(signed)
GREGORY A. CONE
SUBSCRIBED, SWORN TO and ACKNOWLEDGED before me on this 12th
day of August, 1993, by Gregory A. Cone."
(signed)
Mary A. Resnick
Notary Public
My Commission Expires:
2-7-94
Cone has the two citations reversed. The U. S. Patent Quarterly references the Atari v Nintendo lawsuit 1510 should be corrected to 1015.
Cone issued the above affidavit to District of New Mexico federal court in attempt to show that I had no legal reason to refuse to reverse engineer the Hirsch Scramblepad electronic lock.
I was covered under 10 C.F.R. 708 - DOE CONTRACTOR EMPLOYEE PROTECTION PROGRAM for my refusal to reverse engineer the Hirsch Scramblepad code.
708.1 Purpose,
This part establishes procedures for timely and effective
processing of complaints by employees of contractors performing
work at sites owned or leased by the Department of Energy (DOE),
concerning alleged discriminatory actions taken by their employers
in retaliation for the disclosure of information relative to health
and safety, mismanagement, and other matters as provided in 708.5(a),
for participation in proceeding before Congress, or for the refusal
to engage in illegal or dangerous activities." ...
Cone's affidavit attempts to create the appearance that reverse engineering was legal before July 27, 1992, the date of my firing.
Title 18, Chapter 79, Article 1623 felony perjury.
Article 1623 - False declarations before grand jury or court
(a) Whoever under oath (or in any declaration, certificate,
verification, or statement under penalty of perjury as permitted
under section 1746 of title 28, United States Code) in any
proceeding before or ancillary to any court or grand jury of
the United States knowingly make any false material declaration
or makes or uses any other information, including any book, paper,
document, record, recording, or other material, knowing the same
to contain any false material declaration, shall be fined not more
than $10,000 or imprisoned not more than five years, or both.
Decision of the Atari Games Corp. v. Nintendo of America appeal cited at page 1016 from 24 USPQ 2d was Decided SEPTEMBER 10, 1992.
I was fired JULY 27, 1992 so my work assignment was illegal at the time I refused.
Therefore, Cone committed felony perjury IN WRITING filed with New Mexico District Federal Court.
Chronological review of criminal complaint affidavits would be valuable before I present the current criminal complaint affidavits.
1 Monday March 11, 1996 10:05 I wrote judge Fern Smith a certified return receipt requested letter to ask her to either arrange or personally indict Sandia lawyer Cone for felony perjury.
Smith did not respond.
2 Friday May 31, 1996 08:58 I write the criminal complaint affidavit for the arrest of Sandia lawyer Cone and appoint judge Fern Smith as magistrate.
3 Thursday June 13 on orders of Smith and Albuquerque FBI special agent in charge Thomas Kneir FBI agents Kohl and Schum visited my home at 17:08 to investigate me for sending letters referenced in 1 and 2 to Smith.
4 In response to 3 on Tuesday July 9, 1996 06:52 I filed criminal complaint affidavit against Cone, again, for felony perjury with J. Clifford Wallace, chief judge, Ninth Circuit Court of Appeals.
Smith for
� 4. Misprision of felony
Whoever, having knowledge of the actual commission of a felony cognizable
by a court of the United States, conceals and does not as soon as possible make
known the same to some judge or other person in civil or military authority under the
United States, shall be fined under this title or imprisoned not more than three years,
or both.
for Smith's failure to properly process Cone's felony perjury and
� 241. Conspiracy against rights
If two or more persons conspire to injure, oppress, threaten, or
intimidate any person in any State, Territory, or District in
the free exercise or enjoyment of any right or privilege secured to him
by the Constitution or laws of the United States, or because of his
having so exercised the same; ...
for sending, with Knier, FBI agents Kohl and Schum to my home in an attempt to intimidate me.
Knier for Conspiracy against rights for his complicity with Smith.
5 Monday July 15, 1996 06:23 I write Wallace again inquiring why he has not
responded.
6 August 15, 1996 Thursday Ms. Corina Orozco, Deputy Clerk, Ninth Circuit
Court of Appeals writes me to tell me
In the future, all correspondence should be addressed to the
Clerk of the Court. Do not address any correspondence to
any one specific judge of this court.
7 September 12, 1996 06:20 I inform Orozco by letter that she is obstructing justice. I ask Orozco to desist.
8 July 25, 1996 Senior Case Expeditor [sic], Gwen Baptiste from the Office of the Clerk, United States Court of Appeals for The Ninth Circuit, writes
Re: Complaint of Judicial Misconduct
We have received your complaint of judicial misconduct.
Pursuant to the Rules of the Judicial Council of the Ninth
Circuit Governing Complaints of Judicial Misconduct or
Disability, you complaint is being returned to you for
compliance with the above rules. A copy of these rules is
enclosed. To understand the purpose of the procedure and
who may be complaint about please refer to Rules 1 and 2.
9 Wednesday September 18, 1996 11:05 by certified, return receipt requested mail I write Wallace again told tell him
Lawyer Wallace, I did not intend to file or did I file a
complaint of judicial misconduct.
Lawyer Wallace, I filed a criminal complaint affidavit as I have
a right to as a citizen of the United States of America when the
criminal acts are committed by government personnel, their
contractors, Department of Justice and judicial personnel.
10 Wednesday November 27, 1996 09:18 I wrote certified, return receipt requested letter to inform Wallace
Purpose of this letter is to inform you of consequences of your failure
to perform your duties as required by law as magistrate judge. You are
committing felony violations of law.
and
If I have not complied with all applicable rules, then I ask that you
inform me of any non-compliance so that I can correct my criminal
complaints and re-submit them.
I satisfied the requirement of the Constitution and Rules 3 and 4, and
issued written and sworn complaints that set forth the essential facts
constituting the offenses charged against Smith, Kneir, and Cone. I
also showed facts showing that the offenses were committed by Smith,
Kneir and Cone and these individuals committed them.
So I ask that you do your job and proceed with supervision of the
arrest and prosecution of Smith, Kneir, and Cone for title 18 felony
violations of law.
11 Monday March 24, 1997 17:57 I write a certified - return receipt requested letter to Marilyn Hall Patel, District Judge; California, Northern to inform her she has been selected as magistrate to process the criminal complaint affidavit against Sandia Diversity Director Michael G. Robles for sending the enclosed SDRC report to Burtner of EEOC.
Robles did this without my written permission and without checking the accuracy of the information. The information contained in the SDRC report is false and defaming.
12 Monday April 21, 1997 13:44 I write Patel a certified - return receipt requested letter containing a criminal complaint affidavit against Charles L Burtner, Director, U.S. Equal Employment Opportunity Commission [EEOC] Larry J. Trujillo, Investigator, Phoenix District Office for sending the false and libelous enclosed documents to Richard Gallegos in Albuquerque without my written consent.
13 Thursday May 8, 1997 06:30 I write a certified - return receipt requested to Patel containing
Purpose of this letter is to file a criminal complaint
affidavit against Sandia National Laboratories [Sandia]
Disciplinary Review Committee members and attendees G. H.
Libman, R.A. Polocasz, D. B. Davis, M. E. Courtney,
W. R. Geer, C. A. Searls, J. D. Giachino, R. L. Ewing,
A. M. Torneby, R. B. Craner, C. W. Childers, E. Dunckel,
D. S. Miyoshi, J. J McAuliffe, J. D. Martin, and R. C.
Bonner for violation of the criminal penalties section of
the Privacy Act, 5 USC 552a(i)(2) and Title 18 felony
violations of Civil Rights, Section 241, Conspiracy against
right to citizens.
for their roles in maintaining an illegal system of records.
Sandia refused to acknowledge existence of the enclosed SDRC report and for denying my rights guaranteed under the Constitution.
I was never interviewed by the SDRC committee or had any chance to defend my self against the false and defaming claims of the SDRC.
14 Friday June 13, 1997 12:41 I write a certified, return receipt requested to Wallace containing a criminal complaint affidavit against Margret D. Thomas, Judicial Assistant to the Honorable
Marilyn Hall Patel for violating
� 1512. Tampering with a witness, victim, or an informant ...
(C) prevent the communication by any person to a law enforcement officer
or judge of the United States of information relating to the commission
or possible commission of a Federal offense ...
(3) hinder, delay, or prevent the communication to a law enforcement
officer or judge of the United States of information relating to the
commission or possible commission of a Federal offense ...
shall be fined under this title or imprisoned not more than ten years, or
both.
for writing on May 9, 1997
Dear Mr. Payne:
We are in receipt of your recent letters. Please
be advised that we do not issue warrants on criminal
proceeding absent an indictment, information or complaint
initiated by the United States Attorney. For this reason,
and by copy of this letter, we are referring this matter
to that office. Any future correspondence concerning these
events should be sent to the United States Attorney and not
to judge Patel. Thank you.
Very truly yours,
MARGARET D. THOMAS
Judicial Assistant to the Honorable
Marilyn Hall Patel
cc: Joel Levin
Criminal Section
Assistant United States Attorney
Judge Hug, Rule 3 of the Federal Rules of Criminal Procedure, entitled the Complaint provides:
The complaint is a written statement of the essential facts constituting the offense charged. It shall be
made upon oath before a magistrate.
As you may be aware,
An individual may "make a written complaint on oath before an examining and committing magistrate, and
obtain a warrant of arrest." This is in conformity with the Federal Constitution, and "consonant with the
principles of natural justice and personal liberty found in the common law."
[United States v Kilpatrick (1883, DC NC) 16G 765, 769]
You may also be aware,
A complaint though quite general in terms is valid if it sufficiently apprises the defendant of the nature of
the offense with which he is charged.
[United States v Wood (1927, DC Tex) 26F2d 908, 910, affd
(CA5 Tex) 26 F2d 912.]
And for your edification,
The commission of a crime must be shown by facts positively stated. The oath or affirmation required is of
facts and not opinions or conclusion.
[United States ex rel. King v Gokey (1929, DC NY) 32 F2d
93, 794]
The complaint must be accompanied by an oath.
[Re Rules of Court (1877, CC Ga) 3 Woods 502, F Cas No
2126]
A complaint must be sworn to before a commissioner or other officer empowered to commit persons
charged with offenses against the United States.
[United States v Bierley ( 1971, WD Pa) 331 F Supp 1182]
Such office is now called a magistrate.
A complaint is ordinarily made by an investigating officer or agent, and where private citizens seek
warrants of arrest, the practice recommended by the Judicial Conference of the United
States is to refer the complaint to the United States Attorney. However, further reference to him is
rendered futile where a mandamus proceeding is brought to compel him to prosecute and
he opposes the proceeding.
[Pugach v Klein (1961, SD NY) 193 F Supp 630, citing Manual
for United States Commissioners 5 (1948)]
Any attempt to bring criminal complaints to government authorities would, of course, be futile.
I am a citizen of the United States and, judge Hug, you are the assigned magistrate.
In order to satisfy the requirement of the Constitution and Rules 3 and 4, a written and sworn complaint
should set forth the essential facts constituting the offense charged and also facts showing that the offense
was committed and that the defendant committed it.
And,
As to the requirement that the complaint be made on personal knowledge of the complainant, it is enough
for the issuance of a warrant that a complainant shows it to be on the knowledge of the complainant.
[Giordenello v United States (1958) 357 US 480, 2 L Ed. 2d
1503, 78 S Ct 1245, rev. (Ca5 Tx) 241 F2d 575, 579 in accord
Rice v Ames (1901) 180 US 371, 45 L Ed 577, 21 S ct 406, and
United States v Walker, (1952, CA2 NY) 197 F 2d 287, 289,
cert den 344 US 877, 97 L Ed 679, 73 S Ct 172]
So as to keep contiguous the requirements of the law ad the criminal complaint affidavit, I will include these complaints in this letter to you.
CRIMINAL COMPLAINT AFFIDAVIT: J Clifford Wallace
Essential material facts are:
1 Tuesday July 9, 1996 06:52 Payne files criminal complaint affidavit on Sandia lawyer Cone for felony perjury with J Clifford Wallace, chief judge, Ninth Circuit Court of Appeals and judge Fern Smith for
Misprision of felony for failure to prosecute Cone and Conspiracy against rights for sending, with FBI Albuquerque agent-in-charge Knier, FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne.
2 Repeated attempts by certified return receipt requested mail to urge Wallace to do his job enumerated to 5-10 and 14 above in this letter go unanswered.
Count 1 Wallace made no attempt to bring lawyer Cone to justice despite possessing WRITTEN evidence of criminal activity. Therefore, Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process criminal complaint affidavit.
Count 2 Wallace made no attempt to bring judge Fern Smith to justice despite possessing WRITTEN evidence of misprision of felony for not properly processing the criminal complaint affidavit against lawyer Cone and � 1512. Tampering with a witness, victim, or an informant for sending FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. Therefore , Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit.
Count 3 Wallace made no attempt to bring FBI agent-in-charge to justice for violation of � 1512. Tampering with a witness, victim, or an informant for sending FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit.
Count 4 Wallace made no attempt to bring MARGARET D. THOMAS to justice for violation of � 1512. Tampering with a witness, victim, or an informant ... for writing Thomas' May 9, 1997 to Payne. Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit.
VERIFICATION
Under penalty of perjury as provided by law, the undersigned certifies pursuant to 28 USC section
1746 that material factual statements set forth in this criminal complaint are true and correct, except
as to any matters therein stated to be information and belief of such matters the undersigned certifies
as aforesaid that the undersigned verily believes the same to be true.
Date William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
505-292-7037
CRIMINAL COMPLAINT AFFIDAVIT: Marilyn Hall Patel
Essential material facts are:
1 Patel failed to respond to certified return receipt requested criminal complaint affidavits specified in 11 - 13 in this letter.
Count 1 Patel made did not properly process criminal complaint affidavits despite being in possession of documents showing criminal violations of the Privacy Act and violation of civil rights. Therefore, Patel is charged with Title 18 � 4. Misprision of felony for Patel's failure to properly process criminal complaint affidavits.
VERIFICATION
Under penalty of perjury as provided by law, the undersigned certifies pursuant to 28 USC section
1746 that material factual statements set forth in this criminal complaint are true and correct, except
as to any matters therein stated to be information and belief of such matters the undersigned certifies
as aforesaid that the undersigned verily believes the same to be true.
Date William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
505-292-7037
Judge Hug, I have been extremely patient with judges and clerks of the district of Northern California and Ninth Circuit.
Criminal compliant affidavits were filed between March 11, 1996 and June 13, 1997.
Nothing has happened as of April 1, 1998.
I ask that you
1 issue warrants of arrest or
2 inform me why you cannot proceed to do what I request
within 60 calendar days.
Smith's case is particularly egregious.
Smith and Albuquerque FBI agent in charge James K. Weber, who replaced Kneir, sent US Marshals Lester and Lopez to my home on January 24, 1997 in a second attempt to intimidate me.
Anotin Scalia was appointed magistrate to process criminal complaint affidavits against Smith and others for the second intimidation attempt.
Sincerely,
William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
VERIFICATION
Under penalty of perjury as provided by law, the undersigned certifies pursuant to 28 USC section
1746 that material factual statements set forth in this criminal complaint are true and correct, except
as to any matters therein stated to be information and belief of such matters the undersigned certifies
as aforesaid that the undersigned verily believes the same to be true.
Date William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
505-292-7037
Enclosures
Privacy Act criminal violation documents, 11 pages
AFFIDAVIT OF GREGORY A. CONE, 4 pages
May 9, 1997 letter from MARGARET D. THOMAS, 1 page
13
Friday 5/1/98 9:48 AM
Certified Return receipt requested
Cathy A Catterson, Clerk
Ninth Circuit Court of Appeals
121 Spear Street
POB 193939
San Francisco, CA 94119-9800
415 744 9800
Dear Clerk Catterson:
Purpose of this letter is to discover the REASON the criminal complaint addressed
to Ninth circuit judge Proctor Hug Jr dated Wednesday 4/1/98 11:02 AM was
returned to me WITHOUT COVER LETTER.
I attach a copy of the envelope the above material was enclosed.
Return address is
CLERK, U.S. COURT OF APPEALS
P.O. BOX 547
SAN FRANCISCO, CA 94101-0547
OFFICIAL BUSINESS
PENALTY FOR PRIVATE USE, 300
Postmark is SAN FRANCISCO, CALIF APR 24 98 U.S. POSTAGE $2.62
METER 504753.
The envelope is hand-addressed and stamped CONFIDENTIAL.
Since no cover letter was enclosed to explain the return of what I believe is
both a valid and lawful criminal complaint affidavit supported by WRITTEN
EVIDENCE, some even in FILED court documents, I feel we must investigate
to discover the REASON.
All of the accused are federal employees or contractor employees.
Possibility exists that return of the enclosed criminal complaint affidavit without
cover letter stating the REASON may indicate violation of Title 18
� 1512. Tampering with a witness, victim, or an informant
[(b)] Whoever knowingly ... corruptly persuades another person, or attempts to do so, or engages in
misleading conduct toward another person, with intent to - ...
(2) cause or induce any person to -
(A) withhold testimony, or withhold a record, document, or other object, from an
official proceeding; ...
(3) hinder, delay, or prevent the communication to a law enforcement officer or judge of the United
States of information relating to the commission or possible commission of a Federal offense ...
shall be fined under this title or imprisoned not more than ten years, or both.
(c) Whoever intentionally harasses another person and thereby hinders, delays, prevents, or dissuades any
person from - ...
(2) reporting to a law enforcement officer or judge of the United States the commission or possible
commission of a Federal offense ... or attempts to do so, shall be fined under this title or imprisoned not
more than one year, or both.
Clerk Catterson, you may be aware that under � 1512
(d) In a prosecution for an offense under this section, it is an affirmative defense, as to which the defendant
has the burden of proof by a preponderance of the evidence, that the conduct consisted solely of lawful
conduct ...
Therefore, I ask that you investigate to discover WHO returned the enclosed criminal complaint affidavit to
me.
And report the REASON the criminal complaint affidavit was returned to me.
I ask that you respond within 30 days.
Sincerely,
William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
2
From jya at pipeline.com Fri May 1 10:40:35 1998
From: jya at pipeline.com (John Young)
Date: Fri, 1 May 1998 10:40:35 -0700 (PDT)
Subject: Reno reports "suspicion" in industry crypto-negotiations
In-Reply-To: <199805011541.RAA23552@basement.replay.com>
Message-ID: <199805011740.NAA22381@dewdrop2.mindspring.com>
Daley's statement on crypto export has been pulled from the DoC
Public Affairs Web site, as noted in Peter Junger's latest filing,
in which the vanished statement is cited as support for lifting
suspicious back-scratch dealings like ACP's.
http://jya.com/pdj9.htm
What's the latest on publicizing the several ACP drafts floating
around "industry and agencies" for comment on what TLAs and
ACP are rigging in the public interest.
Weren't some of these stalking drafts nearly liberated recently?
Or were they only floated for trusted eyes only?
Congressional hearings are due shortly to air the stench.
As Entrust said in defense of its patenting what was thought
to be in the public interest: "Encryption is no longer an academic
pursuit, now it's very big business."
RSA, NAI, Entrust, ACP, TLA, take your pick, not that there's much
diff where "national economic security" interest surpasses the public.
From rah at shipwright.com Fri May 1 11:49:10 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Fri, 1 May 1998 11:49:10 -0700 (PDT)
Subject: db$: The Wright Brothers vs. Chixalub
Message-ID:
--- begin forwarded text
X-Sender: rah at pop.sneaker.net (Unverified)
Mime-Version: 1.0
Date: Thu, 30 Apr 1998 17:50:18 -0400
To: e$@vmeng.com
From: Robert Hettinga
Subject: db$: The Wright Brothers vs. Chixalub
Sender:
Precedence: Bulk
List-Subscribe:
--- begin forwarded text
X-Sender: rah at pop.sneaker.net (Unverified)
Mime-Version: 1.0
Date: Thu, 30 Apr 1998 15:26:30 -0400
To: Digital Bearer Settlement List
From: Robert Hettinga
Subject: db$: The Wright Brothers vs. Chixalub
Sender:
Precedence: Bulk
List-Subscribe:
X-Web-Archive: http://www.philodox.com/dbs-archive/
You might notice that the tag on this one says "db$". That's to
differentiate it from my "e$" rants, which might be more general than ones
like this one, which is on digital bearer settlement. I think there is lots
of talk about electronic commerce and e$ these days from whole bunches of
people, and, as a consequence, my interest in it has focused more onto the
issue of digital bearer settlement. You'll probably be seeing more db$
tags than e$ tags on my rants going forward.
All of which brings me to some obversations I've been making in public
about blind signatures lately, and the excellent time I had at Ed Yeardon's
Cutter Consortium "Summit" conference the past few days.
Let's start with yet another aviation analogy about Digicash, shall we? :-).
Remember, I like to do that.
Once I compared privacy to flight, and said that, like flight, lots of
people had died getting strong cryptography to work, and that privacy
itself was an inherent good. The thing which actually got people to use the
technology, however, was its commercial value. It wasn't the joy of flight
or slipping the surly bounds of earth at Kitty Hawk that got people into
the air, it was coach fare to Dayton. It was digital commerce, and thus
financial cryptography, which created the most privacy. Digital Commerce is
financial cryptography, financial cryptography is strong cryptography, and
all that.
Then there's my analogy of book-entry settlement as Boyle's law (partial
pressure of gasses?) and strong crypto, particularly digital bearer
settlement, as Bernoulli's law, the law describing aerodynamic lift.
Essentially you can think of cryptography and bearer settlement as wings,
and book entries as, well, bags of gas. :-).
Thinking this way, with commerce on the internet as flight, First Virtual
becomes a tethered baloon. Encrypting your First Virtual transaction makes
it an aerodynamic barrage balloon. Encrypting a credit card in an SSL
web-form is flying around on a Zeppelin. And, David Chaum becomes the
Wright Brothers for inventing the airplane. I used to say "Or maybe Otto
Lillenthal" under my breath to get a laugh, but now, I know exactly why
David Chaum is the Wright Brothers.
That's because Digicash *is* The Wright Flying Machine Company, or whatever
the Wright's subsequent enterprise was called. It seems to me that
Digicash's strategy with the blind signature is a dead ringer for the
Wright Brothers' control of the airplane patent. Here's why:
1. In the beginning, nobody believed that the Wright brothers could fly,
and they had to take the airplane to Paris and demonstrate it there before
anyone in the US thought it was true.
Digicash did the same thing. Actually, the NSA created a positively hostile
environment here in the USA for cryptography, financial or otherwise, and
that forced David Chaum to go to the Netherlands, where there was a more
positive reception for his work.
2. Then, nobody could think about what you could do with airplanes, and the
Wrights foundered for a bit..
Same thing with Chaum, Digicash, and the blind signature patent. The
commercial internet didn't exist yet in 1986, and blind signatures were
conceived as useful only in smartcards, which were just being experimented
with. Digicash was going to be used in physical electronic wallets, and
maybe in transponders at the gates of toll roads. The CAFE project was an
example of this meat-space ecash strategy.
It wasn't that Chaum didn't think about the internet. Far from it. He
invented digital mixes, after all, which became the basis for anonymous
remailers, onion routers, CROWDS, and the like. He just didn't look at
blind signatures from the financial operations point of view and see
digital bearer settlement, that's all. He was thinking privacy, and not
financial operations, just like the Wrights were thinking flight, and not
high-speed transportation.
3. The entire time they held the patent, the Wrights only really wanted to
sell airplanes to governments, because they wanted to sell to a few large
stable customers instead of small entities who would probably go out of
business.
Digicash, to this day, tries to sell to big institutions. Their now mostly
internet-driven digital cash stategy is to create the financial equivalent
of Alfred Nobel's dynamite cartel, where one bank in each country gets an
ecash license, hopefully the largest bank possible. Mark Twain in the US
was a proof of concept, if not an act of desperation on Digicash's part,
but it did lead to exclusive (I bet) country-wide licences with Nomura,
Deutchebank, the Swedish Post office, and others. There was talk at FC98
that Digicash received $1 million a month from Deutchebank just for the
*option* on a Germany-wide license. I think they've now exercised that
option. Frankly, I find this geographic, paint-by-the-nation-state approach
quaint in a world of ubiquitous geodesic internetworks, but there it is,
and it effectively prevents other people from doing anything innovative
with blind signatures in the meantime. Monopolies on information
technologies kind of work that way. Dogs and mangers come to mind, and not
for the first time.
4. The Wrights, when they thought about the transportation business at all,
thought about it in terms of "rides" instead of "trips".
Digicash isn't really looking at the applications of their technology to
anything except its original designed purpose, that is, cash. There are
some leaks around the edges, of course.
Nomura seems to be looking at blind signature digital bearer settlement as
a real-time gross-settlement technology, with some kind of private,
kiretsu-cash idea. Digicash people used to give you a shocked "how did you
know that already" look when you talked to them about the painfully obvious
potential use of blind signatures in the capital markets.
However, I'm certain that Digicash thinks that capital market use of blind
signature digital bearer settlement is a pipedream and that they'd better
focus on the main chance, which is ecash. Preferrably electronic
wallet-based ecash issued by a major bank. In competition with book-entry
settlement, in book-entry settlement's own turf. Go figure.
5. Finally, the only innovation in the American aircraft market in the age
of the Wright patent came from that famous airplane "infringer", Curtis,
who didn't give a damn about patents and built airplanes anyway. Much
better airplanes, in fact, which the Wrights eventually took him to court
for, forcing Curtis to merge with the Wrights. Fortunately, European
evolution in aviation continued apace, giving us the aviation equivalent of
the Pre-Cambrian explosion, culminating in the names we all remember from
World War I like Sopwith, Spad, Dornier, and, of course, Fokker.
The problem is that there's no Curtis to infringe on the blind signature
patent, because you can't hook up to the financial system from the internet
-- land yur plane in other words -- without clear rights to use it. The
banks where you move money on and off the net from would get sued. Unless
they're in places like South Africa, where software patents don't matter,
or Russia, where they're probably uninforceable. Places which have their
own problems, not the least of which is poor internet access, poor
financial network connectivity (something like Cirrus on the back end of a
trustee/custodian would be, um, NYCE :-)), and, not least, poor impulse
control by the local force merchants, monopolistic or otherwise. Tax havens
don't even count. The very definition of a tax haven is someplace with a
bandwidth and regulatory gravity well to keep it safe from any kind of
market efficiency.
A return to some kind of "Europe" for that hoped-for explosion of blind
signature evolution could still be happening on the internet anyway.
Certainly, with smart and tenacious people like Ian Goldberg designing
HINDE and Ryan Lackey bashing on a reference version of it, one could
certainly try to argue this, but there's no money doing this stuff right
now (unless you count first-class upgrades to Anguilla or free nights in
the InterIsland), much less something like the First World War to forge
that innovation into a robust replacement for the book-entry economy.
Which, thinking thinking of robustness, brings me to what I've been doing
the last few days. Pete Loshin, former editor at Byte, former writer of
various excellent how-to books on networking and one of the first surveys
of internet commerce (and one of the founding members of the Digital
Commerce Society of Boston, I might add, :-)), is now editor of Cutter
Publications' "Corporate Internet Strategies" newsletter, which used to be
edited by Ed Yourdon, of American Programmer, Y2K, and much other, fame.
So, when they needed someone on a panel about electronic commerce at
Cutter's "Summit" conference at the Boston Harbor Hotel's Wharf Room
facility this week, someone controversial, they said, Pete said he knew
exactly who to throw into the fray.
It was fun, too. There, in front of a room full of senior IT managers from
big companies and Famous Computer Guys, sitting on a panel on Internet
Commerce, was one of Fidelity's Famous Computer Guys himself, now running
their web technology department. And Pete. And Fidelity's retail
web-marketing guy, and me. Fidelity has 900 billion dollars under
management. 60% of their customer interaction now comes from the web. The
ganglia twitch.
Dropping that $100 billion 1997 internet transaction number, and saying
that it was three orders of magnitude over the estimate didn't faze these
guys. They had seen it happen.
In addition, all of the people with websites I talked to said that they
used SSL to interact with their customers. Almost all of them said that
they used 128 bit encryption. The Mssrs. Fidelity faintly crowed about the
fact. Digital Commerce is Financial Cryptography, so what else is new?
Then, of course, I threw the whole geodesic economy, digital bearer
settlement rant at them, right down to the picomoney as processor food,
micromoney mitochondria bit.
And, of course, they all stood up and threw their dinner rolls at me. It
was great.
That's because I'd been throwing my own dinner rolls, and I'd been been
hinting what I was going to say all week. They even encourage you to heckle
the speakers back with a liberal sprinkling of wireless mikes around the
room.
So every once in a while, I'd pop off with comments like intellectual
property control was impossible, that watermarking only told you who the
code was stolen from not who stole it. Or, why not have cash auctions for
programming deliverables instead of top-down project management, Or,
emergent processes for software were always going to beat "controlled"
processes, Or, passing programmer certification laws in the wake of
whatever Y2K thing happened would be impossible to enforce in a world of
those same anonymous cash settled markets for programming talent. I even
pointed them to the forum-hackers list as proof.
One of my favorite gybes while I was up on the podium to the Fidelity
marketing guy -- who's a nice guy but who's also fighting like crazy right
now to drag Fidelity up the "quality service differentiation" ladder
because Fido can't play least-cost-producer anymore in an eTrade world --
was my claim that eventually most so-called "branded" products would be
reduced to graded fungible commodities, and that the more dependant a
business was on information technology, the faster it would happen to them.
Orthogonality is always more fun than the alternative. And you get lots of
free dinner rolls.
And, of course, after the digital commerce panel and lunch, Ed Yourdon
wrapped it all up with his scary Y2K rant, followed by an appropriately
scary bunch of panelists telling us just how scary all theis Y2K stuff
really was, that Ed had gotten himself on down to Taos, complete with his
own water supply, and that denial was when you lied to yourself and
believed it. Or something.
All of which I now believe more of, just because all these grey-haired
programming aristocrats were nodding sagely about this prospect of
impending doom for us all. Frankly, most of the people who've yammered at
*me* about Y2K were either loons who hoped it would All Fall Down Someday
Soon, or people like Vinnie, who think it's a good idea, if not fun, to
know what to do if it ever does all fall down, but that praying for it
wasn't going to make it so. I'd like to think I'm one of the latter. The
other problem is, I've seen the end of the world coming before. Even
predicted it myself on occasion. Haven't been able to reduce it to
practice, yet, though. That's the reason Gibbon's in my .sig these days.
So, let's get back to Digicash and the Wright Brothers. After hanging out
with a whole bunch of top-down monolithic-system gurus and Y2K folks
yesterday, it seems plausible. And, I'm certain there are lots of people
out there who know lots about both and who hope that Y2K will be the
Chixalub event that will burn off all the database-driven book-entry
dinosaur systems and clear the way for a digital bearer mammalian explosion.
Frankly, I think we're looking at a brushfire, if anything. The lawn will
grow back, but the house won't burn, even if the water does go out for a
bit. That's my story, and I'm sticking to it. Remembering, of course, the
above bit about denial.
But, suppose we *are* talking about the financial equivalent of that great
1970's 30-second short film epic, "Bambi vs. Godzilla", where Bambi is
squashed by a giant green foot (oops, I gave away the plot), and the whole
financial system goes away for a few days. Or a month.
Is there any way to step in with digital bearer settlement as a robust
alternative to book-entry funds transfer? Remember the great bank strike in
Ireland, where everyone just passed around nth-party endorsed checks like
they were money until it was all over? Could we do something like that?
Would David Chaum and company let us do that without suing someone for
infringement? Could they stop us, if the courts are full of Y2K liability
cases? Would the internet still be up? Could we pay our ISPs with digital
bearer certificates to keep them up? How about Iridium and Teledesic, which
are supposed to be up by then?
Once again, ganglia twitch. However, it might be fun to game the idea a
bit, just to scare the neighbors. You know, pay ya all back when the banks
come up?
Well, maybe not. Ed says that the banks, and particularly Wall Street, are
the most prepared of any of us. That makes sense. The half life of
financial software these days is measured in months. For instance, one of
NeXT's biggest markets was in the financial sectors, especially trading
rooms, where any prototype which worked was immediately production code.
They liked NeXT, despite all its other interesting charistics, because you
could do exactly that, and faster than any other development environment.
Of course, if anyone's a poster child for "sell Cadillacs, drive a Chevy,
sell Chevies, drive a Cadillac", it's Steve Jobs. Of course, he sold NeXTs
and got Apples, however that turns out...
Still, it might be worth thinking about, trying to route around the
book-entry financial settlement system as a pre-disaster exercise.
Wright Brothers versus Chixalub, and all that. No, I don't wanna see the
movie...
Cheers,
Bob Hettinga
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
--- end forwarded text
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
----------------------------------------------------------------------
Where people, networks and money come together: Consult Hyperion
http://www.hyperion.co.uk/ info at hyperion.co.uk
----------------------------------------------------------------------
Full-Strength Cryptographic Solutions for Worldwide Electronic Commerce
http://www.c2.net/ stronghold at c2.net
----------------------------------------------------------------------
Like e$? Help pay for it!
For e$/e$pam sponsorship or donations,
----------------------------------------------------------------------
--- end forwarded text
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
From tm at algebra.com Fri May 1 12:38:51 1998
From: tm at algebra.com (TruthMonger)
Date: Fri, 1 May 1998 12:38:51 -0700 (PDT)
Subject: Epilogue 7.3 - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <354A24B5.79FD@algebra.com>
Epilogue 7.3 Rev. 2.7-SPACE ALIENS HIDE MY DRUGS!!!
___________________________________________________
I'm in an apologetic mood this morning, so I would like to take this opportunity to tell those who I have offended in the past, and those who I may offend in the future by my boorish behavior which reflects a total lack of both character and proper upbringing...
Well, I'd like to tell them all to "FUCK OFF AND DIE!"
Nothing personal, gang, but as some famous guy once said,
"He who excuses, accuses."
~ Some famous guy...
I really should apologize for being too fucking lazy to grab a pitchfork and go through my filing system to properly attribute the quote above...but I won't.
You see, I have no social skills. None. Nada. Null.
I should also apologize for never having made an effort to acquire proper social skills...but I won't.
In a society in which Finger Pointing (TM) is endemic among those who harbor a secret desire to live in a world epitomized by the movie, 'The Running Man', it borders on self-abuse to add to the mountains of accusations that society already heaps upon one for even the smallest of deviations from a 'norm' which is widely held up to be 'common sense' / 'the way things are' / 'obvious to any decent, God Fearing [Your nationality or religion here] individual'.
Being a Deviant From The NormChomsky School of Social UnSchooling ('Norm' is unlikely to lay awake at night waiting for the phone to ring, in order to receive my apology for fucking up his name), I have long recognized that those who consider themselves to be 'God fearing Americans' are, in actuality, often 'Dog fearing Americans' whose beliefs and actions are the result, not of a fear of 'Holy God' roasting their sorry, morally sinning ass, but rather, the result of the fear of the 'Unholy Dog', who is at the end of the leash being held by the Enforcers of Law and Order, Family Values, Cryptography Export Regulations and the Eleventh Commandment (EveryThingNotPermittedIsForbidden).
It's a predatory universe, and the human animal is the chief predator. (A fact that would be readily confirmed by Ms. PARKER of TV's latest biosemiotic hint of man's future evolution, 'Prey'.)
'World's Scariest Police Chases' is nothing more than a pilot program for a variety of 'Running Man Electronic Realities' which are only waiting for proper technological development and implementation before John and Jane Savage will be able to tune their Infrared Digital Brain Implant in the proper channel where they can hear the scream of the tires and feel the wetness of the blood as a car full of teenagers slams into a concrete wall while trying to flee the deadly hunting hounds who are trained to both instill and track the scent of fear in their prey.
What is a human life worth?
Apparently, it is worth less than the cost of a minor traffic ticket, whether it is the life of the person who failed to signal their turn (even though there was no moving traffic anywhere in sight), or the life of some unfortunate child who crossed the street at an inopportune time, on their way home to their birthday party.
Of course, to be fair, we must keep in mind that the person fleeing the minor traffic offense may be a pedophile, and if the death of an innocent child saves the life of just one innocent child...uuhhh...never mind...
Don't hold your breath waiting for 'World's Scariest Police Chases Resulting In The Deaths Of Innocent Bystanders.' (Can you say "Watch me and I'll bleed you 'cause you eat the shit I feed you...And when somebody's mother gets machine gunned in the street, we'll send some Joker with a Brownie, so you'll see it all, complete...?" Sure you can...)
The price of a human life is just as cheap in America as it is in what are held to be 'less civilized' areas of the world, but the advertising experts and spin-doctors in charge of 'Manufacturing Consent' in the American people for submissive subjugation to Heavily Armed Thugs have had the advantage of decades of experience in exercising Control Over Access To Information and thus shape the jigs upon which our Consent To Agree To 'The Way Things Are' is Manufactured at any given point in time.
The danger that Unregulated Access To Information presents to the current structure of government, business and society, is that it allows any member of the human race to participate in the Manufacturing of Consent as to what is acceptable and what is unacceptable in the areas of our life which are shared with various layers of the Social Onion.
For instance, this very missive might be seen as an attempt by the Author to Manufacture Consent for any individuals who feel their life is threatened by the dangerous driving of law enforcement personnel to 'pop a cap' in their ignorant brains as they drive by, if the threat they pose to one's safety can be removed with little likelyhood of endangering others.
Remember, 'If it saves the life of a single child...'
The size, shape, function, model number and serial number of Consent depends largely on where, how and by whom it is Manufactured.
How the fuck did WeTheSheeple manage to allow ourselves to be manipulated into giving our Consent for Janet Reno to slaughter a spiritual community of men, women and children who died a horrible, screaming, fiery death for holding unconventional religious views? How the fuck did WeTheSheeple manage to sit up straight in our chairs and quit fidgeting, while giving our Consent for the mainstream media to feed us Law and Order pamphlets handed out by the same Department of Justice criminal monsters who slaughtered our fellow citizens?
How the fuck do WeTheSheeple manage to watch dozens of police cars endangering the public with their dangerous driving in order to prevent a single vehicle from endangering the public and manage to give our Consent for them turning traffic rules into excuses for violating the Constitutional rights of the citizens and using deadly force against anyone who attempts to avoid violation of their civil rights and affronts to their human dignity?
Vin ThePolishKike, who I revere for the sanity and wisdom which he brings to his Mountain Media News releases (even though I'm too lazy to look up how to spell his unAmerican name, and can't resist taking a few cheap, racist shots at him just to attempt to suitably repay him for his contributions to our Biosemiotic Evolution by helping to ensure that he will 'Never Forget'), has not been remiss in exercising his Dog-given right to participate in the Manufacturing of Consent, by expessing the view (which I am about to badly misquote), "We have reached the point where it is morally right to shoot the bastards, but it is not yet feasible to do so."
"Who will help me to Manufacture Consent to Nuke DC?" said the little Red May.
"Who will help me Manufacture Consent to engage the bastards in a continuous rEvolutionary battle where our targets are chosen, as much as possible, rather than being just random victims of misguided rage?" said the little White Weber.
"Who will help me Manufacture Consent to avoid endangering innocent children by refusing to drive dangerously in order to escape the armed thugs, and instead seizing every safe opportunity to resist their oppression by stealth and craftiness, if possible, but by violence and death, if necessary?" said the little Black ArmyOfDogMongrel.
As a member of the Congress of WeThePeople who have as much right to Manufacture Consent as do the members of the corrupt Congress of WeTheSheepShearers, I am casting my vote upon the waters of opinion in favor of restoring the right of WeThePeople to individually and collectively institute the Death Penalty for Oppressors.
I am adding my voice to those of others with the wisdom and courage to do their part in Manufacturing Consent for their fellow citizens to stop and shake the hand of the individual who took the time and trouble to 'pop a cap' in the brains of the dangerous armed thugs endangering the populace with their stupidity and carelessness in matching the insanity of those they claim to be protecting us from.
The next time you have an opportunity to watch 'The Running Man', make a point of noticing that the 'contestants' haven't been brainwashed into meekly submitting to whatever form of armed violence is directed toward them for their real or imagined crimes. And make a point of noticing who your heart, mind and soul are rooting for...
Then ask yourself if you want to live a life where you meekly submit to all manner of affronts to your rights and human dignity, while numbing yourself to 'the way things are In Reality' by opiating your psyche with Digital Emmisions from the Puppet Masters which are designed to use Virtual Reality to compensate for the thoughts and emotions you are required to suppress and deny in your Physical, Emotional and Mental Daily Realities.
Thelma and Louise had the right idea...they just should have waited until there was a cherry-top in front of them...
From tm at algebra.com Fri May 1 12:38:56 1998
From: tm at algebra.com (TruthMonger)
Date: Fri, 1 May 1998 12:38:56 -0700 (PDT)
Subject: Epilogue 8.2 - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <354A2515.4A0@algebra.com>
Epilogue 8.2, Rev. 1.8 - SPACE ALIENS HIDE MY DRUGS !!!
_______________________________________________________
"Lord knows when the cold wind blows, it will turn your head around."
~ James Taylor
Adversity tends to break down the smooth functioning of our comfortably programmed beliefs via forcing a change in our ordinary habits of perception in regard to the world around us. This is true whether the adversity or perceived threat is real or imagined.
When some aspect of our survival, including the survival of our comfortably programmed mental, emotional and physical states, is threatened, we tend to become aware of things which were previously invisible or vaguely opaque elements of our environment, or to see things that were already encompassed by the range of our usual perceptive viewpoint in an entirely different way.
One might compare a kick in the ass to a software program interrupt that boots one out of the preprogrammed loop that they follow as a matter of routine, and throws them into a reactive EITHER/OR 'fight or flight' routine. Or, if they happen to be wired and programmed to be able to function using higher level logic and languages than are necessitated by mere survival, they might branch to a series of nested conditional loops which, like Tai Chi, enables them to act in whatever manner is most fitting given the original goal of their program and taking into consideration the nature of the error message that was imparted to their backside by an unexpected boot process.
"In the beginning was the Word, and the Word was RTFM!"
Three days after I betrayed my Toshiba Tecra laptop for thirty cans of Silver Bullet, enabling the Roman BorderGuards to take it away to be crucified upon the Cross of Free Speech, I rolled back the stone at the door of the cave where the body of my Opus SPARCard 2 lay and dragged it out into the light of day where, seeing its own shadow, it predicted that there would be three more weeks of Snow Crash.
Computer Gods work in mysterious ways, especially when I am drunk, which probably explains why THEY came to me in a double-vision and I once again heard the inner voice which had been silenced by years of medication and therapy. The voice said, "OPUS is not dead, but merely sleepeth."
After paying alms to the Used PC Priests and offering a 386 IBM-PC up for sacrifice to the UNIX rising from the ashes, I instituted a GNU World Order among the Byteizens living in the Land of PROM, and my SPARCard 2 came to life, feeding off of the flesh of the DOS interface which the Computer God, OPUS, had destined to serve at the feet of the Eunuchs Masters.
"I shall deliver you up out of Redmond, past the Gates of the Pharoh, and I shall be your Get, and you shall be my Pipe-l."
Since the resurrection of my SPARCard 2, every day begins with a miracle of life, as the Spirit of the Father of Eunuchs, the Sun OS, and the "Holy Shit! Great Caesar's Ghost...it works!" is breathed into the NULL PROM registers by the laying of hands on the keyboard, sending shivers down the spines of Daemons, Zombies and Orphan Zombies.
� I've got a KILL command, and I'm not afraid to use it...
Of course, the Holy Roman Empire is not about to fold up its tent and cancel its plans to build the Fourth Reich on the Tomb of the UnStoned Soldier of the Army of Dog just because an unrepentant WinLuser has temporarily escaped their sentence of Death of Free Speech by hiding in the Holy Shit! Temple, underneath the KILLts of the Circle of Eunuchs.
Desert Storm was just a NWO practice run to fine tune the Patriot missles in preparation for the return of Jesus in a Stealth Bomber, "like a thief in the night." St. John the Divine Lay Preacher mistook the sounds of incoming Scud missles and outgoing Patriot missles for the blaring of trumpets. When the Army of God descends out of heaven, they'd better be wearing Kevlar...
"Every time I start getting ahead in the rat race, they bring in faster rats."
~ A Slow Rat
A few years ago, Dudley DoWrong took a serious run at my liberty of movement by charging me with a couple of traffic offenses and trying to yank my driver's license.
After two years of dragging a pack of Rabid Wombats Cleverly Disguised As Witnesses into court (accompanied by a Mountie assigned to keep an eye and a gun turned in the direction of the MadDogInPossession defendant), it finally came down to blows, and I wiped the floors of the Halls of Justice with the tight ass of the federal Queen's Bench counsellor appointed to prosecute me. (He had a stick up his ass, so it was a lot like using a regular mop.)
I have had quite a few people come to me over the years for help with keeping the long dick of the law from being hidden from the sun in their own backyard.
There seems to be some kind of perception among the lower stratocasters of the local community that I am some kind of killer legal-eagle genius who is able to eat legal-rats that are larger than his head.
Although I enjoy occassionally basking in the warm glow of the approval of Squeaky From's peers, the fact of the matter is, I am actually more of a legal-buzzard--working out of a carrion bag in between flights of fancy during which I look down on the struggling wayfarers wandering in circles, lost in a wasteland of rules and legal proceedures which turn out to be merely shimmering mirages appearing to be an Oasis of Truth and Justice until the poor, parched pricks get close enough to see that their mind and eyes were once again fooled by illusions created by their delusions--and, rather than being a Great Bird of Prey who eats the RatLawyers alive, I am merely a Vulture who picks at the carcasses of the dead and dying former Champions of Justice who sold their souls to the Mobsters Cleverly Disguised As Politicians.
Of course, the mail-order, money-back-guarantee 'Be Your Own Legal-Beagle Kit' (send $19.95 + $5.00 S&H to: Baby Dog Enterprises, Box 281, Bienfait, Saskatchewan SOC OMO) I use to snatch Justice from the Jaws of Legal Sharks is meant for use only in trolling for the big fish in small ponds and small fish in big ponds, and is not designed for use by serious FisherKings trolling for Killer KingFish in the home of the SwampThing, where Legal Dinosaurs still roam at large, crushing underfoot anything and anyone that gets in their way.
When the omnipresent, nefarious They (TM) call out the National Guard to descend upon your sorry ass, and They (TM) turn to the Desert Rat to sniff through your garbage and find something dirty and smelly enough to delight a hand-picked jury of God Fearing Decent People's Peers, then it's time to put in a call to Larry Joe Dowling, a West Texas Rat Wrangler, and the aptly-named Bob Looney, one of LBJ's former Legally Drunk Beagles.
Larry Joe is one of the few lawyers whose standards have remained high enough that he will work in return for really great pussy, and his good Texas breeding ensures that he will be discreet in screwing your old-lady, so as not to cause you any undue embarassment for your lack of sufficient capital to retain a legal representative capable of keeping a straight face when words like Truth and Justice accidentally escape from the lips of the judge and prosecutor.
Besides, if They (TM) want you badly enough to make it worth your attorney's while to sell you down the river, then you damn-straight better better team up with an experienced Rounder who has the decency to pay the bar-bill at the end of your tax-deductible, late-night legal conferences. (And whose partner-in-(government)crime(fighting) helps to keep your spirits (pardon the pun) up by raising his glass, in toast to the Blind Broad, and announcing, loud enough to be heard over the din of the surrounding Last Call Warriors, "If Jack Daniel's be with us, then who can be against us?"
I use a simple rule-of-thumb to guage the level of the blindside attack on my sorry butt that is being secretly prepared deep within the bowels of the Rat's Nest in Can You *Say* That Word On The Internet(?), Saskatchwan.
The more shit-disturbing that the BigTeeth Enforcer Rats let you get away with without uttering even the slightest of squeaks in your direction, then the further ahead they are setting your own personal DoomsDay Clock during their illegal, surrepticious entries into your home while you are down at the CoalDust Saloon.
When you can run around Southern Saskatchewan distributing 'WANTED DEAD OR ALIVE' posters putting a price on the head of the thieving scum who stole your computer and not hear a peep-squeak out of them, then your DoomsDay Clock is already set to one minute after midnight, and you're drinking on borrowed time.
(Which means that I'd better get my butt down to the CoalDust Saloon so that I'll be there when the barmaid opens the door, and she won't freak out and run down main street screaming 'The sky is falling...The sky is falling!" like she did the last time I didn't arrive until 33 seconds after opening time.)
Smoke 'em if you got 'em...
From tm at algebra.com Fri May 1 12:39:16 1998
From: tm at algebra.com (TruthMonger)
Date: Fri, 1 May 1998 12:39:16 -0700 (PDT)
Subject: Constitution For Sale
Message-ID: <354A256F.4030@algebra.com>
CONSTITUTION FOR SALE
_____________________
1776 Constitution for sale. Inherited from original owner.
Hasn't been used for years, but can be easily restored to
its original condition by extermination of the rats which
have taken up residence under the hood and the removal of
useless accessories which were added by a long series of
unethical mechanics who saw the prospect of making more
money if it continually drifted to the right or the left
than if the integrity of its original design was retained.
Truly must be seen to be appreciated.
Must be appreciated to be truly seen.
From tm at algebra.com Fri May 1 12:39:20 1998
From: tm at algebra.com (TruthMonger)
Date: Fri, 1 May 1998 12:39:20 -0700 (PDT)
Subject: Crime Sale!
Message-ID: <354A25BD.A09@algebra.com>
CHEVY CHASE FORD & 'CRAZY BOTMA' MERCURY
DEALERSHIPS ANNOUNCE A
GIGANTIC BLOWOUT CRIME SALE !!!
_______________________________
DUE TO A CURRENT OVERSTOCK OF CRIMINALS AND THE NEW
MAKES OF CRIME BEING PRODUCED IN OUR DC FACTORY EVERY
DAY, CHEVY CHASE AND 'CRAZY BOTMA' ARE ABLE TO OFFER YOU
*UNBELIEVABLE* *DEALS* ON A WIDE VARIETY OF BOTH NEW
AND OLDER CRIMES.
THIS MAKES IT AN OPPORTUNE TIME FOR *YOU* TO GET INTO
WHATEVER TYPE OF CRIME YOU'VE DREAMED ABOUT FOR YEARS,
BUT THOUGHT YOU COULD NEVER AFFORD TO PAY FOR.
WE'RE MOVING OLDER MODEL CRIMINALS OUT THE DOOR EVERY DAY,
AND EVEN SENDING FELONY CRIMINALS OUT THE DOOR AT AN EVER
INCREASING RATE, YET WE *STILL* CAN'T KEEP UP WITH THE
DEMAND OF OUR DC FACTORY TO FIND CUSTOMERS FOR THE NEW
CRIMES BEING CREATED EVERY DAY BY THEIR SOCIAL ENGINEERS.
WE'RE SO DESPERATE THAT WE'RE WILLING TO PLEAD WITH YOU
TO ACCEPT THE BARGAINS WE ARE CURRENTLY ABLE TO OFFER.
NOT ONLY ARE WE ABLE TO GUARANTEE THAT WE CAN FIT YOU INTO
ANY OF A VARIETY OF THE WIDE SPECTRUM OF CRIMINAL CATEGORIES
CURRENTLY AVAILABLE BUT WE CAN OFFER YOU A DEAL THAT WILL
HAVE YOU BACK OUT THE DOOR IN RECORD TIME.
WHAT'S MORE, DUE TO THE CURRENTLY HIGH RECALL RATE WE ARE
EXPERIENCING AS A RESULT OF SENDING UNSAFE CRIMINALS OUT
THE DOOR, WE CAN PROMISE TO GIVE YOU AN EVEN BETTER DEAL
ON A NEW CRIME IN THE FUTURE, EVEN IF YOU HAVEN'T FINISHED
PAYING FOR YOUR ORIGINAL CRIME.
ONCE WE HAVE FIT YOU INTO A THIRD FELONY CRIME, YOU WILL
AUTOMATICALLY BECOME A LIFETIME CUSTOMER AND ELIGIBLE TO
MOVE FROM OUR 'EASY PAYMENT' PLAN TO OUR 'LIFETIME PAYMENT'
PLAN WHERE WE *INSIST* THAT YOU TAKE *FOREVER* TO PAY FOR
YOUR CRIME.
WITH THE EVER INCREASING ABILITY OF OUR DC FACTORY TO
PRODUCE NEW CRIMES AT AN ASTOUNDING RATE, IT HAS NEVER
BEEN EASIER TO FIT INTO OUR CUSTOMER PROFILE.
"IF THE CUSTOMER DOESN'T FIT THE CRIME,
WE'LL MAKE THE CRIME FIT THE CUSTOMER."
THAT'S A PROMISE!
From declan at well.com Fri May 1 13:05:51 1998
From: declan at well.com (Declan McCullagh)
Date: Fri, 1 May 1998 13:05:51 -0700 (PDT)
Subject: Reno reports "suspicion" in industry crypto-negotiations
In-Reply-To: <199805011541.RAA23552@basement.replay.com>
Message-ID:
At 13:39 -0400 5/1/98, John Young wrote:
>Weren't some of these stalking drafts nearly liberated recently?
>Or were they only floated for trusted eyes only?
They were floated for TEO: ACP, Hill staffers, and allied groups like CDT
(Alan Davidson from CDT, after a Cato forum yesterday, defended much of the
ACP crypto bill when I asked him about it).
I got a leaked copy. I promised to send around a summary and haven't yet.
Too much time on Y2K and Microsoft. I'll get to it this weekend.
-Declan
From cel4538 at ritvax.isc.rit.edu Fri May 1 13:05:53 1998
From: cel4538 at ritvax.isc.rit.edu (Chris Loftus)
Date: Fri, 1 May 1998 13:05:53 -0700 (PDT)
Subject: How do I get off this list??
Message-ID: <3.0.32.19980501160520.006cd8d0@vmspop.isc.rit.edu>
There is too mach crap. how do I get off?
From billp at nmol.com Fri May 1 13:54:27 1998
From: billp at nmol.com (bill payne)
Date: Fri, 1 May 1998 13:54:27 -0700 (PDT)
Subject: Ruling in Payne & Morales v NSA's Minihan
Message-ID: <354A351C.20B8@nmol.com>
Friday 5/1/98 2:15 PM
John Young
Nice to talk to you a few minutes ago. Even in person!
Judge Santiago Campos ruled in Payne and Morales v NSA
Minihan. http://jya.com/whpfiles.htm
http://www.aci.net/kalliste/speccoll.htm
Morales opted to meet and open the ruling even though it is
a week end. Usually, I NEVER open a lawyer letter on near a
weekend or a vacation.
But we do file lawsuits on Friday. That way we get to blast THEM
[Great Satan supporters] on the Infobahn before the court has a
chance to seal the complaint.
Mail Boxes Etc. charges only $.04 per page special copy charge on
Fridays too V $.07 on other days.
We, unlike DOE, are mindful of containing litigation costs.
The ruling is 56 pages long!
Morales read me only the first and last pages.
1 We DID NOT LOSE
2 NSA did not win
3 We are not headed for jail
I mailed a priority mail copy to you.
Without Internet NYA, J Orlin Grabbe, and some really neat journalists
the
outcome would have far different, I conjecture.
Have a good weekend everyone [http://www.wpiran.org/]. We are!
We GOT TO GET THIS HORRIBLE MESS SETTLED!
Cowabunga, Yahoo, allahu akbar, etc.
bill and art
From yq91sa9Up at aol.com Fri May 1 14:58:19 1998
From: yq91sa9Up at aol.com (yq91sa9Up at aol.com)
Date: Fri, 1 May 1998 14:58:19 -0700 (PDT)
Subject: Master Wealth Builder......
Message-ID:
If You Qualify, You Could Net
Yourself Well Over $150,000
By The End Of 1998... Guaranteed!
Greetings:
My name is Marty. I would like to ask you to please take
two minutes of you time to read the following. If you
don't like what you see then please trash this mail and
accept my apologies for this disturbance. I promise
you I will not send you another. I am writing to
introduce you to a strong, wealth building home based
business that is NOT a Multilevel Marketing venture or
some get "rich quick scheme"... a business that is more
profitable than any network marketing, direct sales,
franchise or investment opportunity in existence today.
Who Will Be Allowed To Work With Me?
I am looking for a limited group of serious minded
entrepreneurs that have been looking for a solid
business opportunity. I'm not looking for a huge
response. I only want to work with people I feel have
a "burning desire" to be successful. Can you visualize
yourself earning $30,000 + net per month within the
next year, if provided with the right opportunity to
do so? Are you willing to commit to doing whatever it
would take to be successful in this business once you
completely understand it?
How To Find Out If You Qualify
To find out more, call toll free for more details:
1-800-600-0343 ext.#1399. This is a recorded message
that is available 24 hours a day. It is NOT a
telemarketer. I am selecting individuals on a first
come, first serve basis. If you are seriously
interested...REPLY NOW! If you don't really feel
you've got the right stuff to be successful, then
please don't bother to respond. I only want to work
with the motivated people who seriously want to make
insane amounts of money!
If I have reached you in error, please send mail with
REMOVE in the subject heading and you will be
immediately removed from subsequent mailings.
Prosperous Regards,
P.S. Once again, this is NOT MLM. Serious inquiries
only please! You will work 100% from your phone. Age,
appearance, skills, location, and transportation are
NOT important! Only desire and commitment are important!
1-800-600-0343 ext.#1399 DAY OR NIGHT
From whgiii at invweb.net Fri May 1 15:41:42 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Fri, 1 May 1998 15:41:42 -0700 (PDT)
Subject: How do I get off this list??
In-Reply-To: <3.0.32.19980501160520.006cd8d0@vmspop.isc.rit.edu>
Message-ID: <199805012241.SAA26940@users.invweb.net>
-----BEGIN PGP SIGNED MESSAGE-----
In <3.0.32.19980501160520.006cd8d0 at vmspop.isc.rit.edu>, on 05/01/98
at 04:05 PM, Chris Loftus said:
>There is too mach crap. how do I get off?
Sorry you have failed the requisite IQ test for obtaining the
unsubscription information.
You are now doomed here forever!!!
Welcome the Purgatory, Hell is on the way.
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: How do you make Windows faster? Throw it harder!
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNUpQhI9Co1n+aLhhAQGmFgP8D1kzv4i2mPV/cD6o+V70hoftPDGIwAof
pP6qbuaPcw6Hc9NYcXNiY9s3EjuHviE2rwF5Vw3+a/swZxOeTIUUg5Fcf2VTvh0R
KR7WUJ+bqxp5no5ribCsl3ADGSVCNv9mwa2GX3269qf1D3hijabRzv3L0aRNVYNp
G6isqgJDuTM=
=Zo9G
-----END PGP SIGNATURE-----
From tcmay at got.net Fri May 1 18:13:45 1998
From: tcmay at got.net (Tim May)
Date: Fri, 1 May 1998 18:13:45 -0700 (PDT)
Subject: Constitution For Sale
In-Reply-To: <354A256F.4030@algebra.com>
Message-ID:
At 12:41 PM -0700 5/1/98, TruthMonger wrote:
>CONSTITUTION FOR SALE
>_____________________
>
>1776 Constitution for sale. Inherited from original owner.
>Hasn't been used for years, but can be easily restored to
>its original condition by extermination of the rats which
>have taken up residence under the hood and the removal of
>useless accessories which were added by a long series of
>unethical mechanics who saw the prospect of making more
>money if it continually drifted to the right or the left
>than if the integrity of its original design was retained.
>Truly must be seen to be appreciated.
>Must be appreciated to be truly seen.
Wow! I haven't seen a Real Copy, ever! I was once a high school field trip
to the National Archives, circa 1968, but our teachers told us the
Constitution was now classified as a subversive document. It had been on
the Index since 1933.
Maybe the extermination of the rats under the hood will be accomplished as
a side effect of the Y2K problem.
We ought to urge our fellow sheeple to have _short trials_ for the millions
of rats we need to exterminate. After all, they can't exactly appeal to the
Supreme Court if the Supremes preceded them to the gallows, can they?
--Tim May
"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Licensed Ontologist | black markets, collapse of governments.
From rah at shipwright.com Sat May 2 05:47:57 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 2 May 1998 05:47:57 -0700 (PDT)
Subject: db$: The Wright Brothers vs. Chixalub
Message-ID:
Just to fan the flames of Y2K hysteria ever higher...
;-).
Cheers,
Bob Hettinga
--- begin forwarded text
X-Sender: rah at pop.sneaker.net (Unverified)
Mime-Version: 1.0
Date: Thu, 30 Apr 1998 17:50:18 -0400
To: e$@vmeng.com
From: Robert Hettinga
Subject: db$: The Wright Brothers vs. Chixalub
Sender:
Precedence: Bulk
List-Subscribe:
--- begin forwarded text
X-Sender: rah at pop.sneaker.net (Unverified)
Mime-Version: 1.0
Date: Thu, 30 Apr 1998 15:26:30 -0400
To: Digital Bearer Settlement List
From: Robert Hettinga
Subject: db$: The Wright Brothers vs. Chixalub
Sender:
Precedence: Bulk
List-Subscribe:
X-Web-Archive: http://www.philodox.com/dbs-archive/
You might notice that the tag on this one says "db$". That's to
differentiate it from my "e$" rants, which might be more general than ones
like this one, which is on digital bearer settlement. I think there is lots
of talk about electronic commerce and e$ these days from whole bunches of
people, and, as a consequence, my interest in it has focused more onto the
issue of digital bearer settlement. You'll probably be seeing more db$
tags than e$ tags on my rants going forward.
All of which brings me to some obversations I've been making in public
about blind signatures lately, and the excellent time I had at Ed Yeardon's
Cutter Consortium "Summit" conference the past few days.
Let's start with yet another aviation analogy about Digicash, shall we? :-).
Remember, I like to do that.
Once I compared privacy to flight, and said that, like flight, lots of
people had died getting strong cryptography to work, and that privacy
itself was an inherent good. The thing which actually got people to use the
technology, however, was its commercial value. It wasn't the joy of flight
or slipping the surly bounds of earth at Kitty Hawk that got people into
the air, it was coach fare to Dayton. It was digital commerce, and thus
financial cryptography, which created the most privacy. Digital Commerce is
financial cryptography, financial cryptography is strong cryptography, and
all that.
Then there's my analogy of book-entry settlement as Boyle's law (partial
pressure of gasses?) and strong crypto, particularly digital bearer
settlement, as Bernoulli's law, the law describing aerodynamic lift.
Essentially you can think of cryptography and bearer settlement as wings,
and book entries as, well, bags of gas. :-).
Thinking this way, with commerce on the internet as flight, First Virtual
becomes a tethered baloon. Encrypting your First Virtual transaction makes
it an aerodynamic barrage balloon. Encrypting a credit card in an SSL
web-form is flying around on a Zeppelin. And, David Chaum becomes the
Wright Brothers for inventing the airplane. I used to say "Or maybe Otto
Lillenthal" under my breath to get a laugh, but now, I know exactly why
David Chaum is the Wright Brothers.
That's because Digicash *is* The Wright Flying Machine Company, or whatever
the Wright's subsequent enterprise was called. It seems to me that
Digicash's strategy with the blind signature is a dead ringer for the
Wright Brothers' control of the airplane patent. Here's why:
1. In the beginning, nobody believed that the Wright brothers could fly,
and they had to take the airplane to Paris and demonstrate it there before
anyone in the US thought it was true.
Digicash did the same thing. Actually, the NSA created a positively hostile
environment here in the USA for cryptography, financial or otherwise, and
that forced David Chaum to go to the Netherlands, where there was a more
positive reception for his work.
2. Then, nobody could think about what you could do with airplanes, and the
Wrights foundered for a bit..
Same thing with Chaum, Digicash, and the blind signature patent. The
commercial internet didn't exist yet in 1986, and blind signatures were
conceived as useful only in smartcards, which were just being experimented
with. Digicash was going to be used in physical electronic wallets, and
maybe in transponders at the gates of toll roads. The CAFE project was an
example of this meat-space ecash strategy.
It wasn't that Chaum didn't think about the internet. Far from it. He
invented digital mixes, after all, which became the basis for anonymous
remailers, onion routers, CROWDS, and the like. He just didn't look at
blind signatures from the financial operations point of view and see
digital bearer settlement, that's all. He was thinking privacy, and not
financial operations, just like the Wrights were thinking flight, and not
high-speed transportation.
3. The entire time they held the patent, the Wrights only really wanted to
sell airplanes to governments, because they wanted to sell to a few large
stable customers instead of small entities who would probably go out of
business.
Digicash, to this day, tries to sell to big institutions. Their now mostly
internet-driven digital cash stategy is to create the financial equivalent
of Alfred Nobel's dynamite cartel, where one bank in each country gets an
ecash license, hopefully the largest bank possible. Mark Twain in the US
was a proof of concept, if not an act of desperation on Digicash's part,
but it did lead to exclusive (I bet) country-wide licences with Nomura,
Deutchebank, the Swedish Post office, and others. There was talk at FC98
that Digicash received $1 million a month from Deutchebank just for the
*option* on a Germany-wide license. I think they've now exercised that
option. Frankly, I find this geographic, paint-by-the-nation-state approach
quaint in a world of ubiquitous geodesic internetworks, but there it is,
and it effectively prevents other people from doing anything innovative
with blind signatures in the meantime. Monopolies on information
technologies kind of work that way. Dogs and mangers come to mind, and not
for the first time.
4. The Wrights, when they thought about the transportation business at all,
thought about it in terms of "rides" instead of "trips".
Digicash isn't really looking at the applications of their technology to
anything except its original designed purpose, that is, cash. There are
some leaks around the edges, of course.
Nomura seems to be looking at blind signature digital bearer settlement as
a real-time gross-settlement technology, with some kind of private,
kiretsu-cash idea. Digicash people used to give you a shocked "how did you
know that already" look when you talked to them about the painfully obvious
potential use of blind signatures in the capital markets.
However, I'm certain that Digicash thinks that capital market use of blind
signature digital bearer settlement is a pipedream and that they'd better
focus on the main chance, which is ecash. Preferrably electronic
wallet-based ecash issued by a major bank. In competition with book-entry
settlement, in book-entry settlement's own turf. Go figure.
5. Finally, the only innovation in the American aircraft market in the age
of the Wright patent came from that famous airplane "infringer", Curtis,
who didn't give a damn about patents and built airplanes anyway. Much
better airplanes, in fact, which the Wrights eventually took him to court
for, forcing Curtis to merge with the Wrights. Fortunately, European
evolution in aviation continued apace, giving us the aviation equivalent of
the Pre-Cambrian explosion, culminating in the names we all remember from
World War I like Sopwith, Spad, Dornier, and, of course, Fokker.
The problem is that there's no Curtis to infringe on the blind signature
patent, because you can't hook up to the financial system from the internet
-- land yur plane in other words -- without clear rights to use it. The
banks where you move money on and off the net from would get sued. Unless
they're in places like South Africa, where software patents don't matter,
or Russia, where they're probably uninforceable. Places which have their
own problems, not the least of which is poor internet access, poor
financial network connectivity (something like Cirrus on the back end of a
trustee/custodian would be, um, NYCE :-)), and, not least, poor impulse
control by the local force merchants, monopolistic or otherwise. Tax havens
don't even count. The very definition of a tax haven is someplace with a
bandwidth and regulatory gravity well to keep it safe from any kind of
market efficiency.
A return to some kind of "Europe" for that hoped-for explosion of blind
signature evolution could still be happening on the internet anyway.
Certainly, with smart and tenacious people like Ian Goldberg designing
HINDE and Ryan Lackey bashing on a reference version of it, one could
certainly try to argue this, but there's no money doing this stuff right
now (unless you count first-class upgrades to Anguilla or free nights in
the InterIsland), much less something like the First World War to forge
that innovation into a robust replacement for the book-entry economy.
Which, thinking thinking of robustness, brings me to what I've been doing
the last few days. Pete Loshin, former editor at Byte, former writer of
various excellent how-to books on networking and one of the first surveys
of internet commerce (and one of the founding members of the Digital
Commerce Society of Boston, I might add, :-)), is now editor of Cutter
Publications' "Corporate Internet Strategies" newsletter, which used to be
edited by Ed Yourdon, of American Programmer, Y2K, and much other, fame.
So, when they needed someone on a panel about electronic commerce at
Cutter's "Summit" conference at the Boston Harbor Hotel's Wharf Room
facility this week, someone controversial, they said, Pete said he knew
exactly who to throw into the fray.
It was fun, too. There, in front of a room full of senior IT managers from
big companies and Famous Computer Guys, sitting on a panel on Internet
Commerce, was one of Fidelity's Famous Computer Guys himself, now running
their web technology department. And Pete. And Fidelity's retail
web-marketing guy, and me. Fidelity has 900 billion dollars under
management. 60% of their customer interaction now comes from the web. The
ganglia twitch.
Dropping that $100 billion 1997 internet transaction number, and saying
that it was three orders of magnitude over the estimate didn't faze these
guys. They had seen it happen.
In addition, all of the people with websites I talked to said that they
used SSL to interact with their customers. Almost all of them said that
they used 128 bit encryption. The Mssrs. Fidelity faintly crowed about the
fact. Digital Commerce is Financial Cryptography, so what else is new?
Then, of course, I threw the whole geodesic economy, digital bearer
settlement rant at them, right down to the picomoney as processor food,
micromoney mitochondria bit.
And, of course, they all stood up and threw their dinner rolls at me. It
was great.
That's because I'd been throwing my own dinner rolls, and I'd been been
hinting what I was going to say all week. They even encourage you to heckle
the speakers back with a liberal sprinkling of wireless mikes around the
room.
So every once in a while, I'd pop off with comments like intellectual
property control was impossible, that watermarking only told you who the
code was stolen from not who stole it. Or, why not have cash auctions for
programming deliverables instead of top-down project management, Or,
emergent processes for software were always going to beat "controlled"
processes, Or, passing programmer certification laws in the wake of
whatever Y2K thing happened would be impossible to enforce in a world of
those same anonymous cash settled markets for programming talent. I even
pointed them to the forum-hackers list as proof.
One of my favorite gybes while I was up on the podium to the Fidelity
marketing guy -- who's a nice guy but who's also fighting like crazy right
now to drag Fidelity up the "quality service differentiation" ladder
because Fido can't play least-cost-producer anymore in an eTrade world --
was my claim that eventually most so-called "branded" products would be
reduced to graded fungible commodities, and that the more dependant a
business was on information technology, the faster it would happen to them.
Orthogonality is always more fun than the alternative. And you get lots of
free dinner rolls.
And, of course, after the digital commerce panel and lunch, Ed Yourdon
wrapped it all up with his scary Y2K rant, followed by an appropriately
scary bunch of panelists telling us just how scary all theis Y2K stuff
really was, that Ed had gotten himself on down to Taos, complete with his
own water supply, and that denial was when you lied to yourself and
believed it. Or something.
All of which I now believe more of, just because all these grey-haired
programming aristocrats were nodding sagely about this prospect of
impending doom for us all. Frankly, most of the people who've yammered at
*me* about Y2K were either loons who hoped it would All Fall Down Someday
Soon, or people like Vinnie, who think it's a good idea, if not fun, to
know what to do if it ever does all fall down, but that praying for it
wasn't going to make it so. I'd like to think I'm one of the latter. The
other problem is, I've seen the end of the world coming before. Even
predicted it myself on occasion. Haven't been able to reduce it to
practice, yet, though. That's the reason Gibbon's in my .sig these days.
So, let's get back to Digicash and the Wright Brothers. After hanging out
with a whole bunch of top-down monolithic-system gurus and Y2K folks
yesterday, it seems plausible. And, I'm certain there are lots of people
out there who know lots about both and who hope that Y2K will be the
Chixalub event that will burn off all the database-driven book-entry
dinosaur systems and clear the way for a digital bearer mammalian explosion.
Frankly, I think we're looking at a brushfire, if anything. The lawn will
grow back, but the house won't burn, even if the water does go out for a
bit. That's my story, and I'm sticking to it. Remembering, of course, the
above bit about denial.
But, suppose we *are* talking about the financial equivalent of that great
1970's 30-second short film epic, "Bambi vs. Godzilla", where Bambi is
squashed by a giant green foot (oops, I gave away the plot), and the whole
financial system goes away for a few days. Or a month.
Is there any way to step in with digital bearer settlement as a robust
alternative to book-entry funds transfer? Remember the great bank strike in
Ireland, where everyone just passed around nth-party endorsed checks like
they were money until it was all over? Could we do something like that?
Would David Chaum and company let us do that without suing someone for
infringement? Could they stop us, if the courts are full of Y2K liability
cases? Would the internet still be up? Could we pay our ISPs with digital
bearer certificates to keep them up? How about Iridium and Teledesic, which
are supposed to be up by then?
Once again, ganglia twitch. However, it might be fun to game the idea a
bit, just to scare the neighbors. You know, pay ya all back when the banks
come up?
Well, maybe not. Ed says that the banks, and particularly Wall Street, are
the most prepared of any of us. That makes sense. The half life of
financial software these days is measured in months. For instance, one of
NeXT's biggest markets was in the financial sectors, especially trading
rooms, where any prototype which worked was immediately production code.
They liked NeXT, despite all its other interesting charistics, because you
could do exactly that, and faster than any other development environment.
Of course, if anyone's a poster child for "sell Cadillacs, drive a Chevy,
sell Chevies, drive a Cadillac", it's Steve Jobs. Of course, he sold NeXTs
and got Apples, however that turns out...
Still, it might be worth thinking about, trying to route around the
book-entry financial settlement system as a pre-disaster exercise.
Wright Brothers versus Chixalub, and all that. No, I don't wanna see the
movie...
Cheers,
Bob Hettinga
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
--- end forwarded text
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
----------------------------------------------------------------------
Where people, networks and money come together: Consult Hyperion
http://www.hyperion.co.uk/ info at hyperion.co.uk
----------------------------------------------------------------------
Full-Strength Cryptographic Solutions for Worldwide Electronic Commerce
http://www.c2.net/ stronghold at c2.net
----------------------------------------------------------------------
Like e$? Help pay for it!
For e$/e$pam sponsorship or donations,
----------------------------------------------------------------------
--- end forwarded text
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
From arse69 at webtv.net Sun May 3 04:05:33 1998
From: arse69 at webtv.net (fine asses)
Date: Sun, 3 May 1998 04:05:33 -0700 (PDT)
Subject: hello
Message-ID: <199805031105.EAA05339@mailtod-161.iap.bryant.webtv.net>
::
Request-Remailing-To: arse69 at webtv.net
test
From moneytime at aol.com Sun May 3 05:43:06 1998
From: moneytime at aol.com (moneytime at aol.com)
Date: Sun, 3 May 1998 05:43:06 -0700 (PDT)
Subject: Make Money Working From Home
Message-ID: <2145871454578>
==========================================================
This is a one time mailing and you will not be sent this message again,
we apologize for any inconveinance that this message has caused You
===========================================================
DON'T DELAY, START WORKING NOW!!
SET YOUR OWN HOURS, STAY HOME, NO TRAFFIC, WORK AS MUCH OR AS LITTLE AS YOU
DESIRE, MORE FREE TIME, BECOME FINANCIALLY INDEPENDENT
WELCOME!
NEED A JOB? WANT TO MAKE $1,500-$4,000 MONTHLY, WORKING PART OR FULL TIME FROM
THE COMFORT OF YOUR HOME?
ClickHere
Over 200 companies that will provide you with home employment are listed on
this website. The website is divided into many different categories, such as:
Computer Opportunities Toys Assembly
Decorations Assembly Sewing
Jewelry Assembly Crafts Assembly
Stuffing Envelopes
And Many More
Here are some examples of available opportunities:
"You can make between $400-$500 weekly, stuffing sales envelopes for our
company. Make $0.15 for every envelope you stuff for our company. We will
furnish all the supplies. No experience necessary."
"Assemble beautiful beaded bracelets for fun and profit. You will be paid from
$7.25 to $9.75 for every order that meets company's standards. One order
should only take you 15 minutes to assemble. All materials and instructions
are supplied. No experience is necessary.
"Make beautiful hand-assembled glass beaded earrings at home. There are three
elegant and creative designs to choose from. Basic assembly skills are
required. No experience is necessary. You will be paid $250.00 for each unit
of 25 pairs of earrings made according to the instructions provided. Shipping
costs for each unit are reimbursed."
"Make $180.26 per week assembling small appliance covers. No experience is
necessary. All materials are provided. It is easy and fun to make. Work as
little or as much as you desire. Get paid $100.00 for each set of 20 Towel
holders. Submit only three sets per week. They are easy to assemble. No
experience is necessary."
We are legitimate company providing real home employment opportunities thus we
putting 100% guarantee on our service.
Using home workers greatly reduces each company's operating expenses and helps
them to reach many more customers then they possibly could by themselves. They
usually pay a certain amount per item or lot assembled. After shipping your
assembled products to the company, they send you a check paying you for your
labor! No selling is required and you can work as much or as little as you
wish.
The list of companies will be updated every month, thus you will have all
information renewed and the list of new companies will be added.
WELL WHAT ARE YOU WAITING FOR?
Please visit us at
ClickHere
And Start Working Now!!!
From cioqoaha30 at sprynet.com Sun May 3 07:24:14 1998
From: cioqoaha30 at sprynet.com (:-])
Date: Sun, 3 May 1998 07:24:14 -0700 (PDT)
Subject: ALERT - Internet Fraud and Spying
Message-ID: <199805034331SAA25713@post.westex.net>
ARE YOU BEING INVESTIGATED ?
Learn the Internet tools that are used to investigate you, your
friends, neighbors, enemies, Employees or anyone else! My
huge report "SNOOPING THE INTERNET" of Internet sites
will give you...
* Thousands of Internet locations to look up people, credit,
Social security, current or past employment, Driving records,
medical information, addresses, phone numbers, Maps to city
locations...
Every day the media (television, radio, and newspapers) are
full of stories about PERSONAL INFORMATION being used,
traded, and sold over the Internet... usually without your
permission or knowledge.
With my report I show you HOW IT'S DONE!!!
It's amazing..
Locate a debtor that is hiding, or get help in finding hidden
assets.
* Find that old romantic interest.
* Find e-mail, telephone or address information on just about
anyone! Unlisted phone numbers can often be found
through some of these sites!!
Perhaps you're working on a family "tree" or history. The
Internet turns what once was years of work into hours of
DISCOVERY & INFORMATION.
Check birth, death, adoption or social security records.
MILITARY
Check service records of Army, Navy, Air Force or Marine
Corps. Find out who's been telling the truth and who's been
lying. Perhaps you can uncover the next lying politician!!!
FELLOW EMPLOYEES;
* Find out if your fellow employee was jailed on sex charges,
or has other "skeletons" in the closet!!
PERFORM BACKGROUND CHECKS;
Check credit, driving or criminal records, Verify income or
educational claims, Find out Military history and discipline,
previous political affiliations, etc.
YOUR KID'S FRIENDS;
Find out the background of your children's friends & dates.
WHAT'S THE LAW? STOP GUESSING!!
* Look up laws, direct from law libraries around the world. Is
that new business plan legal??
NEW JOB? NEW TOWN? NEW LIFE?
Employment ads from around the world can be found on the
Internet. Get a new job and disappear!
The Internet can tell you just about ANYTHING, if you know
WHERE to look.
BONUS REPORT!!!!
Check your credit report and use the Internet to force credit
bureaus to remove derogatory information. My special
BONUS REPORT included as part of the "SNOOPING THE
INTERNET" collection reveals all sorts of credit tricks, legal
and for "information purposes only" some of the ILLEGAL
tricks.
Research YOURSELF first!
What you find will scare you.
If you believe that the information that is compiled on you
should be as easily available to you as it is to those who
compile it, then. . .
You want to order the SNOOPING
THE INTERNET report.
This huge report is WHERE YOU START! Once you
locate these FREE private, college and government
web sites, you'll find even MORE links to information
search engines!
YOU CAN FIND OUT ANYTHING ABOUT ANYBODY
ANY TIME using the Internet!!!!
SEVERAL WAYS TO ORDER !!!
1) WE TAKE: AMERICAN EXPRESS OR
VISA <> MASTERCARD
TYPE OF CARD AMX / VISA / MC??_______________
EXPIRATION DATE ___________________________
NAME ON CREDIT CARD________________________
CREDIT CARD #________________________________
BILLING ADDRESS ____________________________
CITY_________________________________________
STATE________________ZIP_____________________
PHONE INCLUDE AREA CODE___________________
WE WILL BILL 39.95 to your account
SHIPPING COST OF 3.00 FIRST CLASS MAIL
SHIPPING COST OF 15.00 24 HOUR EXPRESS MAIL
SALES TAX (2.90) added to CA residents
>>> Send $39.95 ($42.85 in CA) cash, check or money
order to:
>>> CASINO CHICO
>>> Background Investigations Division
>>> 311 Nord Ave.
>>> P.O. Box 4331
>>> Chico, CA 95927-4331
2) Send the same above requested credit card
information to above address.
3) Fax the same above credit card information to 530-895-
8470
4) Call phone # 530-876-4285. This is a 24 hour phone
number to place a CREDIT CARD order.
5) FAX A COPY of your signed check to 530-895-8470.
This is an EXCELLENT way to order without a credit card!
I will RUSH back to you SAME DAY my "SNOOPING
THE INTERNET" report!
Log on to the Internet and in moments you will fully
understand...
What information is available -- and exact Internet
site to get there!
2nd BONUS!!!!
Along with the report we will send a 3 1/2" disk with
sites already "HOT LINKED". No need to type in
those addresses. Simply click on the URL address
and "PRESTO" you are at the web site!!!
Personal ads, logs of personal e-mail, mention of
individuals anywhere on the Internet are "yours for the
taking" with this report.
Lists of resources to find even more information
(private Investigation companies, etc..)
Order surveillance equipment (if legal in your state)
Send anonymous e-mail
Research companies
Research technology
Locate military records
FIND INFORMATION ON CRIMINALS
Find Wanted fugitives - perhaps even a close
associate!
ABSOLUTE SATISFACTION GUARANTEED:
Your satisfaction is 100% guaranteed, just return the material for a full refund within 30 days if you aren't 100% satisfied.
This offer is from a private company. Casino Chico / R Jon Scott Hall publications is not associated with or endorsed by, AOL,
MSN, or any other Internet service provider.
Copyright 1997 All Rights Reserved
R Jon Scott Hall Publications.
From tnelson222 at mci2000.com Sun May 3 22:29:05 1998
From: tnelson222 at mci2000.com (tnelson222 at mci2000.com)
Date: Sun, 3 May 1998 22:29:05 -0700 (PDT)
Subject: Earn $100 every time OUR phone rings....
Message-ID: <199805040528.WAA22430@cygint.cygnus.com>
ALL YOU DO IS ADVERTISE OUR 800 NUMBER! THAT'S ALL!!
$100 goes to you for every sale that we close!
We need you to make our phone ring......
I am not talking about MLM! Does the idea of making at least
$1,500 per week beginning your 2nd week of doing business excite you?
How about never having to sell a thing to your customer to make money?
I MADE OVER $1,000 MY FIRST WEEK! MY SECOND WEEK, I MADE OVER $1,800....
Does this excite you? It certainly excites me considering I only
put in 4 hours or less per week to generate this kind of revenue.
If you are an average person like myself who has always desired to be
in business for themselves and absolutely doesn't like selling or having
to talk to people to make a living, then this is for you.
Every aspect of selling or talking to someone is done completely by the company.
I DO NOT TOUCH THE TELEPHONE AND NEITHER WOULD YOU!
First, Our Promise To You:
1) NO Selling!
2) NO Talking or Personal Contact with others, on the phone or in person!
3) NO Mandatory mailing of postcards, products or information to prospects!
4) NO Prospecting or Cold Calling of any kind!
ALL OF THIS IS DONE BY THE COMPANY!!!
WHAT THIS BUSINESS WILL DO FOR YOU:
* Handles all your calls, closes your sales, and
sends you WEEKLY commission checks!
* It pays you a $100 commission (that's over 50% of the total sale)
for EVERY sale. CHECKS put $$$ in your pocket in less than your first
week or two... Quick commission earnings build and maintain motivation.
ALL YOU DO IS ADVERTISE the toll-free number and your ID number.
* You can get STARTED TODAY. Just advertise the business toll-free
number with your ID # and let this business CLOSE YOUR SALES every day...
We do all the work and YOU GET PAID FOR IT!
* You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds,
Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails
with a 1/10 of a percent (0.1%) sales rate at $100 per sale nets
$10,000... not too bad.
There is nothing else out there that will provide you with an immediate income
beginning THIS WEEK with minimal effort.
Before you call, I want you to think about the quality of the live
operators handling your call. I am convinced you will not find
a better team of closers for your own personal sales. You will
clearly understand what I am talking about once you call.
PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!
1-800-811-2141
You will be asked for ID #50030 when you call.
(Live operators are available from 8 AM-10 PM CST Monday through Saturday and
will be able to answer any questions you may have.)
Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949 or 888-731-3457
(all toll free).
From gnu at toad.com Sun May 3 23:21:11 1998
From: gnu at toad.com (John Gilmore)
Date: Sun, 3 May 1998 23:21:11 -0700 (PDT)
Subject: Bills in Congress containing "encrypt"...
Message-ID: <199805040621.XAA20536@toad.com>
I found a few interesting ones.
S. 1023
Making appropriations for the Treasury Department, the United States
Postal Service, the Executive Office of the President, and certain
Independent Agencies...
$3,000,000 shall be available to the Financial Crimes Enforcement
Network, including $2,000,000 for the money laundering threat initiative
and $1,000,000 for the Secure Outreach/Encrypted Transmission Program;
$7,800,000 for automated license plate readers,
[The above bill seems to have evolved into the following, which was
passed by the House and Senate and awaits the President's signature.]
H.R.2378
Making appropriations for the Treasury Department, the United States
Postal Service, the Executive Office of the President, and certain
Independent Agencies, for the fiscal year ending September 30, 1998,
$1,000,000 shall be available
to the Financial Crimes Enforcement Network for the Secure
Outreach/Encrypted Transmission Program;
...to the United States Secret Service, including ...
$1,460,000 to provide technical assistance and to
assess the effectiveness of new technology intended to combat
identity-based crimes,
From stewarts at ix.netcom.com Sun May 3 23:50:43 1998
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Sun, 3 May 1998 23:50:43 -0700 (PDT)
Subject: Why does the Navy research onion routing?
In-Reply-To: <3.0.5.32.19980429090405.0079b940@otc.net>
Message-ID: <3.0.5.32.19980503230738.009147c0@popd.ix.netcom.com>
At 09:04 AM 4/29/98 -0700, David Honig wrote:
>Why does the Navy research onion routing?
>
>Only reason I can think of is so that .mil can
>study other sites anonymously, or communicate
>amongst themselves using anonymous-routing-tech
>to avoid traffic analysis.
>
>The other practical possibility is that they're happy
>to have smart CS people and will fund whatever they
>want to do, just to keep them.
There is some of the latter involved, but the military
does have times they'd like to check out web pages
without traffic analysis, just as they'd like
to be order lots of pizza without folks figuring out
that they're up to something. This includes several cases -
using the public or civilian-government internet,
and also using their own intranets which may be less
than totally secure.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From schear at lvcm.com Sun May 3 11:39:35 1998
From: schear at lvcm.com (Steve Schear)
Date: Mon, 4 May 1998 02:39:35 +0800
Subject: The Usual Suspects (National sales tax)
In-Reply-To: <199805030855.KAA18049@basement.replay.com>
Message-ID:
>From my perspective, one of the most important fallouts from a replacement
of the graduated tax with a national sales tax is the removal of much of
the current rationale for FinCEN and citizen identification (i.e., SSN).
Certainly, it should no longer be required for establishing a non-credit
financial institution account, purchasing a money order/cashier's check or
wiring money. In fact, you shouldn't need SSN for employment, except that
unless you supplied some number (even if psueduanon) you'd forego accruing
benefits. The use of SSN for the ID runs the gammut in local, state and
federal programs, but is most often justified for purposes of taxation.
Now, I'm not naive enough to believe that any of these gov't agencies or
private corps are going to willing give up citizen unit IDs, but it will be
interesting to see their new rationales for the continued use of SSN (or
its replacement) for ID.
--Steve
--Steve
---------------------------------------------------------------------
reply to schear - at - lvcm - dot - com ---
PGP mail preferred, see http://www.pgp.com and
http://web.mit.edu/network/pgp.html
RSA fingerprint: FE90 1A95 9DEA 8D61 812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------
From billp at nmol.com Mon May 4 07:01:06 1998
From: billp at nmol.com (bill payne)
Date: Mon, 4 May 1998 07:01:06 -0700 (PDT)
Subject: Periods of sequences
Message-ID: <354DC8CA.5D34@nmol.com>
Monday 5/4/98 7:22 AM
chambers,
Your statement
The advantages are a lack of mathematical structure which might
provide an entry for the
cryptanalyst, and a huge choice of possibilities; the disadvantages
are that there are no
guarantees on anything, and as is well known there is a risk of
getting a very short period.
made at http://www.jya.com/a5-hack.htm#wgc stuck me as profound.
Reason is that NSA cryptomathematician Scott Judy once told me that I
did not really
understand the principles NSA uses for its crypto algorithm.
Judy proceeded to explain to me that NSA bases its crypto algorithm on
complication,
not mathematics.
Judy apparently did not realize that some years previous NSA employee
Brian Snow showed
us about all of NSA's KG schematics. And their field failure records!
Masanori Fushimi in Random number generation with the recursion x[t] =
x[x-3q]+
x[t-3q],Journal of Applied Mathematics 31 (1990) 105-118 implements a
gfsr
with period 2^521 - l. http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=0
Fushimi's generator is sold by Visual Numerics.
Fushimi's implementation is very well tested. And worked SO WELL that
Visual
Numerics numerical analyst Richard Hanson had TO BREAK IT!
Reason was that the gfsr produces true zeros. This caused simulation
programs
to crash from division by zero.
None of the linear congruential generators produced zeros so the problem
did
not arise until the gfsr was used.
Hanson ORed in a low-order 1 to fix the problem
Masanori wrote,
Lewis and Payne [16] introduced an apparely different type of
generator,
the generalized feed back shift register (GFSR), by which numbers are
formed by
phase-shifted elements along a M-sequence based on a primitive
trinomial 1 +
z^q + z^p.
Lewis was one of my former ms and phd students.
http://www.friction-free-economy.com/
Cycle lengths of sequences is a fascinating topic.
Let me point you guys to a delightful article on the distribution of
terminal digits of transcendental numbers.
The Mountains of pi by Richard Preston, v68 The New Yorker,
March 2, 1992 p 36(21).
This is a story about Russian-born mathematicians Gregory and
David Chudnowsky.
While the story is fun to read, I think that the Chudnowsky's were
wasting their time.
I think that terminal digits of transcendental numbers have been
proved to be uniformly distributed.
Sobolewski, J. S., and W. H. Payne, Pseudonoise with
Arbitrary Amplitude Distribution: Part I: Theory,
IEEE Transactions On Computers, 21 (1972): 337-345.
Sobolewski, J. S., and W. H. Payne, Pseudonoise with
Arbitrary Amplitude Distribution: Park II: Hardware
Implementation, IEEE Transactions on Computers, 21
(1972): 346-352.
Sobolewski is another of my former phd students.
Hopefully you guys will read judge Santiago Campos' 56 page
MEMORANDUM OPINION AND ORDER on the Payne and Morales lawsuit
on jya.com within several days.
I made a copy and gave it to Sobolewski on Sunday afternoon.
I want Sobolewski's opinion on what Morales and I should do.
Soblewski lives about two miles from us.
Sobloweski is an administrator [vp of computing at university
of new mexico] and knows how administrators think.
Let's hope this UNFORTUNATE mess involving shift register sequences
gets settled.
But let's not forget our sense of humors despite the about .5 million
dead Iranians.
Hopefully the system will take care of the guys that did that did the
Iranians.
Masanori wrote,
The GFSR sequence as well as the Tausworthe sequence can be
constructed using any M-sequence whether the characteristic polynomial
is trinomial or not;...
Jim Durham, my seismic data authenticator project leader, retired from
Sandia.
Durham gave me a number of tech reports upon his retirement.
One was authored by Robert TITSWORTHE of jpl.
TITSWORTHE changed his name!
Later
guys
From chatski at gl.umbc.edu Mon May 4 08:57:44 1998
From: chatski at gl.umbc.edu (chatski carl)
Date: Mon, 4 May 1998 08:57:44 -0700 (PDT)
Subject: db$: The Wright Brothers vs. Chixalub
In-Reply-To:
Message-ID:
I would like to make 2 short friendly ammendments
On Sat, 2 May 1998, Robert Hettinga wrote:
> .... that privacy itself was an inherent good.
that privacy itself was an inherent good in a hostile environment.
But there is a higher goal.
In an evironment of plenitude (rather than scarcity) every act can be
purely symbiotic and in no-way parasitic. In such an environment,
(which we have technologically but not politically/economically) we can
create a political/social system where there are no more fascists or
statists.
Then I want everyone to know everything about me.
> ....financial system goes away for a few days. Or a month.
financial system goes away forever!!
> ...Is there any way to step in with digital bearer settlement as a
>robust alternative to book-entry funds transfer?
IMHO the only robust, sustainable solution is to eliminate all forms of
such accounting altogether, to decouple production from stored ability to
get what you need/want.
- Carl
From tm at algebra.com Mon May 4 10:53:08 1998
From: tm at algebra.com (TruthMonger)
Date: Mon, 4 May 1998 10:53:08 -0700 (PDT)
Subject: Epic Log - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <354DFE20.531F@algebra.com>
Epic Log Rolling - SPACE ALIENS HIDE MY DRUGS!!!
________________________________________________
Dimitry, cleverly trying to distract me from my plan to....
(Damn! It worked...) wrote:
That was your best one yet, my friend. Well done. Do you invent as you
type
or do you prepare first? Do you dream the ideas in progress or
summarize a
day of dreaming all at once?
After being diagnosed with Tourette Syndrome and ADHD, it took
me somewhere between 6-18 months to get around to seeing a doctor
in regard to treatment. So I guess you could say that 'plans' and
'preparation' are not my strong point.
A year or so ago I unexplicably began to write a work called,
'Soul Chaser.' I had absolutely no idea what it was about or
where it was going, and it drove me crazy waiting for each
chapter to 'appear' so that I could find out what was going
to happen.
While 'The True Story of the InterNet' manuscripts are created
with a purpose in mind, they tend to form themselves out of a
mountain of notes jotted to myself in regard to the types of things
that force their way into one's mind while lying sleepless at 4 a.m.
An integral part of the manuscripts is the insertion of details
or concepts which are sent to me for inclusion by a variety of
shadowy characters, some of whom I am somewhat familiar with, and
some who remain a total mystery to me. An example would be the
references to Mule Shoe, Texas as the location of one of the
underground Reptilian Nazi bunkers (along with LizardMoor and
Lost Alamo).
I added Mule Shoe to the list as a result of a mystery request
and have no idea what is being inferred, but a number of CoE
initiates have reported that they have observed a great deal of
concern among certain government organizations about the possible
compromise of some mysterious project, or somesuch. As a matter
of fact, a few thanked me profusely for the 'pointer' even though
they gave me no indication as to what they have uncovered.
Granted I've not seen anything relevant to cryptography yet, but I'm not
about
to complain.
Cryptography = Privacy = Rights = Freedom = Ad Infinitum
Once the possibilty of extinction of all life from the face
of the earth by Nuclear Technology became a *REALITY*, then
the scope of many formerly local/regional/national issues and
interests became considerably wider/larger.
Now that the possibility of extinction of all privacy from
the face of the earth by Digital Technology (Can you say
'ECHELON'? Sure you can...) has become a *REALITY*, the scope
of many local/global issues and interests have acquired a
level of meaning which goes far beyond the particular sphere
in which they currently are being debated/instituted.
We have recently seen how local pornography laws in the
Deep South can affect� the lives of people living locally in
California and globally in CyberSpace. We are currently moving
toward the same issues and concepts applying internationally.
What about the reporter who is currently facing imprisonment
for investigating the Truth in regard to child pornography on
the InterNet, instead of accepting at face value the 'handouts'
from the Privacy Pirates? Anyone who fails to see implications
for freedom, privacy and cryptography needs to spend a little
less time watching 'Gilligan's Island'.
I may soon be facing the same situation in Canada, with the
main difference being that the 'Bienfait Nutly News' doesn't
carry the same type of clout as the organizations considered
by people wearing suits as members of the 'legitimate press'.
When I protected all files that I didn't want to fall into
the possession of the Royal (pain in the ass) Canadian (beaver,
hee...hee) Mounted (on the citizen's behind) Police (gestapo),
I made a point of leaving on my hard drive, among other things,
a 'pornography file' which I sent to the CypherPunks list, the
WhiteHouse, etc., with the announcement that I was purposely
distributing vile, filthy pornography that was an affront to
every decent person on the face of the earth.
Anyone who took the trouble to break the encrypted file
would have found that it was a classic Greek(?) statue of
a young boy, with his PENIS exposed for God
and everybody to see. I truly believe that my digital
transmission of this classic work of art makes me, under
current law, a child pornographer, even though the only way
for anyone to view it would be to crack the encryption on
the file.
(Thus far, God has not contacted me to express having a
problem with my actions, but I suspect that those who
have taken it upon themselves to express the opinions
of 'everybody' will soon be in contact.)
Thanks for the entertainment.
'Entertainment' is the *Medium*, not the *Message*, of 'The
True Story of the InterNet' manuscripts.
It is a Medium which has lessened, though not removed, the
consequences which go hand-in-hand with the dissemination of
Truths which meet the high standards expressed by a line in
a movie..."You can't *HANDLE* the Truth!"
Jim Bell was taken down a few hours after I had sent him a
copy of a TSotI chapter describing 'Assassination Politics',
and asking his opinion on certain things. (The *only* time
I have ever done this.)
I took the Jim Bell events to be a clear message that the
rules had changed in regard to the dissemination of the TSXotI
manuscripts. I did not regard the chapter as 'entertainment'.
(I fully recognize the possibility that I may be wrong or
'overreacting' to the synchronicity of the two events, but,
on the other hand, I have the perspective of having observed
this type of 'synchronocity' since 1989, and have had my
sorry ass 'saved' by my 'unreasonable paranoia' many times
since then.)
I left home two weeks before gomez was cut loose from a
company he had founded, after seventeen years, in order to
arrive the day before he, himself, received the 'news'.
I received the information regarding his elimination from
the CoE equation via a source who still remains a mystery to
me after almost a decade of cross-communication.
I gave the situation only the briefest of mentions in the
TSotI manuscripts, because CoE initiates would have no problem
with immediately recognizing the import of the event.
I did not consider that chapter to be 'entertainment'.
Many initiates of the Circle of Eunuchs have recently 'gone
to ground', in order to work unobserved in a manner which they
feel they can be most effective. Other CoE initiates have
stepped forward to accentuate the policies and actions that
they have been involved in more surrupticiously until now,
even though it may well expose them to retribution, because
they feel that that is how they can be most effective.
I have given brief mention to some of the results of the
directions some of these CoE initiates have taken in various
chapters of the TSotI manuscripts, and I do not consider
these chapters 'entertainment'.
I recently received information in regard to the intentions
of the Beaver Bullys to slap their tails down on my sorry butt,
and had the option of heading for sandier pastures (Tucson), or
covering my ass as much as possible and saying, "Damn the
torpedos, full Speed, Ritalin and Prozac ahead!"
I chose to do the latter, and have written a bit about it
in the TSotI manuscripts. I *do* consider those chapters to
be (my) 'entertainment', because 'picking guitar while Rome
burns' is the only dance there is...
Maybe I'm crazy (maybe?...hee, hee), but if I had the
opportunity to travel back in time and *become* Lee Harvey
Oswald, I would do so. Can you imagine actually *knowing*
the Truth behind what most of us can only specualate about,
even though the events surrounding his role/non-role in the
assassination of JFK are of monumental import to our times
and the *REAL* history of our globe?
I have no idea whether or not the Oppressors who have
'legally stolen' my computers will be foolish enough to
attempt to take me down within the boundaries of the
current legal system, but I can guarantee that, if they
do, myself and others will learn more about what is truly
going on in the background of 'currently perceived reality'
than Lee Harvey Oswald ever dreamed of knowing.
There are 'tricks and traps' embedded in the information
that I *ALLOWED* the Oppressors to confiscate that are the
result of almost a decade of preparation. Anyone who thinks
I am 'blowing smoke' failed to read and understand the portion
of 'WebWorld & the Mythical Circle of Eunuchs' which detailed
the concept of "Winner's Bluff."
"TV IS REAL!" (And so is 'Uncle Bubba'...)
Thought For The Day:
Which 'side' do you, personally, take in regard to the debate
as to whether there is, or is not, a Grand Conspiracy taking
place in the BackGround Of Reality?
The fact of the matter is, it doesn't really matter.
The existence or non-existence of the Grand Conspiracy is
of no more importance than the existence or non-existence
of the Circle of Eunuchs.
Definition of Reality:
"If you can put it in the bank, it's Real!"
~ Stuart Wilde (misquote)
'Theory of Black Holes' Versus 'Infield Fly Rule':
If some scientific genius proves the invalidity of Einstien's
theories, then can we expect the victims of Hiroshima and
Nagasaki to spring back to life?
If everyone on the face of the earth, except for baseball
umpires, agree to invalidate the Infield Fly Rule, does it
really matter?
Are the 'True Story of the InterNet' manuscripts 'entertainment'?
Sure. "His login is PANIC, His password is CRASH, When Time is
of Essence, He'll Rise from the Ash" was just a 'lucky guess' as
to the true importance of the recently acknowledged problem which
is presented by the Millennium Bug.
Claire Wolfe's statement that there is an "Angel" hidden
deep within the bowels of the IRS computer system was just
a 'lucky guess'.
The evolutionary march of computer technology along the
paths predicted by the CypherPunks over the years has been
just a long series of 'lucky guesses' resulting from the
random output of keyboards taking direct hits during the
CypherPunks' legendary pissing contests.
Dimitri Vulis' exposure of John Gilmore as a 'cocksucker'
was just a 'lucky guess'.
The ASCII Art spams revealing that Timmy C. Mayonnaise
is the result of early 'Turd Cloning' experiments was just
a 'lucky guess'.
The suspicion slowly rising from the back of your mind to
flip the switch which turns on the light of realization
that the insanity of 'The True Story of the InterNet'
manuscripts are purposely opaque misdirections of their
true purpose, which is to raise the possibility that Kent
Crispin, and even you, yourself, may actually be one of
US, instead of one of THEM, is just a 'lucky guess'.
Giorgio Ivanovitch Gurdjieff posited that humans cannot
'consciously' do evil. I concurr...
Is there a method to my madness, or a madness to my method?
Hint: I AM the Biosemiotic Evolutionary Equivalent (TM) of
Lee Harvey Fucking Oswald.
I AM not just 'predicting' the future, I AM 'creating'
the future.
The CypherPunks are not just 'predicting' the future,
they are 'creating' the future.
Louis !B Freeh is !just 'creating' the future, he is
desperately attempting to prevent Jane and Joe Netizen from
doing the same.
NEWS FLASH!!!
-------------
The AI/Biometrics experts at LizardMoor, Lost Alamo and
Mule Shoe are sucking hind-tit to those who have approached
Biosemiotic Evolution from the human side of the equation.
Vice-Admiral D'Shauneaux, during our intial confrontation,
expressed concern that I was unaware of the importance to
humankind that the 'Secret War' taking place in the Background
of History be 'won' by those who were working in the best
interests of humanity and democracy.
My reply to him was that, given the human condition, it was
imperative that the Forces of Light never triumph over the
Forces of Darkness, for the simple reason that it has always
been a truism that 'Power corrupts, and Absolute Power corrupts
absolutely'. (Lucifer used to be an Angel!)
Would you rather be slain by a Moslem saint or a Christian
saint, upholding their perception of 'righteousness'?
Is ECHELON an abomination?
Yes, if it remains unopposed.
I have no doubt that ECHELON has resulted in the negation of
a plethora of evils which had the potential to result in a great
amount of devastation to both the physical and the spiritual
conditions of the human equation.
I also have no doubt that ECHELON at some point reached a
point of competence and control that allowed those involved in
'protecting' us to get sidetracked into a plethora of issues
and directions which refelected personal, in-house political
agendas, rather than the interests of Truth, Justice, Democracy,
and An Honorable Concept To Be Corrupted Later.
When You're Up To Your Ass In Alligators, It's Hard To
Remember That Your Original Objective Was To Drain The
Swamp:
True... But when you're up to your ass in EunuchIzens,
your 'ass is grass' if you don't get back to your 'original
objective'.
The nonsensical paranoid diatribes warning against the
dire threat posed by Gomez and the Dark Allies in the
TSotI manuscripts are not 'entertainment', any more
than the C2Net Conspiracy Theory that was presented to
those with 'ears to hear' during the legendary CypherPunks
Moderation Experiment / Censorship Crisis.
Assuming that Sameer's lips are not wrapped around Uncle
Sam's cock, C2Net reflects the epitome of CypherPunks goals
to promote the spread of strong cryptography around the
globe in order to provide access for the citizens to
secure private communications. Nonetheless. the involvement
of a C2Net employee in the attempt to 'damage' the CPUNX
list made one of US (TM) a greater threat to CypherPunk
ideals than the actions or intentions of THEM (TM).
I have absolutely no problem with Mr. & Ms. ECHELON doing
whatever they honestly feel is necessary to protect and
defend the globe from what is patently evil, but I have
absolutely no interest in them achieving such a privileged,
comfortable position in the 'Secret War' that they have
enough time on their hands to throw a cold, hard one up
the butt of anyone who offends them personally by calling
them a 'cocksucker', no matter whether the offender's
name ends with an 'i' or a 'y'.
Orange Sunshine Is The Best Disinfectant (Judge Cherry Brandy):
Tim May was astute enough to recognize that the absence
of ignorant, statist morons such as Kent Crispin on the
CypherPunks list is a detriment, since the positions he
took on various issues were usually the result of careful
deliberation, even though he usually had his head up his
ass. A forum in which everyone agrees with Chomsky is of
no greater benefit to human evolution than a forum where
everyone agrees with Freeh.
I am astute enough to realize that without the presence
of Willam Geiger III on the CypherPunks list, to slap
Eric Cordian silly for whining about life 'forcing' him
to be a Sheeple, that I would feel like a lone fool for
occassionally admitting to being as big an idiot as the
Sheeple that I rail against in my self-righteous diatribes.
You are astute enough to realize that even without the
verifiable presence of Toto in the Authorship of this
chapter, given the fact that the manuscripts have always
been a shared/distributed project, not to mention the
fact that the toto at sk.sympatico.ca account is the Grand
Central Station of CyberSpace, it is still incumbent on
you to immediately report to the proper authorities my
online confession to having murdered a variety of law
enforcement agents and buried them in my garden plot in
Bienfait. (But, if anybody asks, I was with *you* when
JFK was assassinated, OK?)
Ten a.m., time for 'River's Edge' on Fox TV.
I'll need both hands free, to crack beers and take
notes.
Smoke 'em if you love 'em...
From tm at algebra.com Mon May 4 10:53:13 1998
From: tm at algebra.com (TruthMonger)
Date: Mon, 4 May 1998 10:53:13 -0700 (PDT)
Subject: Happy Log - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <354E00B9.15F3@algebra.com>
Happy Log - SPACE ALIENS HIDE MY DRUGS!!!
_________________________________________
Watching 'River's Edge', I remembered why I prefer to remain
holed up alone in the BeachBoys' room while Slurping the Dregs
with a channel-changer in my hand.
It seems that 'River's Edge' wasn't that movie about Paul
Newman being a logger--apparently that was 'Sometimes A Great
Notion.' Neither was it the John Holmes movie where he plays
Johnny Logg, 'Sometimes A Great Motion.'
No, it turned out to be the movie that Dennis Hopper made
his comeback in, years after it was socially acceptable to
openly cheer the social outcasts in 'Easy Rider' or 'Rebel
Without A Cause'. Having neither social skills nor self-
contol, I cannot refrain from laughing or cheering not just
in the 'wrong' places, but also in the 'worst' places...
I can relate to Dennis Hopper's character, Feck, when the
head murderer in the movie asks him if he's some kind of
psycho, since he dances and talks with a life-size sex doll.
Feck replies, "I'm not *crazy*, man. I *know* it's a *doll*!"
But knowing it doesn't stop him from...caring.
I *know* I'm not supposed to hoot, cheer and laugh when
Feck tells the 'bad' kid, who murdered his girlfriend, even
though he didn't love her, about being justified in blowing
the brains out of his own girlfriend, because he 'loved' her,
and how he was being hunted and persecuted by a society that
didn't understand that his 'apology' was 'sincere', since he
really did love her, and about the 'unfairness' of Them still
wanting to *punish* him.
I *know* that I'm supposed to act horrified at this sick,
demented bastard's outlook on life.
But knowing it doesn't stop me from...sympathizing.
Everyone wants to cheer for the socially acceptable
'UnderDog', but no one wants to cheer for those meeting the
current-socially-agreed-upon-profile of the 'MadDog'.
NewsWorld did an interview with Jerry Springer in which
they asked him how he could possibly justify the outrageous
format of his talk show as being of the least bit of 'help'
in solving the problems of his guests and society.
Springer's reply was basically, "Buy a Clue. I'm the
Ringmaster of a Circus."
When Springer was asked about his 'descent' from being a
respectable member of the mainstream news media, to being
the uncontested Joker & Fool of daytime TV, he 'busted' the news media
as being a bunch of shylocks who provide a modicum
of real news, surrounded by death and disaster in the lives of
people we don't know, and sticking microphones in the faces of
people who have been 'caught' dipping their dick in the wrong
bowl and gleefully screaming 'Gotcha!'.
The Masses drive the Media, Entertainment drives the Masses,
and the Media drives Entertainment.
Because we no longer gather in the public square by the
tens of thousands, being whipped into a mass frenzy by the
emotive diatribes of the Fuhrer, we believe that we are
'different' from the Germans who wore their BrownShirts in
public gatherings, rather than putting them on daily in the
privacy of our home, before screaming along in righteous
judgement with the studio audience of the 'Jerry Springer
Show', or cheering the black-clad ninja warriors on 'Cops'
as they kick in the doors of monstrous scum guilty of Felony
Dark-Complexion and Felony Inability To Afford A Good Lawyer.
After deluging us with a flood of pud-pulling entertainment
cleverly disguised as news-coverage of Joey Buttafucko's
love life and plans to murder his wife, the smart-asses at
NewsWorld tease us with the question, "What was the name of
Joey Buttafucko's wife?"
Huh?
Who the fuck cares? She's just some fucking bit-player
victim who gets a couple minutes of air-time in the midst of
the massive coverage of the actions, psyche and motivations
of the 'main protagonist' in an ongoing 'news' saga designed
to increase popcorn and soft-drink sales.
The news media is well aware that 'the show is over' the
minute they ask the question that enquiring slimes *really*
want to know, which is, "What did it *feel* like when you
were sucking the life force out of another human being?"
(And the follow-up question, "Do you have any pictures?")
Daytime Primetime Talk Shows fall all over one another to
schedule the guy who got his dick cut off with garden shears.
His 'fifteen minutes' gets stretched to the max, along with
a guarantee of future reruns.
Let some woman get her pussy ripped out by a psycho, and
it is given quick, short coverage, during which the news
persons look at their shuffling feet, because a woman's
private parts are 'dirty' and she was probably wearing a
skirt that was too short. If a woman wants to make the big
bucks on the talk-show circuit, she needs to get her face
slashed with a razor, since women are supposed to look pretty,
but not supposed to like sex.
(In Moslem countries, however, it is bad taste to give a
large amount of coverage to a woman whose face is slashed
with a razor, because the slut was probably wearing a veil
that was too short.)
Canada had a Real Life (TM) rendition of 'River's Edge' take
place in Flin Flon, Manitoba (?), where a bunch of teenagers
kept silent about the murder of one of their friends by
another of their friends, for six months (?) or so, but it
didn't have Dennis Hopper in it, so there were no reruns,
making the details a little too fuzzy to really remember.
Life doesn't *imitate* TV, Life *is* TV, but not as well
funded and produced. If you don't recognize this as being the
truth, it's because "You can't *HANDLE* the truth!"
You gotta have a system...
People instictively understand this, which is why I am
able to support myself with email spams titled, "How To Make
Big $$$ Sitting At Home, Licking Your Own Dick."
Unsolicited Commercial Email and Political Parties run on
basically the same underlying concept, which is that Horatio
Alger can tell us any lies he wants, and put his dick anywhere
he pleases, as long as shit still runs downhill and payday is
still on Friday.
Name the last two bills passed by Congress.
Name the last two women Slick Willie dipped his dick in.
News...give me a break...
Am I supposed to feel 'guilty' about being some sick, sorry,
demented psycho weirdo for fixating on and relating to the
'wrong' imaginary characters and 'wrong' emotive issues that
are involved in a TV movie?
According to my calculations, I still have over four hundred
unused Reality Avoidance Credits that I have earned by not
giving a fat rat's ass where Slick Willy's dick has been for
the last few years of news coverage regarding the size, shape,
smell and feel of Little Willie.
My failure to become obsessional in regard to the travel
schedule of the President's dick is likely to work against
me if I find myself in the position of having to defend my
position as an EditWhore and ReportWhore for the Bienfait
Nutly News, when I find myself facing charges for the public
dissemination of a graphic image of a classic Greek statue
of a young boy whose petite, well-formed, beautiful, sexy
young penis...
Where was I...?
Sorry...
I'm actually homophobic, but I got caught up in the
arguments for the graphic being viewed as 'obscene' that a
prosecutor would be able to make if his personal experience
in the sick, twisted molestation of his own child and those
of others gave him a firm understanding of the danger that
is presented by Pornography Cleverly Disguised As Art.
If somebody wants to compose a Bienfait Nutly News report
about the President's dick, I would be more than happy to
publish it and get my share of the billion-dollar giveaway
of Digital WaveSpace.
Beer break...molest 'em if you got 'em (tied up)...
From tm at algebra.com Mon May 4 11:52:11 1998
From: tm at algebra.com (TruthMonger)
Date: Mon, 4 May 1998 11:52:11 -0700 (PDT)
Subject: The Brain: phones home all your URLs?
In-Reply-To: <354DF3DC.8F9E8ACB@best.com>
Message-ID: <354E0978.69B9@algebra.com>
gm wrote:
> I recently installed a copy of The Brain - a nifty UI shell. But my
> Temporary Internet Files folder filled up with entries of the form:
> "http:////
> In other words each of my web accesses was 'phoned' in to the mother
> brain server, which invoked some back-end .DLL with my URL access as an
> argument.
Scenario #1: You're a CypherPunk who is dedicated to the creation and
dissemination of programs which enhance privacy and security in
InterNet software implementations.
You want to create a secure program for a particular use, but you
are very busy with other projects and it would take about $30,000 to
farm it out to someone else...
Scenario #2:You are a Corporate Marketeer and you are dedicated to
gathering all of the end-user data possible to make the most efficient
use of your company's resources.
You see the possibilities for creating the same program that the
CypherPunk is considering and you have a rather large budget...
Scenario #3:You are Head Honcho in the SeeAllKnowAll Department of the
Oppressors, and you are dedicated to keeping track of such things as
which hand Joe & Jane Citizen wipe their ass with.
You the possibilities of the program the CypherPunk is considering,
you see the potential of 'adding to' the program needed by the
Marketeer, and you happen to have a mountain of resources at your
fingertips and close connections with the company the Marketeer is
working for...
Bottom Line:
Britain, more comfortable with the marriage of Government, Corporate
and Individual interests in a Socialist/Fascist mix, are openly seeking
to merge the Government and Corporate interests in security, etc., in
the interests of the Citizen, of course.
In the U.S. this is not happening. It is only a coincidence that all
goverment and corporate offices share the same building and resources
and this fact is only kept 'secret' in the interests of National
Security, and to fight terrorists, pedophiles, drug czars, and people
who wipe their ass with the 'wrong' hand.
Toto
From tm at algebra.com Mon May 4 12:31:25 1998
From: tm at algebra.com (TruthMonger)
Date: Mon, 4 May 1998 12:31:25 -0700 (PDT)
Subject: Toto 2 - Tim May 0
Message-ID: <354E178C.3738@algebra.com>
Vancouver, British Columbia:
Criminalization of Insanity: Turn a mental hospital with 6,000 patients
into a mental hospital with 500 patients.
Criminalization of Poverty: Make panhandling a crime, subject to a
$2,000.00 fine.
[I won! I won!!!]
Toto
From swire.1 at osu.edu Mon May 4 13:04:18 1998
From: swire.1 at osu.edu (Peter Swire)
Date: Mon, 4 May 1998 13:04:18 -0700 (PDT)
Subject: A new Swiss banking novel
Message-ID: <3.0.5.32.19980504160422.00fc66e0@pop.service.ohio-state.edu>
Greetings:
This weekend I finished reading a novel that talks about many of the
issues of interest to this group. It's Christopher Reich, "Numbered
Account," Delacorte Press. The author was a real Swiss banker for a few
years. Now he writes a pretty darn good suspense novel featuring how
numbered Swiss bank accounts work. In the cryptography debates, the FBI
makes a big deal about how anonymous bank accounts can be used by drug
smugglers, money launderers, international arms merchants, and anti-Western
terrorists. They're all here in the novel. So are the U.S. government
agents -- a bit bumbling, thoroughly obnoxious and self-righteous, but also
genuinely concerned about stopping truly bad people. Reich also talks a
bit about a new crypto system the bank develops for handling secret
transactions.
I think the book works pretty well as a story. It also gives human faces
to the issues of bank secrecy, money laundering, and anonymous accounts. If
we are to find ways to have anonymity in cyberspace, we will have to
confront the bad things that anonymity can bring.
I'd be interested to hear anyone else's reactions to the book. More
generally, what do you say to well-intentioned people when they say the
following -- won't anonymous accounts contribute, at least a bit, to more
drug smuggling, arms smuggling, and international terrorism?
[Please, no flames. I am writing an academic article this summer on money
laundering and financial privacy. Money laundering laws hold the potential
to choke off cryptography and financial privacy generally. How can
supporters of privacy best answer back to the calls for stricter regulation?]
Peter Swire
Prof. Peter Swire
Ohio State University
College of Law
(614) 292-2547
http://www.osu.edu/units/law/swire.htm (includes draft book on European
Privacy Directive and Internet Privacy Page)
From caj at math.niu.edu Mon May 4 13:04:56 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Mon, 4 May 1998 13:04:56 -0700 (PDT)
Subject: Bad, bad, bill
In-Reply-To: <19980501153418.25294.qmail@hotmail.com>
Message-ID:
On Fri, 1 May 1998, Corvus Corvax wrote:
> "WASHINGTON - The Senate Judiciary Committee on Thursday adopted the
> Digital Millennium Copyright Act, which takes a new step toward
> protecting creative content in cyberspace by outlawing the equipment
> used to commit a copyright infringement, not just the act or intent of
> illegally copying material.
> ...
Yah. This same was mentioned on a digital watermarking forum I
read. A great deal of my own research centers around attacking & finding
weaknesses in such schemes, and as it's science I am obliged to write code
to prove my hunches. This bill may make me a criminal!
This struck a nerve at the time, because the fella who mentioned
the bill was (a) an employee of a watermarking company and (b) mad as Hell
at the rest of us for developing watermark attack software. If that law
was on the books (and the guy was the CEO or such) at the time, I have no
doubt a few of us would be in big legal trouble.
Now, I should disclaim that that particular company is much more
understanding than that one guy. I met a bunch of their employees (as did
a couple other attack-makers) at a conference, and they were quite clueful
about the importance of watermark robustness research. However, countless
other watermarking startups exist. Many have the whole business bet on a
potentially breakable scheme. Further, watermarking involves people from
non-crypto disciplines, such as image processing, where folks are more
likely to make security mistakes and less likely to appreciate the need
for an adversarial research mode. This spell DANGER, boys and girls.
Some company consisting of few people, lots of venture capital, little
experience and lots of tunnel vision is IMHO likely to resort to this law
when researchers find a big hole in their breadwinning technology.
I should add that watermark attack tools like unZign and StirMark
are now used as benchmarks by developers of new schemes. It's only been,
what, half a year since StirMark was created? A gaggle of watermarking
papers already cite it, and include it in a standard volley of tests.
These are not evil warez from Hell here.
-Xcott
==- Xcott Craver -- Caj at niu.edu -- http://www.math.niu.edu/~caj/ -==
"Also note that elecronagnetic theory proves that if you microwave a
bar of Ivory soap it turns into a REAL MARSHMALLOW THAT YOU CAN EAT."
-James "Kibo" Parry
From sunder at brainlink.com Mon May 4 15:41:07 1998
From: sunder at brainlink.com (Sunder)
Date: Mon, 4 May 1998 15:41:07 -0700 (PDT)
Subject: Blizzard Gets Sued For Snooping On Gamers
Message-ID: <354E42A8.6C422A1A@brainlink.com>
---------- Forwarded message ----------
Date: Sun, 3 May 1998 14:29:23 -0400
From: Salvatore Denaro
To: 'Ray Arachelian'
Subject: send to list?
They might find this interesting
--- Blizzard Gets Sued For Snooping On Gamers ---
Game developer Blizzard Entertainment is being sued for unlawful
business practices, stemming from the revelation that the company's
hot-selling new StarCraft snoops through players' hard drives and
e-mails information to the company over the Internet.
http://www.techweb.com/news/story/TWB19980430S0015
From caj at math.niu.edu Mon May 4 16:11:50 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Mon, 4 May 1998 16:11:50 -0700 (PDT)
Subject: A new Swiss banking novel
In-Reply-To: <3.0.5.32.19980504160422.00fc66e0@pop.service.ohio-state.edu>
Message-ID:
On Mon, 4 May 1998, Peter Swire wrote:
> Greetings:
>
> I'd be interested to hear anyone else's reactions to the book. More
> generally, what do you say to well-intentioned people when they say the
> following -- won't anonymous accounts contribute, at least a bit, to more
> drug smuggling, arms smuggling, and international terrorism?
You say, "Yes. Yes they could. And so could cars."
> [Please, no flames. I am writing an academic article this summer on
> money laundering and financial privacy. Money laundering laws hold the
> potential to choke off cryptography and financial privacy generally.
> How can supporters of privacy best answer back to the calls for
> stricter regulation?]
I dunno. I guess the best way to answer those calls in the public
arena is to let people know that crypto is useful stuff that everyone will
need as transactions move online. The shady argument that crypto &
anonymity can facilitate crime is merely an attempt to associate the two,
to give the public the impression that this crypto stuff is up there with
assault weapons and C4, something which can and should be controlled,
while not really affect law-abiding citizens.
I advise crypto proponents to halt any analogy-making to
firearms, for this reason. Nothing against guns, of course; but to gain
acceptance crypto cannot be dropped in the same conceptual bin as guns.
-Xcott
==- Xcott Craver -- Caj at niu.edu -- http://www.math.niu.edu/~caj/ -==
"This is a different thing: it's spontaneous and it's called 'wit.'"
-The Black Adder
From pornstar at thepentagon.com Mon May 4 17:04:25 1998
From: pornstar at thepentagon.com (©ÇhÆ£k®¾¿)
Date: Mon, 4 May 1998 17:04:25 -0700 (PDT)
Subject: L I S T ! ! ! ! !
In-Reply-To: <354E178C.3738@algebra.com>
Message-ID: <354E4919.A8B7B58B@thepentagon.com>
GET ME OFF THIS LIST!!!!!!!!!!!!!!!
TruthMonger wrote:
> Thanks for using NetForward!
> http://www.netforward.com
> v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v
>
> Vancouver, British Columbia:
>
> Criminalization of Insanity: Turn a mental hospital with 6,000 patients
> into a mental hospital with 500 patients.
>
> Criminalization of Poverty: Make panhandling a crime, subject to a
> $2,000.00 fine.
>
> [I won! I won!!!]
>
> Toto
From caj at math.niu.edu Mon May 4 17:43:23 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Mon, 4 May 1998 17:43:23 -0700 (PDT)
Subject: Holy QPRNF...
Message-ID: <199805050043.TAA22628@baker.math.niu.edu>
http://biz.yahoo.com/prnews/980504/ca_live_pi_1.html
Summary: Digimarc and Live Picture, Inc., team up to offer watermarking
services.
|| ``Until very recently, the creative community was extremely skeptical of
|| licensing and marketing their work over the Web, which they viewed as an
|| absolute free-for-all,'' said Doug Dawirs, director of online services at
|| The Workbook. ``Now these same people and companies are jumping in with
|| both feet.''
I hope no content creators mistakenly think that this is electronic
content protection (possibly, one can say an aid to detect _unintentional_
illicit use, but not intentional theft), or else there will be a
free-for-all of a legal kind a little further down the road.
I also wonder about the proposed batch processing option, embedding
the same watermark into multiple images. I can see a number of
security problems here, especially if Live Picture can not (likely)
keep track of all the images marked by them.
=Xcott
From edsmith at IntNet.net Mon May 4 18:13:08 1998
From: edsmith at IntNet.net (Edwin E. Smith)
Date: Mon, 4 May 1998 18:13:08 -0700 (PDT)
Subject: A new Swiss banking novel
In-Reply-To: <3.0.5.32.19980504160422.00fc66e0@pop.service.ohio-state.edu>
Message-ID: <3.0.2.32.19980504210938.008639a0@mailhost.IntNet.net>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
At 04:04 PM 5/4/98 -0400, you wrote:
>Greetings:
>
> This weekend I finished reading a novel that talks about many of
the
>issues of interest to this group. It's Christopher Reich, "Numbered
>Account," Delacorte Press. The author was a real Swiss banker for
a few
>years. Now he writes a pretty darn good suspense novel featuring
how
>numbered Swiss bank accounts work. In the cryptography debates, the
FBI
>makes a big deal about how anonymous bank accounts can be used by
drug
>smugglers, money launderers, international arms merchants, and anti-
Western
>terrorists. They're all here in the novel. So are the U.S.
government
>agents -- a bit bumbling, thoroughly obnoxious and self-righteous,
but also
>genuinely concerned about stopping truly bad people. Reich also
talks a
>bit about a new crypto system the bank develops for handling secret
>transactions.
>
Excuse me for asking, but what's so bad about "drug smugglers, money
launderers, international arms merchants, and anti-Western
terrorists."
Edwin E. Smith
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQA/AwUBNU5m0UmNf6b56PAtEQJ9+wCfRNVsy7MEcbeQ7H5UZswN4aUqP6AAnipg
QbOt7mM01LbEyIqOwG2DE83l
=+S8l
-----END PGP SIGNATURE-----
When freedom is outlawed.......Only outlaws will be free!
If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.
Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
http://www.self-gov.org/quiz.html
IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
http://www.virusmyth.com/aids/index.htm
From edsmith at IntNet.net Mon May 4 18:25:34 1998
From: edsmith at IntNet.net (Edwin E. Smith)
Date: Mon, 4 May 1998 18:25:34 -0700 (PDT)
Subject: A new Swiss banking novel
In-Reply-To: <3.0.5.32.19980504160422.00fc66e0@pop.service.ohio-state.edu>
Message-ID: <3.0.2.32.19980504211950.0086c620@mailhost.IntNet.net>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
At 06:11 PM 5/4/98 -0500, you wrote:
> I advise crypto proponents to halt any analogy-making to
>firearms, for this reason. Nothing against guns, of course; but to
gain
>acceptance crypto cannot be dropped in the same conceptual bin as
guns.
>
> -Xcott
I agree completely. While I support the right to own guns (and nukes)
by anyone, guns can be used both ofensively and defensevely while
crypto can only be used defensevely.
That is unless you put PGP on a stack of diskettes, glue them
together and whack somebody with them.
Edwin
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQA/AwUBNU5pNUmNf6b56PAtEQLOFQCgvJ2MpcZ6or2bFKdoXc4NRyPn70IAni/X
WOf+RzpEgwuIXGEVoHi9DKSa
=b+pp
-----END PGP SIGNATURE-----
When freedom is outlawed.......Only outlaws will be free!
If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.
Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
http://www.self-gov.org/quiz.html
IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
http://www.virusmyth.com/aids/index.htm
From mgraffam at mhv.net Mon May 4 18:38:58 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Mon, 4 May 1998 18:38:58 -0700 (PDT)
Subject: A new Swiss banking novel
In-Reply-To:
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
On Mon, 4 May 1998, Xcott Craver wrote:
> I advise crypto proponents to halt any analogy-making to
> firearms, for this reason. Nothing against guns, of course; but to gain
> acceptance crypto cannot be dropped in the same conceptual bin as guns.
And spin the same propoganda wheel as the Man? Not me. I don't see crypto
gaining acceptance among the masses out of fear.
Look.. saying "Bad guys can use crypto to not get caught, and they can
use guns to kill people, so lets outlaw crypto and guns." Isn't an
argument based on reason so much as it is fear. "Bad guys" strike fear
into the hearts of people, and they will do anything to protect
themselves, including shooting themselves in the foot. For every
bad point that can be found for private ownership of firearms a postive
one can be found. The same goes for crypto. Guns can protect us from
criminals. Criminals can use guns to kill us. Crypto can protect us from
criminals. Criminals can use crypto to protect themselves. The list can
go on and on, and in the end it all will boil down to freedom on the
one hand, and some sick, distorted view of safety on the other.
Fear is more persuasive than rationality.
The people will gravitate to the side that suits them. Freedom is a damn
scary sight, so safety is embraced. If you want to save crypto (and guns
too, btw) talk about freedom and privacy first and crypto second.
It probably won't work though.. just like talking about freedom and
the right to self-defense didn't work with firearms.
As for me.. I don't give a damn how many laws are passed and what sort of
punishments are put into the books: I'll use crypto, get M^S mod N
tatooed on my forehead, and still say whatever I like. And if "they" want
to talk over my position with me in Room 101, they can take the issue
up with the .45 that I'm not supposed to have.
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Let your life be a counter-friction to stop the machine."
Henry David Thoreau "Civil Disobedience"
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv
iQCVAwUBNU5rxwKEiLNUxnAfAQGQ0wP/TD3tVmCDwthBnZE1nDaWDY2xzAPNfiMy
HyjyjfxNqYsmIsGpjpaqAWHC+e2qcfaYvPzpMqc0kNmIrFGHd5tA888aVnPbXSw1
0mBIVyITguplGQBLj9YiJk3TFYgU55rmOI3bGHkt/ytoH8CxBMHCOWEkUFR+C489
6GAj62wOO50=
=c7Pc
-----END PGP SIGNATURE-----
From caj at math.niu.edu Mon May 4 19:33:39 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Mon, 4 May 1998 19:33:39 -0700 (PDT)
Subject: A new Swiss banking novel
In-Reply-To:
Message-ID:
On Mon, 4 May 1998 mgraffam at mhv.net wrote:
> On Mon, 4 May 1998, Xcott Craver wrote:
> > I advise crypto proponents to halt any analogy-making to
> > firearms, for this reason. Nothing against guns, of course; but to gain
> > acceptance crypto cannot be dropped in the same conceptual bin as guns.
>
> And spin the same propoganda wheel as the Man? Not me. I don't see crypto
> gaining acceptance among the masses out of fear.
I don't think it's spinning the same propaganda wheel. In
fact, if anything, you're probably giving in to "the Man" by
letting this view of crypto persist. That is, IMHO; since
IMHO the feds are trying to push this view of crypto.
The implicit connection between crypto and weapons is what
will allow the feds to cater to that fear to get it banned.
Further, as many people simply don't own guns, many are
easily detached from gun-related issues. A large part of
the CA smoking ban was due to this same detachment: a large
non-smoking majority really doesn't give a damn about
smokers' rights, because they don't see it hurting them.
The TRVTH is that crypto will be used by just about anyone
who does anything over an electronic link. People will
need it for friendly day-to-day transactions. A crypto ban
will be harder to push if people see crypto in this way:
less like a gun, more like a car or a beeper; maybe useful to
criminals but useful in everyday affairs to law-abiding people
too---nay, NECESSARY--and a silly thing to ban.
If you stick with the line that "crypto, like a gun, can
be used by good guys as well as bad guys," you'll give
across the opposite impression. Rather than seeing crypto
as something they want and will use a lot, many people will see
crypto as something they probably won't even have in their
house, something whose actual use is something to be avoided.
I mean, you could probably get steak knives banned in today's
climate by defending them like that.
-Xcott
From tcmay at got.net Mon May 4 19:43:29 1998
From: tcmay at got.net (Tim May)
Date: Mon, 4 May 1998 19:43:29 -0700 (PDT)
Subject: A new Swiss banking novel
In-Reply-To:
Message-ID:
At 6:19 PM -0700 5/4/98, Edwin E. Smith wrote:
>I agree completely. While I support the right to own guns (and nukes)
>by anyone, guns can be used both ofensively and defensevely while
>crypto can only be used defensevely.
>
>That is unless you put PGP on a stack of diskettes, glue them
>together and whack somebody with them.
Sorry, but this is nonsense.
Crypto can and has been used just like any other weapon. The freedom
fighters in Burma who use PGP to communicate securely and to plan bombings
against their oppressors...how can this be said to be "only defensive"?
I've said this many times, so I won't spend more time here. All "defensive"
weapons have "offensive" uses. Even shields, even armor, even crypto.
To think otherwise is to show no awareness of history.
--Tim May
"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Licensed Ontologist | black markets, collapse of governments.
From jya at pipeline.com Mon May 4 20:12:23 1998
From: jya at pipeline.com (John Young)
Date: Mon, 4 May 1998 20:12:23 -0700 (PDT)
Subject: NSA Ordered to Tell Secrets
Message-ID: <199805050312.XAA10343@camel7.mindspring.com>
In an April 30 Memorandum Opinion and Order Senior US
District of New Mexico Judge Santiago Campos has ordered
the National Security Agency to produce in camera evidence
that it can refuse to respond to allegations of NSA intercepts
of Libyan and Iranian encrypted messages in the 1980s.
http://jya.com/whp043098.htm (102K)
This order was issued in repsonse to cryptographer Bill Payne's
FOIA request for the information as part of his wrongful
termination suit against NSA and Sandia National Laboratory.
In the 56-page order Judge Campos reviews the principal
actions in the suit, and to buttress the order for NSA to
tell him what it knows about the intercepts invokes recent
FOIA regulations which more stringently require intelligence
agencies to substantiate the use of the "Glomar response"
in refusing to affirm or deny the existence of information on
the grounds that to do so would harm national security.
He states that case law requires more diligent review in the case
of "Glomarization," so he is obligated to make a review in
this instance. He states that based on what NSA has heretofore
provided the court, withholding of information on these intercepts
does not appear justified.
Campos has reviewed public documents on allegations of
the Swiss firm Crypto AG's "spiking" of its cryptographic
equipment (with direction by NSA for backdoors) then
selling it to Libya and Iran, Crypto AG's employee Hans
Buehler's story of the work, Reagan's statement on the intercepts,
and other reports, and finds that while the stories are not
authoritative of the USG position, they do warrant his detailed
review of NSA's Glomar response.
Campos says, paraphrased, "if NSA continues to have the right
it claims in this case to determine what is secret and what is not,
then it can declare anything secret and thereby undercut the very
purpose of the FOIA. That is not acceptable."
It's an impressive summary of the legal conflict between the
public's right to know and governmental secrecy. And may
help ease access information on NSA global surveillance
operations. Or, if Campos decides in NSA's favor, may shut
the door more securely.
From edsmith at IntNet.net Mon May 4 20:29:45 1998
From: edsmith at IntNet.net (Edwin E. Smith)
Date: Mon, 4 May 1998 20:29:45 -0700 (PDT)
Subject: A new Swiss banking novel
In-Reply-To: <3.0.2.32.19980504211950.0086c620@mailhost.IntNet.net>
Message-ID: <3.0.2.32.19980504232748.00864230@mailhost.IntNet.net>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
At 07:43 PM 5/4/98 -0700, you wrote:
>At 6:19 PM -0700 5/4/98, Edwin E. Smith wrote:
>
>>I agree completely. While I support the right to own guns (and
nukes)
>>by anyone, guns can be used both ofensively and defensevely while
>>crypto can only be used defensevely.
>>
>>That is unless you put PGP on a stack of diskettes, glue them
>>together and whack somebody with them.
>
>Sorry, but this is nonsense.
>
>Crypto can and has been used just like any other weapon. The freedom
>fighters in Burma who use PGP to communicate securely and to plan
bombings
>against their oppressors...how can this be said to be "only
defensive"?
>
>I've said this many times, so I won't spend more time here. All
"defensive"
>weapons have "offensive" uses. Even shields, even armor, even
crypto.
>
>To think otherwise is to show no awareness of history.
>
>
>--Tim May
>
>
>"The tree of liberty must be watered periodically with the blood of
>tyrants...."
>---------:---------:---------:---------:---------:---------:---------
:----
>Timothy C. May | Crypto Anarchy: encryption, digital
money,
>ComSec 3DES: 408-728-0152 | anonymous networks, digital
pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information
markets,
>Licensed Ontologist | black markets, collapse of
governments.
>
>
>
>
I suppose that you would consider a forearm raised against a baton to
be offensive also!
Edwin
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQA/AwUBNU6HM0mNf6b56PAtEQIINQCg3y9wKdWphewWDNYcQuU6wsB6UpEAniKm
qlII24wLRe3GswRe1o3d27kL
=FK0r
-----END PGP SIGNATURE-----
When freedom is outlawed.......Only outlaws will be free!
If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.
Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
http://www.self-gov.org/quiz.html
IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
http://www.virusmyth.com/aids/index.htm
From funraiser090 at usa.net Mon May 4 20:40:34 1998
From: funraiser090 at usa.net (funraiser090 at usa.net)
Date: Mon, 4 May 1998 20:40:34 -0700 (PDT)
Subject: Want a new way to get attention?
Message-ID: <199805050340.UAA06898@cygint.cygnus.com>
FOR IMMEDIATE RELEASE...
NEW COPYRIGHTED U.S. MILLION DOLLAR BILLS CREATE SMILES!
Walk into any store and hand them a crisp new...
<><><><><> U.S. MILLION DOLLAR BILL <><><><><>
and you can be sure to get ATTENTION and smiles!
You may even get a date, but you probably won't get any
change! These million dollar bills are...
LOVED BY EVERYONE !!!! They are fun to give or receive.
After all, who wouldn't like a million dollars?
**** BUSINESSES and COMPANIES use them to promote
their business by saying "Thanks A Million!" Others
just like the feel of a wad of million dollar bills
in their pockets!
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
MILLION DOLLAR BILLS
are great conversation openers!
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
Copyrighted and genuine looking U.S. Million Dollar Bills
are an I-N-E-X-P-E-N-S-I-V-E yet unique novelty item that
is EXTREMELY WELL DESIGNED! Your total and FULL
!!!!!!!! SATISFACTION IS 100% GUARANTEED !!!!!!!!!
The bills are a FUN and very profitable item for.....
$$$$$$ FUND RAISERS and CHARITIES to raise money $$$$$$$
The bills sell VERY WELL at $1 each and are available in
large quantities for less than .45 cents each!!!!!!!!
********** O-R-D-E-R Y-O-U-R-S N-O-W ********
FUN pack... 12 of the million dollar bills only $14.95
ECONO pack.. 20 of the million dollar bills only $19.95
JUMBO pack.. 60 of the million dollar bills only $44.95
DELUXE pack. 150 of the million dollar bills only $89.95
WHOLESALE pack..500 of million dollar bills only $199.95
Your SATISFACTION is GUARANTEED! If not FULLY satisfied
return all bills in original mint condition and get....
############ Money Back no questions asked! ############
Orders can be accepted by cash, check, money orders, VISA,
MASTERCARD or AMERICAN EXPRESS via postal mail ONLY to:
MJH
P.O. Box 14909
San Luis Obispo, CA 93406-4909
Name ___________________________________________________
Shipping Address _______________________________________
City_________________________ ST ____ Zip ______________
Payment method: ___ VISA ___ MC ___ American Exp.
___ Cash ___ Check ___ Money Order
Credit Card Number: ____________________________________
Expiration date: ______________ Order Amount: __________
Signature: _____________________________________________
Ordering packet: ___ Fun $14.95 ___ Econo $19.95
___ Jumbo $44.95 ___ Deluxe $89.95 ___ Wholesale $199.95
All orders INCLUDE SHIPPING and HANDLING !!!!!
From mgraffam at mhv.net Mon May 4 20:55:31 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Mon, 4 May 1998 20:55:31 -0700 (PDT)
Subject: A new Swiss banking novel
In-Reply-To:
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
On Mon, 4 May 1998, Xcott Craver wrote:
> I don't think it's spinning the same propaganda wheel. In
> fact, if anything, you're probably giving in to "the Man" by
> letting this view of crypto persist. That is, IMHO; since
> IMHO the feds are trying to push this view of crypto.
I understand this view, but I don't see the worth in whitewashing things
for the public. We've been fed enough BS already.. defending crypto
with ready-made arguments that sound good and don't conjure up images
of firearms is no different to me than spinning a long tale about
Iraqi terrorists and drug dealers that conjure up fear to support the
ban on weapons.
I'd rather speak the truth, so far as I understand it, and let it conjure
up what it may.
> The implicit connection between crypto and weapons is what
> will allow the feds to cater to that fear to get it banned.
I understand this. They've got us good. Those that would ban crypto
would have the public believe that we are all a bunch of crazy, paranoid
math/computer geeks and that the FBI, NSA and their ilk can protect
the public from harm (and us?). That fear will always get fed upon.
That fear will be used to twist things all out of shape until they seem
to be a negative image of what is really there. This happens all the time.
If we are going to combat this stuff, it is going to have to be by
fighting that fear, and not throwing around horse-shit arguments like
big business and the government do.
If we are going to ease the fear of _guns_, then responsible adults need
to start (or further) gun clubs. Larger clubs need to take part in civic
events to show the people by their actions that they aren't a bunch of
lunatics who shoot at everything that moves. Such clubs need to work with
civilian watch organizations and the police to train citizens to respect
firearms and to help get illegal weapons off the streets.
Cypherpunks need to write code. We need to show people that strong crypto
isn't just some obscure technology used to lock away kiddie porn and
transmit super-spy doomsday messages. We need to get good, user friendly,
applications to do document signing, watermarking, email encryption, bulk
file encryption, and countless other tasks. These applications have to
be usable; they have to integrate in with the user's desktop and ordinary
applications (MS Word, Photoshop, etc) as well as possible.
I think that we all know that the uses and benefits of strong crypto
far outweigh the drawbacks. The uses are there, today. If we could plug
strong crypto into the desktop; if the "Kick-ass-military-grade crypto ON"
button were a click away from "Save as.." and if all that were sitting
on John Q. User's naked Cindy Crawford desktop picture, then it would
become as friendly to them as any other feature MS Word, and soon enough
the very statement "Bad guys use crypto" begins to sound dumb because
the fear isn't there anymore.
Fundamentally fear is irrational. The best arguments in the world won't
speak to an irrational person. You have to ease those fears with actions.
Again.. cypherpunks write code.
> The TRVTH is that crypto will be used by just about anyone
> who does anything over an electronic link. People will
> need it for friendly day-to-day transactions.
Absolutably. I just don't think that they will get this by talking
about how crypto can be used in friendly day-to-day transactions.
> A crypto ban will be harder to push if people see crypto in this way:
> less like a gun, more like a car or a beeper; maybe useful to
> criminals but useful in everyday affairs to law-abiding people
> too---nay, NECESSARY--and a silly thing to ban.
Cheers! :)
> If you stick with the line that "crypto, like a gun, can
> be used by good guys as well as bad guys," you'll give
> across the opposite impression.
But it can. Just like a beeper or a car can. Just like any sort of
technology can. This is the truth, and I'm not in the business of
lying.
When John Q. America tells me that drug dealers use guns, I'll agree
and point to the police officers (damn.. not real good example, but
you get the idea :)
When they quiver in their boots because of IDEA or CAST and tell me
that bad guy Y uses crypto to hide his world domination plans, I'll
agree, and then I'll point to the U.S. defense messaging system.
> I mean, you could probably get steak knives banned in today's
> climate by defending them like that.
I'm sure you are right.. but defending them like that is the _truth_
any technology _can_ be used for good or evil.. we have to stop the
people, not the technology. Even though your method may work a little
more efficiently, it tries to cover over the truth; to hide it.
I can't do that. Covering up the truth is a step away from denying it..
an easy step to make going down, but it is one hell of a hard climb
coming back up.
I'll take my chances with C, and maybe some Perl if I'm lucky. If things
really get hairy, I can always resort to the tatoo and the .45
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Let your life be a counter-friction to stop the machine."
Henry David Thoreau "Civil Disobedience"
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv
iQCVAwUBNU6LygKEiLNUxnAfAQEiXwQAos6MRfoG1zPXfEvcPD5Qp4P/oXImd1IG
Rf4nphQpsla6aqLl4mh618CJ2iOb4wXV+f0JWcge4GQKVULxC3LeqhtJp25uToMc
rAzUg7LrjIkKaB0j8sWmE+7zGuvX7fzDxT+k3UkXFArwS5ZRrGTW0Ec1h8fkA8Ic
Ccft2AXDk+I=
=LjLm
-----END PGP SIGNATURE-----
From special at teacup.wbvs.com Mon May 4 22:03:53 1998
From: special at teacup.wbvs.com (special at teacup.wbvs.com)
Date: Mon, 4 May 1998 22:03:53 -0700 (PDT)
Subject: RON JEREMY UNPLUGGED!!!
Message-ID: <199805021349.GAA23554@TEACUP.WBVS.COM>
NOTICE...MINORS ARE STRICTLY PROHIBITED!!!!
Get a FREE autographed photo of Adult icon RON JEREMY when you order any video from the premiere adult video web site on the net. And...with our try before you buy guarantee, you can see over 1,000 hardcore video previews on line. As an added bonus, buy any two videos and get your choice of a FREE video and the RON JEREMY photograph. No other Web site can make you this offer.
http://208.233.66.150
Offer is for a limited time, so order before May 5, 1998, or you will miss out on this grea t deal.
For the best sexual reference library, visit www.kinkysexacts.com.
///////////////////////////////////////////////////////////////////////////////
If you wish to be removed from future mailings, please reply with the subject
"Remove" and this software will automatically block you from our future mailings.
////////////////////////////////////////////////////////////////////////////////
From anonymous at netassist.se Mon May 4 22:41:03 1998
From: anonymous at netassist.se (Anonymous)
Date: Mon, 4 May 1998 22:41:03 -0700 (PDT)
Subject: corvette.bxa.doc.gov
In-Reply-To:
Message-ID: <93e305df326c177e9c0b2bb0ed69b147@kapten.zoom.nu>
mgraffam at mhv.net writes:
> Ahh well.. from your log entries, it seems as if corvette isn't
> necessarily just running a bot. It looks as if humans might be running
> around too. I prefer the bot, personally..
An AltaVista search for the name yields a number of www logfiles
(including MIL sites) that go back until 1996.
FOIA, anyone?
From caj at math.niu.edu Mon May 4 23:48:14 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Mon, 4 May 1998 23:48:14 -0700 (PDT)
Subject: Explaining crypto to people (was Re: A new Swiss banking novel)
In-Reply-To:
Message-ID:
On Mon, 4 May 1998 mgraffam at mhv.net wrote:
> On Mon, 4 May 1998, Xcott Craver wrote:
>
> I understand this view, but I don't see the worth in whitewashing things
> for the public. We've been fed enough BS already.. defending crypto
> with ready-made arguments that sound good and don't conjure up images
> of firearms is no different to me than spinning a long tale about
> Iraqi terrorists and drug dealers that conjure up fear to support the
> ban on weapons.
I'm not advocating "ready-made" arguments. Rather, I'm
suggesting that we get rid of an *analogy*. An analogy isn't
the truth. In this case, it's a way to frame the truth
for non-technical people. Dropping an analogy is subtracting
BS, not adding it.
Now, I'm not saying analogies are evil, but the analogy
to firearms is a *bad* one, and it stands to give people
the misconception that crypto is many things that it is
not (not to mention including ).
If you want to analogize crypto to something, analogize
it to something crypto is more like.
> > The implicit connection between crypto and weapons is what
> > will allow the feds to cater to that fear to get it banned.
>
> I understand this. They've got us good. Those that would ban crypto
> would have the public believe that we are all a bunch of crazy, paranoid
> math/computer geeks
Well, after all, once we perfect the neural interface, we _will_
all become munitions.
> If we are going to combat this stuff, it is going to have to be by
> fighting that fear, and not throwing around horse-shit arguments like
> big business and the government do.
You can't fight fear unless you remove some misconceptions.
The association with firearms (which is in turn associated
by the gov't to baaad things) is only going to cause
misconceptions in the public arena.
> If we are going to ease the fear of _guns_, then responsible adults need
> to start (or further) gun clubs.
This is, IMHO, the wrong way to remove the fear caused by
the crypto-firearm analogy. The right way is to drop the
analogy, because it's flawed. I agree that people should
be less afraid of guns, but you just don't have TIME to cure
that, if you can at all.
> I think that we all know that the uses and benefits of strong crypto
> far outweigh the drawbacks. The uses are there, today. If we could plug
> strong crypto into the desktop; if the "Kick-ass-military-grade crypto ON"
> button were a click away from "Save as.." and if all that were sitting
> on John Q. User's naked Cindy Crawford desktop picture, then it would
> become as friendly to them as any other feature MS Word, and soon enough
> the very statement "Bad guys use crypto" begins to sound dumb because
> the fear isn't there anymore.
..As will the phrase, "cryptography is like a gun...." Joe User
won't see authentication as "like a gun" any more than his telephone
is "like a gun."
> > If you stick with the line that "crypto, like a gun, can
> > be used by good guys as well as bad guys," you'll give
> > across the opposite impression.
>
> But it can. Just like a beeper or a car can. Just like any sort of
> technology can. This is the truth, and I'm not in the business of
> lying.
?!!?!!!
The phase, "now, bad guys can use this to kill you just like
a gun, but responsible law-abiding citizens can use it too"
is true for ALL solid objects larger than a breadbox. You
do NOT say this, however, when selling someone a halogen lamp
or a Tickle-me-Elmo doll, or introducing them to anything
new that they should have at home. This doesn't make you a
liar.
It is chillingly naive to defend an argument on the grounds
that when dissected logically it is a true statement.
Do you approve of the government repeatedly warning people that
"crypto can be used by terrorists!" It is, after all, a true
statement! How about the next time you walk through airport
security you say, "I could have concealed explosives in my pants."
True statement, and you're not in the business of lying. Would you
consider yourself less honest for not saying it?
See, whatever the truth value of the statement, the end
result is the suggestion of a lie.
> I'm sure you are right.. but defending them like that is the _truth_
> any technology _can_ be used for good or evil.. we have to stop the
> people, not the technology. Even though your method may work a little
> more efficiently, it tries to cover over the truth; to hide it.
Dropping a flawed analogy isn't covering the truth. Rather,
keeping the analogy distorts the truth. It scares and
alienates people and makes them think cryptography is this
weird stuff they'll never personally use which is less
like a PIN number on steroids and more like plastique.
And this is the last thing we need.
> Michael J. Graffam (mgraffam at mhv.net)
-Xcott
From mgraffam at mhv.net Tue May 5 01:00:14 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Tue, 5 May 1998 01:00:14 -0700 (PDT)
Subject: Explaining crypto to people (was Re: A new Swiss banking novel)
In-Reply-To:
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
On Tue, 5 May 1998, Xcott Craver wrote:
> I'm not advocating "ready-made" arguments. Rather, I'm
> suggesting that we get rid of an *analogy*. An analogy isn't
> the truth.
Agreed. The analogy is not the truth, however, it is true firearms,
beepers, cars and another other technology can be used for good or evil.
To treat crypto differently than these other technologies merely because
we have an interest in it is less than desirable.
What I advocate is to present the view that the technology in all forms
be advanced, and where appropriate disclosed. Undisclosed BS crypto
algorithms have hurt us for to long. Bad design in the telephone system
has done the same. I advocate full disclosure and advancement. When
those who are scared of these things try to leverage fear against it
by saying that undesirable can/will use it, I will not deny this, because
it is true.
Having said that, I don't really think it is necessary to go around
saying "Crypto is like a bomb" either. Crypto _can_ be used as a defensive
or an offensive weapon, however the same technology can be used for
authentication and digital cash and loads of other neat stuff. I'll
preach about all of them, especially those that I personally have an
interest in.. authentication, digital cash and secure email.
> If you want to analogize crypto to something, analogize
> it to something crypto is more like.
There is a reason that militaries have long used spears and crypto.
I do not mean this statement to conjure fear, but it is true that
crypt can be used as a weapon; it is, after all classified as a
munition, and for good reason when looking for the government's POV.
Certain analogies are useful in certain instances. When useful to
make the analogy to firearms, it _can_ be an excellent one.. so can
a lock.
Last time I checked though, padlocks aren't a hot topic for debate as
to their being banned. Crypto, in certain aspects, is.
> ..As will the phrase, "cryptography is like a gun...." Joe User
> won't see authentication as "like a gun" any more than his telephone
> is "like a gun."
Right. But I don't trust words to get it done. Most people will believe
what they are told. And I can't scream as loud as the machine.
> The phase, "now, bad guys can use this to kill you just like
> a gun, but responsible law-abiding citizens can use it too"
> is true for ALL solid objects larger than a breadbox.
Exactly. Which is _precisely_ the reason why outlawing things on the
basis that criminals can use them is insane.
> You
> do NOT say this, however, when selling someone a halogen lamp
> or a Tickle-me-Elmo doll, or introducing them to anything
> new that they should have at home. This doesn't make you a
> liar.
No, I dont offer it up because it is irrelevent.. as you say, the same
is true for a breadbox. But if asked point-blank if some technology
can be used for crime Y, I'll admit it if it is true, and then I'll
show the foolishness of this line of thought.. and I'd make that point
that if we take this line of thought to its conclusion we must get
rid of everything larger than a breadbox.
And, after all that, if we are talking about controversial technologies,
individual freedoms and the like, I may just bring up firearms because
it is a technology that is in the same boat as crypto. A munition that
is getting a whole lot of attention.
> It is chillingly naive to defend an argument on the grounds
> that when dissected logically it is a true statement.
Are you suggesting that I should defend and argument, when looked at
logically is false?
> Do you approve of the government repeatedly warning people that
> "crypto can be used by terrorists!" It is, after all, a true
> statement!
Yes, it is a true statement.. and so is "crypto can be used by nice old
grandma's to exchange email with the grandkids in NY." Do I approve of
the gov't saying X? Only if they also say it's compliment (which is
equally true) else they are misrepresenting what is true by being
biased. One can take many true statements and present them in a way to
make things seem to be what they are not.
> Dropping a flawed analogy isn't covering the truth. Rather,
> keeping the analogy distorts the truth.
See, I don't think that the analogy to weaponry is all that far off.
The exact same software that could let me sign my documents or
order neat stuff over the web can use the exact same algorithms
for transmitting designs for bombs.
Lets face it. Weaponry _is_ a double-edged sword.. so is crypto.
If we say that we want to bring every criminal to justice in the
most efficient way with no regard to anything else, then we should
get rid of crypto.. its as simple as that.. thats pretty obvious.
However, it is also true that weaponry has a good side.. it can
protect us against those criminals that we don't bring to justice.
Crypto has even bigger advantages.. it is _the_ technology that
can fuel completely new ways of commerce and communication..
and it can protect us from the bad guys too.. and, statistically,
a whole helluvalot better than guns can at that.
I don't think that we should make crypto out to be different from
guns in that they are completely different, because there are a lot
of similarities .. how they have been used historically, some of the
pros and cons, etc. This is a very real concern.
Let me ask you. If you were held hostage, which would you rather have
your captor's exchange of information encrypted with, IDEA or an
aristocrat? What would you rather have the criminals run around with,
guns or clubs?
The answers are simple, if all we value is our safety.. but this is
what I have tried to convey.. for both of these technologies, crypto and
weaponry.. the reasons for having them around far surpass our concerns
for safety from bad guys.
I think that weaponry and crypto are related. They both have direct
military uses, and they both have direct civilian uses. Both are
controversial. I think that the analogy between them can be a good
one, in some circumstances.
Right now, I think that crypto is in a position similar to where firearms
were (minus the hostile environment) during times of exploration in days
past. It stands as a technology that is capable of serving us in a
variety of powerful ways during a time where its application is
vitally important.
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Let your life be a counter-friction to stop the machine."
Henry David Thoreau "Civil Disobedience"
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv
iQCVAwUBNU7FIgKEiLNUxnAfAQGKQAP9FKyuQeQol3iWzmKt/DvpfVa0q5wmniyK
+8G2+RREtnuCvDF2G13Ik09qMk/+0Ylv5c8IEmPk42p7G19im6W6uu1iGheO1RPn
096mfALKLGVkbXina6d8TsvjQvlhJ++ls+4eKSYOHhppptdsrcC+xqHwB+DqxMNH
SOJeEPkKZho=
=0ylt
-----END PGP SIGNATURE-----
From ichudov at algebra.com Tue May 5 02:12:22 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Tue, 5 May 1998 02:12:22 -0700 (PDT)
Subject: Why are you bouncing my mail to Cypherpunks?
In-Reply-To: <3.0.5.32.19980505014354.00913b60@popd.ix.netcom.com>
Message-ID: <199805050908.EAA02726@manifold.algebra.com>
The antispam assholes suddenly blocked domain ix.netcom.com.
(an amazing thing to do, all in all, and shows how far away from reality
can people be carried out by religion)
It turned out that sendmail at our mail relay site was ckecking
their "blackhole DNS database".
I deleted all the rules that refer to them and now things seem to be OK.
I am sorry for your troubles, Bill. Thanks for letting me know.
igor
Bill Stewart wrote:
>
> Hi, Igor - this bounced. Is it because I sent it as
> stewarts at ix.netcom.com
> instead of
> bill.stewart at pobox.com
> (which is how I subscribe, through cyberpass), or is RBL blocking
> Netcom again, or is something else wrong?
>
> Thanks; Bill
>
>
> >Return-Path: <>
> >Received: from dfw-ix13.ix.netcom.com (dfw-ix13.ix.netcom.com [206.214.98.13])
> > by ixmail7.ix.netcom.com (8.8.7-s-4/8.8.7/(NETCOM v1.01)) with ESMTP id KAA03312;
> > for ; Mon, 4 May 1998 10:15:35 -0700 (PDT)
> >Received: from localhost (localhost)
> > by dfw-ix13.ix.netcom.com (8.8.4/8.8.4) with internal
> > id MAA15308; Mon, 4 May 1998 12:15:32 -0500 (CDT)
> >Date: Mon, 4 May 1998 12:15:32 -0500 (CDT)
> >From: Mail Delivery Subsystem
> >Message-Id: <199805041715.MAA15308 at dfw-ix13.ix.netcom.com>
> >To:
> >Subject: Returned mail: Service unavailable
> >Auto-Submitted: auto-generated (failure)
> >
> >The original message was received at Mon, 4 May 1998 12:14:52 -0500 (CDT)
> >from smap at localhost
> >
> > ----- The following addresses had permanent fatal errors -----
> >
> >
> > ----- Transcript of session follows -----
> >... while talking to mail.algebra.com.:
> >>>> MAIL From: SIZE=1102
> ><<< 521 ... #blocked.contact postmaster
> >554 ... Service unavailable
> >
> > ----- Original message follows -----
> >
> >Return-Path:
> >Received: (from smap at localhost)
> > by dfw-ix13.ix.netcom.com (8.8.4/8.8.4)
> > id MAA15254 for ; Mon, 4 May 1998 12:14:52 -0500 (CDT)
> >Received: from pax-ca6-17.ix.netcom.com(199.35.217.209) by dfw-ix13.ix.netcom.com via smap (V1.3)
> > id rma015185; Mon May 4 12:14:15 1998
> >Message-Id: <3.0.5.32.19980504100635.008f7950 at popd.ix.netcom.com>
> >X-Sender: stewarts at popd.ix.netcom.com
> >X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
> >Date: Mon, 04 May 1998 10:06:35 -0700
> >To: cypherpunks at algebra.com
> >From: Bill Stewart
> >Subject: Forward: --India's INSAT hacked
> >Mime-Version: 1.0
> >Content-Type: text/plain; charset="us-ascii"
> >
> >>From Computer Underground Digest
> >------------------------------
> >
> >Date: Tue, 28 Apr 1998 11:06:30 -0700
> >From: Jeremy Lassen
> >Subject: File 9--India's INSAT hacked
> >
> >Space Age Publishing's India correspondent B. R. Rao reports that
> >"hackers" have succeeded in stealing transponder time on board
> >India's domestic communications satellite, INSAT. The Network
> >Ops. Control Center(NOCC)of India's Dept. of Telecommunications
> >is "...in the process of identifying the culprits".
> >
> >The director of NOCC confirms that a reward has been offered to
> >anyone who can provide information that helps identify the
> >culprits. Reports indicate the NOCC is aware that "...anybody in
> >possession of the technical details of INSAT and its frequency
> >ranges can at regular intervals tap into its transponders and
> >transmit data free across the globe."
> >
> >I know this is rather vague, but I hadn't read about this
> >anywhere else, and thought that the CUD's readers might find it
> >interesting. Anybody need some transponders time? :)
> >
> >
> >
> >
> Thanks!
> Bill
> Bill Stewart, bill.stewart at pobox.com
> PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
>
>
>
> Thanks!
> Bill
> Bill Stewart, bill.stewart at pobox.com
> PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
>
- Igor.
From billp at nmol.com Tue May 5 07:12:55 1998
From: billp at nmol.com (bill payne)
Date: Tue, 5 May 1998 07:12:55 -0700 (PDT)
Subject: Payne-Morales vs. NSA: Memorandum Opinion and Order
Message-ID: <354F1D2B.375A@nmol.com>
Tuesday 5/5/98 7:17 AM
Lawyers and MCs
Morales and I met on Monday to discuss strategy for response to
Payne-Morales vs. NSA: Memorandum Opinion and Order
which is cross-linked at http://www.aci.net/kalliste/ from
http://www.jya.com/whp043098.htm
We will, of course, file
Rule 52. Findings by the Court; Judgment on Partial Findings
(a) Effect. In all actions tried upon the facts without a jury or
with an advisory jury, the court shall find the facts specially and
state separately its conclusions of law thereon, and judgment shall be
entered pursuant to Rule 58; and in granting or refusing interlocutory
injunctions the court shall similarly set forth the findings of fact and
conclusions of law which constitute the grounds of its action. Requests
for findings are not necessary for purposes of review. Findings of fact,
whether based on oral or documentary evidence, shall not be set aside
unless clearly erroneous, and due regard shall be given to the
opportunity of the trial court to judge of the credibility of the
witnesses. The findings of a master, to the extent that the court adopts
them, shall be considered as the findings of the court. It will be
sufficient if the findings of fact and conclusions of law are stated
orally and recorded in open court following the close of the evidence or
appear in an opinion or memorandum of decision filed by the court.
Findings of fact and conclusions of law are unnecessary on decisions of
motions under Rules 12 or 56 or any other motion except as provided in
subdivision (c) of this rule.
(b) Amendment. On a party's motion filed no later than 10 days after
entry of judgment, the court may amend its findings--or make additional
findings--and may amend the judgment accordingly. The motion may
accompany a motion for a new trial under Rule 59. When findings of fact
are made in actions tried without a jury, the sufficiency of the
evidence supporting the findings may be later questioned whether or not
in the district court the party raising the question objected to the
findings, moved to amend them, or moved for partial findings.
motion.
Lawyers, we suspect that the possibility that Campos wrote the 56 page
document is remote.
Reason is that informants within the federal court system have told us
that
the government lawyers write the opinion and order, then gives them to
the
judge to sign.
Morales and noticed in previous cases that material not presented to
judges were appearing in the judges� documents.
So when we study the document we will be looking for
1 material cited by Campos which Campos did not or should not
have in his possession
2 introduction of legal citations not presented to the court by either
plaintiffs or defendant.
A judge is supposed to judge, not help either side.
3 felony violations of the False Statement Act.
We learned from an Hispanic lawyer that government lawyers give false
citations
of case law to a judge to have the judge agree and dismiss the
plaintiff's case.
Morales and I still have been unable to obtain docket sheets from the
Tenth circuit for
cases No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia.
We both won but crooked federal judges gave the win to Sandia.
Morales and my main purpose in filing the NSA genocide and deficient
crypto
algorithm lawsuit was to expose corruption in the US federal court
system.
A side purpose an international public service to expose technical
details of NSA�s
bungled spy stingS so that congress can take some action to remedy
damage done
by US �intelligence� agencies.
Albuquerque Journal 4/21/98 page A6 reports what happened.
U.S. Aided Communist Foe Pol Pot
Richard Reeves
LOS ANGELES - ...
Even after he fell from national power, we helped supply and protect
Pol Pot because the Khmer Rouge was tying down large number of
occupying
North Vietnamese troops.
These are some of the names of the evil who were or still are paid
friends:
o Saddam Hussein, paid for making war on Iran.
o Gulbuddin Hekmatry, who made his name throwing acid in the faces of
female
students in Kabul who dared to wear western dress, paid for making
was against
communists in Afghanistan.
o The Taliban, the religious warriors we helped train to fight
communists who are
beating or killing those same women right now in Afghanistan.
o Manuel Noriega, the soldier-thug we encouraged to overthrow
elections in Panama
because we did not like the results.
o Mobuto Sese Seko, one Joseph Mobutu, our man in Zaire.
o Jonas Savimbi, in constant war in Angola
The list goes on. It has for a long time and will, even if communism
is dead as a
national security threat of the United States. In may of these cases
our interest
involved resources - oil, usually, ...
Settlement should be made QUICKLY Before something possibly VERY
UNFORTUNATE happens.
Also, I needed legal delivery practice prior to filing a Privacy Act and
defamation
lawsuit.
Let's all hope for settlement.
Later
bill
From jf_avon at citenet.net Tue May 5 07:21:27 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Tue, 5 May 1998 07:21:27 -0700 (PDT)
Subject: Explaining crypto to people (was Re: A new Swiss banking novel)
Message-ID: <199805051426.KAA25168@cti06.citenet.net>
On Tue, 5 May 1998 01:48:02 -0500 (CDT), Xcott Craver wrote:
> Now, I'm not saying analogies are evil, but the analogy
> to firearms is a *bad* one, and it stands to give people
> the misconception that crypto is many things that it is
> not (not to mention including ).
I agree on you opinion of the use of analogies, at large.
The stigma is real (as in "happening") but it is nevertheless a load of bull
since it is the result of the population misconceptions, of being brainwasher by the apostles of
political correctness.
The quintessential aspects of guns in a free society is that they are Liberty's teeths.
Crypto is also the same, only after the teeths have been bashed in...
I argued this over the Canadian Firearms Digest list.
Ciao
jfa
Jean-Francois Avon, Pierrefonds(Montreal) QC Canada
JFA Technologies, R&D physicists & engineers
Instrumentation & control, LabView programming.
PGP keys: http://w3.citenet.net/users/jf_avon
and: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From jf_avon at citenet.net Tue May 5 07:24:27 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Tue, 5 May 1998 07:24:27 -0700 (PDT)
Subject: Explaining crypto to people (was Re: A new Swiss banking novel)
Message-ID: <199805051430.KAA25240@cti06.citenet.net>
>> ..As will the phrase, "cryptography is like a gun...." Joe User
>> won't see authentication as "like a gun" any more than his telephone
>> is "like a gun."
It is part of the cultural folklore to believe that "The pen is mightier than the sword"
Ciao
jfa
Jean-Francois Avon, Pierrefonds(Montreal) QC Canada
JFA Technologies, R&D physicists & engineers
Instrumentation & control, LabView programming.
PGP keys: http://w3.citenet.net/users/jf_avon
and: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From whgiii at invweb.net Tue May 5 08:49:18 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Tue, 5 May 1998 08:49:18 -0700 (PDT)
Subject: Why are you bouncing my mail to Cypherpunks?
In-Reply-To: <199805050908.EAA02726@manifold.algebra.com>
Message-ID: <199805051548.LAA03287@users.invweb.net>
-----BEGIN PGP SIGNED MESSAGE-----
In <199805050908.EAA02726 at manifold.algebra.com>, on 05/05/98
at 04:08 AM, ichudov at algebra.com (Igor Chudov @ home) said:
>The antispam assholes suddenly blocked domain ix.netcom.com.
>(an amazing thing to do, all in all, and shows how far away from reality
>can people be carried out by religion)
>It turned out that sendmail at our mail relay site was ckecking their
>"blackhole DNS database".
>I deleted all the rules that refer to them and now things seem to be OK.
>I am sorry for your troubles, Bill. Thanks for letting me know.
Well in all fairness I filter out netcom.com messages (I do have an
exception for Bill). With the exception of Bill's posts netcom is right up
there with aol, compuserve, and a few others where if it's not spam it's
some crap from the clue-impaired.
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: "Do your parents *know* you are Ramones?" - Ms. Togar
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNU81wY9Co1n+aLhhAQEz9wP8CJhDiQ4wWkta6NrZbmZs35MkcLBJRo2j
yHBiuJ7lhkTPNRs7RXOJQvD1e789D9tr0vmoWijY1TgZ8PfvwOFpL4cvRc3y3zRB
v0I0RDg4KIy+KrTejzo6BDK6CrdxQkr/kPyOeQAs12p90c/Nj1kk7uMc+Z5AVZiz
sE7WVterZe0=
=OG6c
-----END PGP SIGNATURE-----
From listmaster at extensis.com Tue May 5 12:25:05 1998
From: listmaster at extensis.com (listmaster at extensis.com)
Date: Tue, 5 May 1998 12:25:05 -0700 (PDT)
Subject: Get Edgy with Extensis PhotoFrame
Message-ID:
Introducing Extensis PhotoFrame for Adobe Photoshop Users
http://products.extensis.com/PhotoFrame/
Remember when building a creative image edge was a headache?
Those days are over.
Extensis has just released PhotoFrame 1.0, a versatile Photoshop
plug-in that enables designers to develop customized, professional-
quality image frames and border effects for any image - right in
Photoshop - in a fraction of the time it used to take.
Volumes 1 and 2 include a collection of hand painted and digitally
created, professionally-designed borders. Start by viewing the
keyword-searchable PhotoFrame collection from within the
image browser catalog. Once selected, simply drag the thumbnail
into PhotoFrame and start using it!
>From there, customize is the word. Simply and quickly adjust opacity,
blur and color while the real-time preview shows the changes as you
make them. You can rotate, flip, invert - or use a combination of up to
3 separate frames to achieve the desired effect.
With multiple redo/undo, you can go back and forth as much as
needed before applying the final effect. When finished, save your
customized effect for future use.
With the speed and versatility of Extensis PhotoFrame, you've got
the Creative Edge.
-----------------------------------------
To order on-line visit: http://products.extensis.com/PhotoFrame/
To order by phone: 1-800-796-9798
Volume 1 (painted edge effects) or Volume 2 (digital edge effects)
are available for $129.95 each.
For even greater savings, both volumes are available as a
specially priced bundle for $199.95. Save $60.00!
PhotoFrame is compatible with both Mac and Windows.
-----------------------------------------
PS. We have made every effort to ensure this message is being
sent only to people who have expressed interest in Extensis products.
If we have sent this to you in error, please accept our apologies and
reply with remove in the subject line for automatic exclusion from
future communications.
From corvuscorvax at hotmail.com Tue May 5 12:25:35 1998
From: corvuscorvax at hotmail.com (Corvus Corvax)
Date: Tue, 5 May 1998 12:25:35 -0700 (PDT)
Subject: The Borg Arrive
Message-ID: <19980505192502.20297.qmail@hotmail.com>
Eric Cordian writes:
> Beware the Borg. Coming soon to a neighborhood store near you.
I was recently asked to produce a drivers license in order to exchange a
pair of long johns, paid for in cash. I asked why. "Store policy" was
the reply. I asked why it was store policy, and the cashier responded
with a hostile stare and exchanged the underwear for me.
Along the same lines, try refusing to give your zip code when asked at a
register. Evidently some stores now simply cannot process a transaction
without it. It's good for a laugh if you're bored. Borged?
571830573294323629934765012348436263285853260687657402192238
Corvus Corvax
324908584730535672342307543875016719214012473014020239437239
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
From tm at algebra.com Tue May 5 13:01:37 1998
From: tm at algebra.com (TruthMonger)
Date: Tue, 5 May 1998 13:01:37 -0700 (PDT)
Subject: First, they came for the morons... / Re: Blizzard Gets Sued For Snooping On Gamers
In-Reply-To: <354E42A8.6C422A1A@brainlink.com>
Message-ID: <354F70C6.4182@algebra.com>
Sunder wrote:
> ---------- Forwarded message ----------
> From: Salvatore Denaro
> --- Blizzard Gets Sued For Snooping On Gamers ---
> Game developer Blizzard Entertainment is being sued for unlawful
> business practices, stemming from the revelation that the company's
> hot-selling new StarCraft snoops through players' hard drives and
> e-mails information to the company over the Internet.
>
> http://www.techweb.com/news/story/TWB19980430S0015
But Blizzard defends the trap door, saying it was
meant to determine if certain players unable to log
onto the company's multiplayer gaming site,
Battle.Net, were using pirated software.
And I've got a trap door into all Government computers to
determine if they have pirated copies of my letters to mom.
Nothing wrong with that, eh?
Besides Driscoll, most players interviewed by
TechWeb said they were not bothered by Blizzard's
actions. "The only people who were affected by this
were the morons who stole the game," said Jesse
Giles, in Houston. "As soon as you steal the game,
you're committing an illegal act."
"First, they came for the morons who stole the game, and
I was a moron with a legal copy, so I didn't speak up..."
Nick Fox, of Waukesha, Wisc., agreed, saying credit
card companies hold large amounts of personal
information without legal liability. "I believe there are
more major invasions of privacy than them finding out
our real names, and everyone should chill," he said.
And if Dad is already bungholing you,then it's no big deal
if Uncle Bob takes sloppy seconds, eh?
Blizzard implies that they are only sticking it in 'a little
bit, but it seems to make sense that, once they have it in, they
might want to 'wiggle it around' a bit, to find out if the user
has pirated copies of their other software. And when they get
together for drinks with their buddies at other corporations,
I imagine they share information so they can keep track of who
the real whores are. Next thing you know, they're carpooling
to gangbang the users, to save on corporate gas.
No doubt advancing technology will allow them to build a 'profile'
of software thieves, enabling them to kick in the doors of poor
niggers and cheap Jews and take them to special camps where they
can be 'reeducated'.
And Nick and Jesse Moron will explain to us how only people who
fit the Piracy Profile have reason to worry, and that the SoftWare
internment camps are much nicer than the Credit internment camps.
The 'upside' of Blizzard's snooping is that if the user has their
credit card information on the computer, then Blizzard can send and
charge them for future updates automatically, saving the user from
having to waste time deciding whether or not they want it.
I'm beginning to think that AOL is the disease, and DC is only a
symptom.
TruthMongrel
From ichudov at algebra.com Tue May 5 15:40:31 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Tue, 5 May 1998 15:40:31 -0700 (PDT)
Subject: Why are you bouncing my mail to Cypherpunks?
In-Reply-To: <199805051548.LAA03287@users.invweb.net>
Message-ID: <199805052238.RAA08070@manifold.algebra.com>
William H. Geiger III wrote:
> at 04:08 AM, ichudov at algebra.com (Igor Chudov @ home) said:
> >The antispam assholes suddenly blocked domain ix.netcom.com.
>
> >(an amazing thing to do, all in all, and shows how far away from reality
> >can people be carried out by religion)
>
> >It turned out that sendmail at our mail relay site was ckecking their
> >"blackhole DNS database".
>
> >I deleted all the rules that refer to them and now things seem to be OK.
>
> >I am sorry for your troubles, Bill. Thanks for letting me know.
>
> Well in all fairness I filter out netcom.com messages (I do have an
> exception for Bill). With the exception of Bill's posts netcom is right up
> there with aol, compuserve, and a few others where if it's not spam it's
> some crap from the clue-impaired.
_You_ can do it. _Cypherpuks at algebra.com_ cannot do it.
- Igor.
From caj at math.niu.edu Tue May 5 16:28:53 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Tue, 5 May 1998 16:28:53 -0700 (PDT)
Subject: Explaining crypto to people (was Re: A new Swiss banking novel)
In-Reply-To:
Message-ID:
On Tue, 5 May 1998 mgraffam at mhv.net wrote:
> Having said that, I don't really think it is necessary to go around
> saying "Crypto is like a bomb" either. Crypto _can_ be used as a defensive
> or an offensive weapon, however the same technology can be used for
> authentication and digital cash and loads of other neat stuff. I'll
> preach about all of them, especially those that I personally have an
> interest in.. authentication, digital cash and secure email.
Which is my point. Crypto can be seen as a weapon, just like
it can be seen as a very strong safe. The public doesn't have
a very strong conception of what this crypto stuff _is_, and
so they're going to suck a lot more than you intended out of
whatever analogy you pick. If you say "bomb," they'll think
"bomb." And this generates misconceptions.
> Certain analogies are useful in certain instances. When useful to
> make the analogy to firearms, it _can_ be an excellent one.. so can
> a lock.
>
> Last time I checked though, padlocks aren't a hot topic for debate as
> to their being banned. Crypto, in certain aspects, is.
Again, my point. Padlocks and safes are *not* under the gun,
so to speak. People will not see crypto regulation as silly
if they keep getting fed bomb and gun analogies. They'd think
it was damned silly if they got padlock and safe analogies.
Remember, many people are still fuzzy about just what this stuff
is that the govt. is trying to regulate.
I mean, when's the last time you saw someone defending their
choice of buying a padlock? Or saying that, "look, a padlock
_can_ be used by criminals, but I'm a responsible adult."
Nobody thinks of evil terrorists when they see a padlock on
the store shelf, and that's the way it should be with crypto.
> > It is chillingly naive to defend an argument on the grounds
> > that when dissected logically it is a true statement.
>
> Are you suggesting that I should defend and argument, when looked at
> logically is false?
Not at all. Nobody's suggesting that anyone lie. Rather:
> One can take many true statements and present them in a way to
> make things seem to be what they are not.
...and one can do this by accident as well. I believe that
telling people crypto is "like a gun" is exactly this. And
this is why I feel the firearm analogies should be dropped
when explaining crypto to people.
> > Dropping a flawed analogy isn't covering the truth. Rather,
> > keeping the analogy distorts the truth.
>
> See, I don't think that the analogy to weaponry is all that far off.
> The exact same software that could let me sign my documents or
> order neat stuff over the web can use the exact same algorithms
> for transmitting designs for bombs.
Then envelopes are weapons. Stamps are weapons. Fax
machines are weapons.
Now, I know, you're thinking, "yes, technically, they are."
But remember, again, that we're talking about explaining
the concept of crypto to people who are pretty much new
to it. They have no idea how literal your analogy is.
The phrase, "the pen is mightier than the sword"
would have a wholly different effect on people if they
had no idea what a "pen" was.
.,-::::: :::. ....:::::: @niu.edu -- http://www.math.niu.edu/~caj/
,;;;'````' ;;`;; ;;;;;;;;;````
[[[ ,[[ '[[, ''` `[[. "I'd like a large order of FiboNachos."
$$$ c$$$cc$$$c ,,, `$$ "Okay sir, that'll cost as much as a
`88bo,__,o, 888 888,888boood88 small order and a medium order combined."
"YUMMMMMP"YMM ""` "MMMMMMMM" _____________________________________________
From jf_avon at citenet.net Tue May 5 20:59:49 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Tue, 5 May 1998 20:59:49 -0700 (PDT)
Subject: Explaining crypto to people (was Re: A new Swiss banking novel)
Message-ID: <199805060405.AAA10956@cti06.citenet.net>
On Tue, 5 May 1998 18:28:46 -0500 (CDT), Xcott Craver wrote:
>Again, my point. Padlocks and safes are *not* under the gun,
> so to speak. People will not see crypto regulation as silly
> if they keep getting fed bomb and gun analogies. They'd think
> it was damned silly if they got padlock and safe analogies.
The analogy of crypto = padlock lack something.
A padlock can *always* pried open. A court order can always be issued to open it.
So Joe Enforcment will be on it's way with it's crowbars, liquid N2, saws and/or torches and do his
duty. It will be no loss of time to him.
Strong encryption is different. No matter what Joe Enforcment try, the crypto lock won't give away
(well, at least, this is what we assume here). Working on it means just one thing: absolute waste
of ressources.
AFA Joe Enforcement is concerned, a gun has some of the same potentiality: try to force it and
you also risk an absolute waste of ressources. From a human standpoint, it might look different,
but if you make abstraction of human life (like most dictators do), some of the effects are similar.
Ciao
jfa
Jean-Francois Avon, Pierrefonds (Montreal), Canada
Unregistered Firearms in the hands of honest citizens: Liberty's Teeth
Strong Cryptographic tools in the hands of honest citizens: Liberty's Voice
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From anonymous at netassist.se Tue May 5 22:45:26 1998
From: anonymous at netassist.se (Anonymous)
Date: Tue, 5 May 1998 22:45:26 -0700 (PDT)
Subject: New restrictions on distributing the SFL
Message-ID: <4c7c7aa1394e1e7a898bb6d6b0097a0a@kapten.zoom.nu>
>Date: Tue, 05 May 1998 17:24:25 -0700
>To: imc-sfl at imc.org
>From: Paul Hoffman / IMC
>Subject: New restrictions on distributing the SFL
I'm sorry to announce that the source code for the SFL has been removed
from the official site. It has been moved to a new site,
that appears to be
export-controlled. You need a password to get the software from that site,
and the passwords are handed out by the US Department of Defense.
I'm personally embarssed that the government of my country enforces such
silly laws. I understand that many other countries have similar laws, but
that doesn't make me feel any better. I had hoped that the SFL would be the
beginning of sensibility on the part of the US government with respect to
cryptography distribution; I still have that hope for the future.
There are many people on this mailing list who are outside the US, and this
change in distribution may prevent you from getting the SFL. If other Web
sites appear that contain unofficial versions of the SFL and do not
restrict who can download from them, I will be happy to list those on the
IMC SFL page at . I would also like to list
links to cryptography packages that work with the SFL at our site.
--Paul Hoffman, Director
--Internet Mail Consortium
From billp at nmol.com Tue May 5 13:17:16 1998
From: billp at nmol.com (bill payne)
Date: Wed, 6 May 1998 04:17:16 +0800
Subject: SHIFT REGISTER technology
Message-ID: <199805051757.KAA23788@modmult.starium.com>
Friday 4/24/98 7:33 AM
John Young
J Orlin Grabbe
John Gilmore
The stuff on linear and non-linear shift register sequences which is now
appearing on jya.com is the �military-grade� crypto technology.
Semionoff and http://www.jya.com/crack-a5.htm contains material similar
to
what I saw Brian Snow present in schematics of NSA KG units.
The statement by david.loos at eudoramail.com
The A5 algorithm uses a three level, non-linear feedback shift
register arrangement, designed to be sufficiently complex to resist
attack.
points to the technology used for military-grade crypto.
The reason NSA regarded the R register, seen at
http://jya.com/whpfiles.htm,
feedback function classified was that it contained a non-linear feedback
function.
I was ORDERED to build UNCLASSIFIED hardware. This is why I stuck the R
register
feedback function in a fast ram.
This similarity between the structure of the nonlinear feedback function
in the
CAVE algorithm seen at
http://www.semionoff.com/cellular/hacking/phreaking/
to the feedback function published in my SAND report
: A11 A1 A5 AND
A1 0= A9 0= AND XOR
A6 A10 XOR XOR ;
reveals �military-strength� technology.
SHIFT REGISTERS.
Words �shift registers� also caused the Great American Spy Sting bust.
http://caq.com/CAQ/caq63/caq63madsen.html
The Cold War is over. And the crypto cat is now about fully out of the
bag.
Let�s hope for settlement so that we can all go on to more constructive
tasks.
Later
bill
From billp at nmol.com Wed May 6 07:07:09 1998
From: billp at nmol.com (bill payne)
Date: Wed, 6 May 1998 07:07:09 -0700 (PDT)
Subject: simplicity & found docket sheet
Message-ID: <35506D8B.6428@nmol.com>
Wednesday 5/6/98 7:29 AM
J Orlin Grabbe
Your new single-column format, I feel, has advantages over
the old three-column format. http://www.aci.net/kalliste/
1 Not as much scrolling as was required to read the three-column
format.
2 When I copies material out of columns 2 or 3 to save in a file
[orlin.txt, of course], I had to use the Auto-format in Word
to collapse the leading blanks.
I am studying, by thinking, about how John Young has organized his
information and the simplicity of what Young has done.
http://www.jya.com/index.htm
Simplicity exudes brilliance. And also, I am guessing, is key
to outstanding architectural designs.
I have some ideas about a 80c32, MASM, and Visual Basic Internet
forum I am mulling-over in my mind. I am completing an 80c32
project.
Then I need to revise my book.
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
Publicity of this mess on Internet has helped book sales.
Today I am working on
1 COMES NOW plaintiffs Payne and Morales [Plaintiffs] to exercise their
rights under the Federal Rules of Civil Procedure, Rule 52. Findings by
the
Court; Judgment on Partial Findings
(b) Amendment. On a party's motion filed no later than 10 days after
entry of judgment, the court may amend its findings--or make
additional
findings--and may amend the judgment accordingly. The motion may
accompany a motion for a new trial under Rule 59. When findings of
fact
are made in actions tried without a jury, the sufficiency of the
evidence supporting the findings may be later questioned whether or
not
in the district court the party raising the question objected to the
findings, moved to amend them, or moved for partial findings.
And I see this morning at
http://www.jya.com/whp-10usca.htm
that John Young found the docket sheet on my case on Internet which
Tenth
Circuit court clerks Fisher and Hoecker refused to send me.
USCA: Payne v. Sandia National Lab Docket May 5, 1998
I think I see WRITTEN EVIDENCE, now published on Internet, that court
clerks and
federal judges have committed Title 18 felony violations of law.
Morales and I are not above filing criminal complaint affidavits when we
possess
WRITTEN EVIDENCE of guilt.
We all must remember the sage words of defendant Harvey Brewster,
If it is not written-down, then it didn't happen.
Sandia/EEOC, fortunately for me, left a WRITTEN TRAIL of evidence of
wrongdoing.
This mess should be settled
http://www.jya.com/whp043098.htm
so that we can all move on to more constructive projects.
Before it gets WORSE. Perhaps megatons worse?
Allahu akbar
bill
From lordsmen at iquest.net Wed May 6 11:26:48 1998
From: lordsmen at iquest.net (Bruises that won't heal)
Date: Wed, 6 May 1998 11:26:48 -0700 (PDT)
Subject: My Philosophy on Life (Please direct all feedback to my email, not to the group)
Message-ID: <199805061826.LAA08914@toad.com>
NOTE: This is probably one of the most unstructured and free-flowing
papers that I have
ever written. Take it with a grain of salt and two advils.
In the world we live today, it is safest to be either at the top or insane.
In a story I read last semester out of my ultra-thick Literature textbook,
this was first introduced to me. One of the leading characters, an
educated man, felt the "sorrow of sanity." It's true that in this world,
we all want meaningful lives. Not only do we want to be successful, but we
need to be happy. The real question of life lies in what brings us
happiness. So, as you read this, keep the goal of happiness in mind.
First of all, I'd like to talk about my influences throughout my life.
Television was a large part of my life in the early years, which I am sad
to say has shaped a very minute amount of my mind. The television, or our
"Vast Wasteland," is a horrible medium that has too much to say about so
much. In my eyes, television has failed to serve the "public's interest,
convenience, and necessity." It has too much of a handle on the world
today, and people blindly accept most/all of what they see. You may tell
yourself that you are not one of those who conform to the views of the
television, but even witty shows such as South Park and insanely stupid
shows like Beavis and Butthead shaped our lives. We used to laugh when
Butthead would slap Beavis, and we'd get excited when Beavis would yell
"Fire! Fire!" A statement which was later proven to be a cause for a
young child to light a fatal fire in his own house. As we grow older, our
minds begin to become more autonomous and move away from such ignorance and
mindless influence, but the way that we are brought up as children will
always be a big influence on our lives. And since those funny Roadrunner
and Coyote cartoons were there and influenced us as children, a very small
part carries over. A happy childhood or a sad childhood shapes what we can
become as adolescent youth. Most of us undergo something sad and traumatic
as children. Mine came around the age of 14 when my sister and father use
to argue constantly. Hatred affects us, even when it isn't directly
between us and someone else. Anyway, this traumatic experience, which also
lasts longer with some, is a major cause for our disbelief and our lack of
immediate trust in everything. It causes us to think twice about
everything, and it causes us to worry. We are burned by everybody
throughout our lives. Remember the first time that our parents tricked us
into something and how angry we were because we were misled? Remember when
you came home to find your pet, who was one of your best friends, gone
forever and never to be seen again? Maybe you came home to find that a
really close relative of yours died and somehow you felt betrayed by either
God, or the doctors, or somehow you felt responsible. Maybe you still
blame yourself for your parent's divorce. Either way, these are the major
climaxes of our childhood which also carry over. You see the jerks out in
the world, and you see those who easily betray, and sometimes you wonder
who first betrayed them, or who manipulated their minds to be so
uncompassionate. It's sad that everyone has to learn these things at a
young age where we are all so susceptible to misbeliefs and conjectures of
the corporate world. But, unfortunately, we learn by mistake and that is
human nature.
This leads me into the thoughts of how human nature can kill a spirit. We
all like to be liked, and we all need to be loved by somebody. A heavy
heart appears where love is less spent. And the nature of hate (which I
believe is not human nature but more a learned emotion) can kill a spirit.
And the feeling of being disliked, betrayed, hell, even when we hate
someone, that all can kill us. But this doesn't prove how human nature can
kill a spirit. I can say this is done because of the way that we naturally
react to so many things. For example, we learn to hate because we are
first hated or betrayed. People can be so cold to us, and we take all
that as a part of us (of course, as children) and we turn it into rage and
hate. When a child is molested by an adult, he/she can instantly reject
the members of his/her offending sex. They can even lose trust in their
parents (especially if the parent is the offender). It's a very sad thing
that this is, and it damages so deeply in the soul and heart. What I'd
like to discuss now is the cause that many people indulge in.
Alcoholism is a terrible disease. I don't say that because I think that
drinking is wrong. I believe that irresponsible drinking is wrong. It's
true that alcoholics don't begin as heavy drinkers, but I believe that
alcoholics form because of drinking due to depression. Those kids who are
neglected and don't have so many great friends as children may seek refuge
in being drunk or high. The position I take on marijuana versus. alcohol
is this. I don't consider anything I can grow in my backyard a drug. And
marijuana isn't nearly addictive as alcohol because you can only become
psychologically addicted. We've all experienced mental addictions (seeing
the Titanic movie twenty some times would probably constitute.) Sex is
more addictive than marijuana is (in my opinion.) Anyway, alcohol is like
anything else in the ways that it can be used responsibly but is unlike
anything else because it can cause people to rape, kill, and do things a
sane person would never dream of. So, people, I urge you to drink
responsibly. Don't drink out of ruins of depression, because it will not
delay problems or solve them. That is the problem with the world today.
We don't solve problems. We just fix them. Anyway, as Michael Stipe says
in Everybody Hurts "Don't throw your hands/hang on/take comfort in your
friends."
My second major concern is pornography. This is some major bull shit.
It's corporate people who, as the government allows them to, take
advantage of people's human urges to cheat on their wives or whatnot.
Sure, you may believe that I am taking things way to far. It's only a
naked chick on a page. But when you find someone special and you want to
have sex with her, she's only the next step up from a bottle of lotion and
a couple of magazines. Porn-freaks begin to see women as objects, argue
with spouses and dates for insignificant reasons. Nothing good comes from
pornography of any type. I guess it's semi-reasonable if a couple want to
use videos together and so, but leave this exploitation alone and I don't
think you'll regret it. Realize that so much of the downfall of America is
just an expense to the success of someone else's success.
Now, my personal feelings on how America works. Government is corrupt.
It's goal is to serve the people with their own interests. This is a
farce. First of all, America is not a democracy. In a true democracy,
each person voices their opinion on every subject. Since we have such a
huge number of people living in our country, this is impossible. So we
elect representatives who we think will best serve in the government
according to our own interests. But this rarely happens. Sure, those
stupid bills that would never get passed (i.e.. drop the gun carrying age
to 14) never do pass. Those are common sense actions. But real
controversial issues (abortion, education, health care, death penalty,
etc.) are very hard to set actions on because it affects so many people and
the politicians have so many decisions to make. But I cannot say that our
government is a failure. They would protect me if Cuba shot missiles at my
home state tonight, and they'll give glue my arm back on if it happens to
fall off on the way to school tomorrow and I had no way to pay for it. So,
we can all argue about what the government is doing, but we must all also
be thankful that our government isn't shooting us as we walk down the
street. Anyway, the government isn't the problem so much in America today.
It's the marketplace. Commercial business has made more laws than the
government, and it's the big corporate giants who will decide what is the
next biggest fashion.
Corporate America is the root of all the trouble I can see in America.
Let's go back to my examples above about the stupid junk with pornos and
drugs and such. Pornography, I will restate, is worthless and damaging to
the United States. Now, let's all ask ourselves where this garbage is
piped in from. Corporate America. How could it be, you ask? Simply put,
most of the people in the United States of America (which never really seem
united) will only do things if it makes them money and or it makes them
happy. Now, most of the time, we won't even do things if it makes us
happy. We'd all be happy to turn the channel when Barney the Money-Hungry
Education Dinosaur comes on, but if the remote is on top of the television,
we might just take a few minutes for the show to really get on our nerves
before we'll get up to change it. That 15 second walk can kill you,
especially if Corporate America has had you up since 5 in the morning.
But, hold on, the kids want to watch Barney. Darn it! You've been slaving
all day at work to raise enough money for those kids to wear expensive
clothes and to buy $30 Barney videos, and now they want to pry into your
time alone? No, you yell at the kids to go watch another television or to
go outside so you can have some peace and quiet. Geez, what's daddy so
angry about? Could it be that he's overworked and stressed, and that he
never spends time with us because all of his spare time is wrapped up in
getting rest for work the next day? Oh, it's no big worry, because daddy
has all day Saturday off to wash the car, plant some flowers, pay the
bills, cook dinner for us, call back all those people who have called
during the week and to go shopping... all the things he enjoys the most.
Maybe this summer, daddy can take a week or two to take us to Dinghy world
and spend so much money on us! Then he can come back and work for two
months to pay off those pesky credit card companies for the thousands of
dollars he spent. And while daddy is at work, those nice guys on
television can tell us about all the neat things to buy. Yes, daddy will
love the looks on our faces when we open up our happy meals (what ever
happened to those cool boxes?) and we get our My Little Pony dolls. But we
can't have just one pony! We need the whole set! Let's get them all
daddy.
A heart that's full up like a landfill.
A job that slowly kills you.
Bruises that won't heal.
You look so tired and happy.
Bring down the government.
They don't speak for us.
I'll take a quiet life. A handshake. Some carbon monoxide.
No alarms and no surprises.
No alarms and no surprises. Please.
Silent. Silent.
This is my final fit.
My final bellyache.
Such a pretty house.
Such a pretty garden.
"Are they getting on your nerves?" I asked the lady who sat behind the
counter. She opened up her purse and laid a twenty dollar bill on the
counter, got up and left. The kids shot me with a water pistol and ran out
the door. They piled into mommy's car as the lady broke down crying. Her
rusted station wagon didn't have a back window, but it had a
semi-translucent tarp to keep out the wind and rain. And then she dropped
her keys. She wiped the tears from her eyes like lakes from the plains,
picked up her keys, and got in the car. Never again will I see that woman,
but what she gave me, I wish I could return tenfold.
That really didn't happen to me, but it speaks words to me. Some of you
may not understand that, but what it is basically is saying is that the guy
who spoke to the woman gained something inside from her pain. She was
barren and empty, poor. She gave him a 20 dollar thought, and he wished he
could give her 200 dollars.
It's all Corporate America's fault. Here we could have a woman who went to
college, but couldn't accept a job because she couldn't afford to move. So
she works days to pay for a tiny apartment, an expensive baby-sitter, and
for her three kids to live. Where's the husband? Dead maybe? Maybe he
was an alcoholic and she kicked him out (not an uncommon thing). Welcome
to Corporate America. In their world, you don't have to bring anything to
survive, but they would like it better if you could leave some stuff
behind. Otherwise, they'll take it away. Let's talk about this.
Creativity can be destroyed from having a job. Yes, crew, by getting a
job, your giving in (not completely, but somewhat) to corporate America.
You just have to find a paying job that you totally enjoy. If you do that,
then you'll never work a day in your life.
For me, I'll be a train engineer. I'd really like to be in a successful
music band. We'd never sell out to anybody. It'd be great. I used to
really, really want to be a bird. I'd want to fly around with a knapsack
on. Inside, I'd have a walkman on that continuously played A-ha's Take On
Me and R.E.M.'s Losing My Religion. I'd also have about 20 peanut butter
and jelly sandwiches. That would be my perfect life.
I feel like I've said so much about everything, but I haven't even began to
scratch the surface of some hot topics. This is your preface to my
thoughts. I'll do addendums as soon as they appear.
Addendum I - Microsoft as a Giant Wart
I was listening to Rush Limbaugh today, and he was talking about how
Microsoft puts this stupid new web browser on every computer no matter what
program you install. For example, if you install a word processor it will
still install Microsoft Internet Explorer 4.0 (a stupid browser) on your
desktop. Well, this is junk. I think that computers are a waste of time,
especially in this time and day. They should never have advanced past
pocket calculators, and mainly because they are too convenient. Too many
people spend nice sunny days sitting in front of the Internet downloading
golf images, or pornography, or whatever. Forget that. I think that
people should sell their computers and buy a set of golf clubs. Maybe you
should take that thousand dollars and get a pet and take a weekend trip.
Computers are nothing but a headache. Don't believe me? Test this against
so many statistics and experience. Ask that accountant neighbor of yours
if he'd rather go for a swim in a pool or figure out some corporate tax
return information. Ask that computer programmer how many times he's
visited another city on a trip that was only for pleasure. Then, ask the
Park Rangers how much they love being outdoors. You're bound to find that
most people hate technology in a raw form. The most beautiful things on
this earth are found in nature, and not on some computer screen or in some
magazine. Anyway, back to Microsoft. Bill Gates is only partly to blame
for Microsoft's reputation. Of course, he has a lot of pull in the company
since he is CEO and chairman, but realize that Microsoft is a huge company
and that he can't possibly oversee every individual aspect of it. Sure,
they are accused of unfair trade practices, but a certain percentage of
that is acceptable (not every company can please everyone all the time.)
But they do an awful lot of bad stuff (I can't give examples here because
they are too complex to explain), but a lot of that comes from regional
offices, etc. So, Microsoft is a monopoly because they own almost every
aspect of computers today. You almost have to use their software in
everything you want done professionally. And a lot of computer users will
say that they really don't like that. I have two options for you. The
first one is, gulp, buy a MacIntosh. The second (which I highly recommend)
is to sell your computer and buy a guitar.
Addendum II - The Internet as a Tool
I'll grant that the Internet is an unboundless tool that almost any company
can incorporate. Scientists can use it to collect data over the world,
share information, and express ideas. Doctors can use it to find out more
about diseases by reading up-to-date information from around the world.
But these noteworthy actions rarely occur. Anyone who goes on the Internet
would have to agree that it really is a not-so-needed "tool" but more of a
world-wide haven for computer geeks. It's mostly full of perverts who'll
have cyber-sex (cyber-sex is, by definition, when two people type actions
and thoughts to each other while mutually masturbating. Sounds fun, eh?)
Every America On-Line user knows what it is like to receive 20 messages per
day about free sex sites and porno distribution, or how to get rich quick.
Nobody is safe from advertising and spam e-mail on the Internet. In my
humble opinion, the Internet has "sold out." It's just like your favorite
underground rock group. Sure, you loved them as a local group and when
they had their own name. But now they are playing wherever they can get
paid the most, etc. It sucks. The Internet used to be an elite
association of computer users (geeks and the normal people, too.) But
Corporate America, namely Microsoft, has tried to put a footstep on each
web page out there. For example, go to a search engine on the Internet (I
suggest Yahoo! or excite.com.) They all practically do the same thing, so
it doesn't matter. Instantly, you will see some advertisement on that
page. Now, in the search field, type in the name of your favorite band.
Click search and wait for the responses. Click on any one of several web
pages that will surely be devoted to the worship of that band. You will
more than likely see a banner for some sponsor (who pays them a dime for
each person who clicks on it). See? Your independent down-home web pages
have been stamped, logged, and dated for Corporations to see. Check this
out. Go to www.microsoft.com. There? Microsoft now has your name, city,
state, and e-mail address. Keep this up, and you can expect some e-mail
from some company wanting to sell you something really soon. Sure, some
web pages don't really want your personal information, but they'd love to
sell it to some other company who would. Welcome to the Internet. A place
of boredom, dull information, sex, lies, and overweight people who still
seem to fit into a size 4.
Addendum III - Music as an Influence
Music is one of the most extraordinary mediums in the world. It's a unique
language that is universal and ancient. I'm sure that some idiot (the
first man, and even the modern man) sat on a rock and beat a club on the
ground and thought, hey, I should for a band. So now we got four poor
musicians who'll do anything for a gig. They're making music that they all
love and life is grand. These are good guys. These are the guys that have
a heart for something that they love and they won't let the world stand in
between them and their dreams. It's the same way with almost all artists.
Nobody can really enter the world of art expecting to be a success or a
failure. But what every person should know is that they can enter the
world of art and be prepared to grow and learn from what happens. I know
that some of the simple photographs that I've seen in my life have changed
the perspective on things for me. And the songs I hear can most definitely
have a major impact on my thoughts and actions. It's simple to see this in
everybody. You know how that fast song with lots of energy comes on, and
before you know it, you're driving 65 in a 30, "feeling the flow. Working
it." It's a great feeling. Something that is irreplaceable (but
definitely not not exceedable.) Radiohead, R.E.M., and The Velvet
Underground are probably the only bands which I've ever felt really
connected to. They all deliver a great message to me, and send that
message on wondrous instrumental works of art. R.E.M. gave me the
advantage of feeling without experience. Lou Reed's simple minded
complexities were great wisdom that I think of daily and is really involved
in a lot of "What Goes On." (That's a song title to a Velvet Underground
song, by the way.) And lastly, Radiohead has shown me the world about. It
conquered my fears and it has really been a guide in the direction of my
life. I understand through that music what may lie in the future. It
really woke me up to quick thinking that my life can be what I make of it.
No one can hold me back from doing what I really want, but some of us
aren't quick to realize that we can hold ourselves back if we don't act on
our judgments and if we don't get motivated to do what we want. I'd
recommend those three CD's to any person in the world. Get all the live
Velvet Underground you can and listen to each work like it was an important
message coming over the telegraph. Write those words down, read them over
and over, then hang them on the walls of your bathroom. Keep a poster of
Michael Stipe in your bedroom and stare at it while you listen to R.E.M.
And watch the nightly news after you've listened to Radiohead and apply
your common sense to a world of chaos. "It's a Man Ray kind of sky. Let
me show you what I can do with it."
Addendum IV - Calvin and Hobbes
This cartoon is so great to me that I just had to mention it here. The
humor, wit, and philosophy that Bill Watterson so ingeniously portrays
through his cartoon characters is unparalleled in my opinion. Calvin in a
six year old boy who knows the perils of elementary school and having
parents, and daydreams about dinosaurs in rocket ships. If you've never
read any of the work, you're missing out on a life-changing set of books.
I used to anxiously await each and every new release of the next book.
It's so great. Anyway, back to our characters. Calvin is a witty, scary,
typical six year old boy. His awesomeness lies in his incredible knowledge
of things he knows nothing about. He picks up a great vocabulary from
television and books, but is a terrible student in school. His stuffed
tiger, Hobbes, is the wise leader of the two (although Calvin claims to be)
and is very smart. The conversations the two have and the experiences they
share open different doors in my mind and soul. From downright hilarious
strips to sad ones that pull your heart into Calvin's, I'm sure that you
won't regret reading anything that Bill Watterson has to put out. I also
admire Bill Watterson because he didn't sell out. He fought syndication as
long as he could, and quit writing Calvin and Hobbes because of the
problems he had with the Corporate monsters who wanted Calvin T-shirts,
stickers, figurines, etc. Screw that. Calvin and Hobbes will always have
an eternally open field to gambol in inside of my heart.
Addendum V - Love
Love is a feeling that people feel when they have a special devotion
towards someone. I am flawed in the fact that I must always feel loved by
a special someone. It's not so bad, I guess, but loneliness is an empty
feeling which I hate. A relationship at a young age (the only thing I'm
experienced at) can be fulfilling or detrimental to a person's happiness.
Some teens grow up all there life on their own and can depend on themselves
solely. Others of us need a special friend or girl/boyfriend to help us
along the way. I think I'm that latter, but the girlfriend/boyfriend thing
isn't like having an extra set of arms. To me, having a relationship with
someone else can be either an escape where you can throw your blues into
the air and forget about them, or it is a place of comfort where you can
get help with your problems. Whatever it is at that certain aspect of
time, a very special bridge can build between your heart and that
significant other. As a young person, it is necessary that we recognize
that life is long and that this relationship most likely isn't one of
eternal reward. But, we put our hearts into it strongly and we hope that
we never part from that special person. It's easy to get hurt in a
relationship, and a lot of times, that pain will carry into other
relationships further down the line. Some people choose to take dating
lightly, and to make high school relationships just fun little dates.
That's fine also. It might be best because it keeps hearts from breaking.
But, I must admit that I need to be loved (just like everybody else does.)
And I can't keep myself from falling for girls who care, are adorable, and
who are fun to be with.
The downfall that I've so hardly been hit with is the haunting of ex-dates.
I broke up with a girl after 2 years, and let me tell you, sometimes it
comes back to haunt me. I can't express this in words, you'll have to
experience for yourself. But trust me when I say that you won't stop
thinking about him/her just because you broke up. You compare stupid
things (and I mean stupid) to what he or she did or was like. And it's so
annoying. You'll learn to despise it.
Addendum VI - Anti-Technology (and what to do about it)
Technology should be feared. Not for what it is, but for what it can
become. Trains, planes, and automobiles were only the opening of a new
gate that will open to endless technological takeover. In my opinion, we
are creating, building, and capitalizing on something that may eventually
lead to our downfall. The world in which we have created has resulted in
laziness, etc. What's technology? First of all, we need to clearly get in
your head what my definition of technology is. Technology is the
inventions that do not use a man's energy and convert it, but use energy
from the world. Often times, it's wasted energy. Nuclear weapons,
toasters, and other machines that we have so great a deal of are a waste of
time and money. It's funny that I say these things because I am a big user
of technology. I have a TV, a VCR, a telephone, a toaster, a car, a
computer, and even a air conditioner. How's that for comfort? Yes, I do
contradict myself, but I could survive in a hut with a fireplace just as
well. It doesn't matter if I did live in a hut either. It's worthless to
set that example without first making clear what I was trying to prove.
Maybe if this ever gets published into a nationwide best-seller, I can
start an au naturale community out west somewhere.
What can I say to do about technology? Succumb. It's all relentless.
Besides, rebellion isn't in style this generation.
Addendum VII - The Continuing Trilogy of Intelligent Music
The intelligence of the music by the Talking Heads and David Byrne is
overwhelming. The spoken words of Thom Yorke of Radiohead can rinse your
head out. The wonderful emotion stored in Pink Floyd's music is wondrous
too. And here is where the trilogy began. Although I don't consider
myself any great genius about any of these bands, they all have a link. In
the 70's, Pink Floyd was a musical takeover. It started this all. I was
considering adding The Velvet Underground and Lou Reed to this, but they
don't qualify. They didn't have such a common theme. Pink Floyd created
the movie, "The Wall," and it was theirs. In the 1980's, David Byrne and
The Talking Heads added a great amount of genius and through music,
mesmorized what has become an elite and intelligent bunch of listeners.
Byrne's movie, "True Stories," made me realize what this was all leading
to. I don't completely understand it myself, and I think it's up to each
individual to decide and to keep watching. Radiohead has continued by
creating movie with a scary tone because of their view of the world. They
have yet to create a movie, but we must remain eager for them to do so.
It's a must. This addendum won't make any sense to you unless you see the
two movies and listen to quite a bit of the music of each band. And listen
to the words are fit them to your view of the world and combine all that
muddy water to the dirt that I put in this. How's that for deep, dark
waters?
Addendum VIII - Photography
Photography, I just want to mention, is a wonderful medium where art can be
captured. Without it, all of us who can't paint or draw would be artless.
There is no such thing as a bad artwork. People who tell you that your
artwork is junk have a hole in their spirit or don't understand.
Everything in the world can symbolize something else. Just hold onto your
artworks. Feeble as such, a cheap blanket from your childhood can bring
tears to your eyes, and a 25 year old photo of a high school love can make
you appreciate times you've had and make memories wondrous. Taking classes
on photography can be great. Learning to master the tools is necessary to
fully, completely understand anything. But getting a grade on photos for
content is damaging. I don't believe that you can grade anything like
that. I respect all photographers because it's more and more becoming a
rarely used art medium and it should be just as respected as painting and
etc. Emotional outlets and ideas can't be graded, and it is dangerous to
manipulate, bias, or fend against that. It's like trying to stop hot water
from pouring out of an open faucet.
Addendum IX - Great Quotations
"They can't tell the difference between working and not working. There's
no concept of weekends anymore."
- True Stories
"The only thing to fear is fearlessness. The bigger the weapons, the
greater the fear."
- Michael Stipe (Hyena)
From bill.stewart at pobox.com Wed May 6 16:16:13 1998
From: bill.stewart at pobox.com (bill.stewart at pobox.com)
Date: Wed, 6 May 1998 16:16:13 -0700 (PDT)
Subject: No Subject
Message-ID: <199805062316.QAA22622@toad.com>
From bill.stewart at pobox.com Wed May 6 17:12:19 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Wed, 6 May 1998 17:12:19 -0700 (PDT)
Subject: ANNOUNCE Bay Area Cypherpunks Meeting - May 9, 12-6pm
Message-ID: <3.0.5.32.19980506155016.008dd510@popd.ix.netcom.com>
The May Bay Area Cypherpunks Meeting will be Saturday at
Temenos, 459 Fulton St. Suite 307, San Francisco.
Some planned agenda items include
- GSM crack hardware demo - Lucky Green
- GSM cryptanalysis details - Ian Goldberg
- Anon mailbox servers - Lucky Green
- OpenPGP status
- hacks in progress
The meeting will be at the usual time - mill around at 12,
organized part starts at 1, dinner nearby later.
459 Fulton is a few blocks west of Van Ness,
probably closest to the Civic Center BART stop.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From gwb at gwb.com.au Wed May 6 22:01:03 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Wed, 6 May 1998 22:01:03 -0700 (PDT)
Subject: Pauline Hanson's One Nation May 1998 Newsletter
Message-ID: <1.5.4.32.19980507045734.00a25f80@mail.pronet.net.au>
Issue 1.9, May 1998
----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return this message
in the body.
----------------------------------------------------------------------------
Dear One Nation supporter in New South Wales,
It is now becoming extremely important that you make your desire to help One
Nation in the upcoming Federal election known to your local branch.
Your local contact (by email or phone) can be seen at the following URL:
http://www.gwb.com.au/onenation/federal/become.htm
Please let these key people know how you can help, whether it be by
assisting in mail drops or manning polling booths.
We need your help!
During the last six weeks we have, as a political party, reached many
milestones.
These milestones, covered on the Internet, include:
- One Nation's birthday party at my farm on April 11th
See: http://www.gwb.com.au/gwb/news/history/day1.html for coverage and images.
- the launch of the One Nation Federal Web site:
http://www.gwb.com.au/onenation/federal
There have also been a number of press releases on a range of issues. These
can be seen at:
http://www.gwb.com.au/onenation/press
You might not be aware that negotiation on the MAI (multilateral agreement
on investment) has been delayed, not stopped. See this URL for my press
release on the MAI:
http://www.gwb.com.au/onenation/press/010598.html
For more information on this secret international treaty, visit:
http://www.gwb.com.au/mai.html
Finally, we need your financial assistance. We are not going to get the big
business million dollar donations like the major parties. We depend on YOU
to help us to promote the image and policies of this party at the upcoming
Federal election.
Please assist if and where you can. There is an on-line donation form at:
http://www.gwb.com.au/pledge.html
Regards,
Pauline Hanson
From StanSqncrs at aol.com Wed May 6 22:26:07 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Wed, 6 May 1998 22:26:07 -0700 (PDT)
Subject: Spam
Message-ID:
Hi cyphers, I'm back. A certain 'nobody' invited me! ;-)
Apparently only as far back as 1993, the definition of the word "spam" from
the on-line jargon file was this (according to the New Hackers Dictionary) -
spam [from the MUD community] vt. To crash a program by over-running a fixed-
size buffer with excessively large input data. See also Buffer Overflow,
Overrun Screw, Smash the Stack.
Obviously that definition has changed since then. I've seen it go from that
to repetitive commercial advertising, and I've seen it used to brand someone
as an outcast of a list for future removal simply because a small minority
didn't like what that person had said (so it was being used at that time to
mean 'objectional material').
And in all the times I've seen the word fly, there has never been anykind of
volume that would come close to overblowing the forum's mechanical
capabilities.
So, I'm curious as to who/what dictated the meaning of that to change so
drasticly. Write me in private if it's off-subject (and yes, you can write me
anonomously if you don't want a response. :-) )
Also, new address for my website -
Stan,
Stan and the Sequencers
http://members.aol.com/StanSqncrs/
From toto at sk.sympatico.ca Thu May 7 01:18:29 1998
From: toto at sk.sympatico.ca (Toto)
Date: Thu, 7 May 1998 01:18:29 -0700 (PDT)
Subject: Dog Log - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <35516EC7.3EAF@sk.sympatico.ca>
Dog Log - SPACE ALIENS HIDE MY DRUGS!!!
_______________________________________
From: "William H. Geiger III"
To: Eric Otot
Cc: cypherpunks at cyberpass.net
Subject: Re: The Borg Arrive
-----BEGIN PGP SIGNED MESSAGE-----
Eric Otot said:
>So I have the choice of going somewhere inconvenient to
>shop, shopping at Rite Aid and paying full MSRP for every
>single item, which hardly any store sells stuff for, or
>getting the incentivized mandatory/voluntary barcoded card,
>and letting the Borg link me with everything I buy, down
>to each and every sheet of toilet paper I use to
>wipe my butt with.
>
>Beware the Borg. Coming soon to a neighborhood store near
>you.
>
>P.S. I went with the card.
So lets get this straight:
You don't like a companies efforts to gather marketing
statistics on its customers but due to your own *sloth* you
not only continue to shop there but you also fill out the
forms for them to track every purchase that you make!
I am sorry but as hard as I try I can not generate the
least bit of sympathy for you. Sheeple are sheeple because
they act in the manner that you just outlined in your
message. Bitch, whine and moan that the store tracks what
brand of toilet paper they buy but if in exchange for $0.10
off 4 rolls and they will give up their entire life story.
Sheep get sheered because they don't know any better,
sheeple get sheered because they deserve it.
------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
------------------------------------------------------------
Tag-O-Matic: I use OS/2 2.0 and I don't care who knows!
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1 ZZZCharset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNUp/Ko9Co1n+aLhhAQHRpwP+OVypg6sRgZMAqW6NmaTexoqoRt4z3zxK
lhQ6HGvmDMxIGqdS5vPPHw+kZPjtJbkxAWamoi6EtOccbv/3otl2bjuFPNBNMYD+
p7nMAhdZDk1zsgiiUhSzp3ZcREcFIy8Ybnu6u4xYf/wgueg26cW+JE8A5iyeJMOz
6dHT6oBT2IE=
=u1mU
-----END PGP SIGNATURE-----
God bless WillyG III!
Eric Otot wrote a reply to WGII's caustic post which
gave a perfectly reasonable account of his preference for
picking which 'battles' were worth his while to engage in,
and which would be merely pissing in the wind of the
masses rushing by to save their dime for the GreyHound
restroom.
I chose to omit EricO's reply and spell-correct WGIII's,
in order to preserve the point made by his post, without
lessening the post's effect by letting it be obvious that
WG3 is an uneducated, redneck, barefoot hillbilly who has
no 'manors'...
I did so for the simple reason that Eric Otot's perfectly
reasonable erudition of his postion on the imposition of
identity-tracking techonlogy, although being a perfectly
valid justification of the need for concentration of
resources, is a position that millions or billions of
perfectly reasonable people are capable of reasoning for
themselves.
Fuck 'reasonable'...
Eric Cordian, a much wiser and more perceptive member of
the CypherPunks list than Eric Otot, though less easily
amused, elucidates one of the many reasons why it may
be unreasonable to remain reasonable in one's reasoning in
regard to what one must take under consideration when
deciding the imortance, or lack thereof, of refusing to
submit to the increasing intrusion of technology into our
lives in return for what are often marginal benefits.
From: Eric Cordian
Subject: Re: The Borg Arrive
To: cypherpunks at cyberpass.net
Steve Schear writes:
> Many of the large grocers in my area have also gone to
> 'club' cards as a means of data mining and loyalty
> promotion. However, the procedure for joining such clubs
> is open loop, in that the cards are issued at the POS
> and no check is made of the information your provide.
> All of mine are pseudoanonymous.
For the time being.
However, that could change once all retail outlets are
MarkOfTheBeast-Enabled.
Infrastructure is infrastructure, after all.
---
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
---
An interesting, widely unknown part of the Club Card
equation is that, even if an individual does not 'provide'
the vendor with the Mark of the Beast (SSN), those who
control the databases involved 'add' MotB/SSN information
from widely available 'lookup' sources.
As well, the Corporate Beast seems to have learned a few
tricks from the Government Beast. Just as the government
takes your money as Federal Taxes and then uses it to 'buy'
the compromise of your 'State rights' under the guise of
matching federal funding, the corporations merely raise
their prices and then give the customer a 'rebate' in
return for registering for the Yellow Star Club Card.
During my recent Soft Target Tour of Tucson, I used my
base-player's Safeway Club Card, but I always made a point
of going to the adjoining Walgreen's first, to get those
things on my list which they sold, before going to Safeway.
I cannot recall a single item which I bought at Walgreen's
which was not a higher price at Safeway, unless one used
the Club Card, whereupon it 'magically' became exactly the
same price as the item was at Walgreen's.
When shopping for myself, I refuse to play the 'Savings
Club' game, for the same reason I don't sell my butt behind
the GreyHound Bus Station for a paltry sum of money.
Instead, I spend a few more dollars paying the inflated
prices, and I leave a few expensive cuts of the store's
meat products in a location where they won't be found for
a few days.
In essence, I pay more as a result of the Sheeple's
actions, and they pay more as a result of mine.
Tim May, a 34th Generation May Son and a licentious
proctologist, has turned his multiple personality affliction
into an overall benefit to the quality of his life by
singlehandedly creating and maintaining all of the various
personas that make up the CypherPunks list subscriber
membership, maintaining the list archives, singlehandedly
inventing all CypherPunks technologies under his 'Tim May'
persona, and keeping his remaining personas in line by
referring them to the 'archives' every time the subordinate
personas try to take credit for legendary CypherPunk
concepts such as 'sliced bread' and the 'wheel'.
Despite being the only real subscriber to the CypherPunks
list, he manages to not only singlehandedly run all of the
Bay Area CypherPunks Physical Meetings, but also to put into
practice the MeatSpace manifestations of the concepts he
espouses, by methods such as discussed in the following:
To: Eric Cordian , cypherpunks at cyberpass.net
From: Tim May
Subject: Re: The Borg Arrive
At 6:05 PM -0700 5/1/98, Eric Cordian wrote:
>A few weeks ago, however, Rite Aid did something which was
>not merely mildly annoying, but actually threatening to my
>privacy.
>
>I walked into the store, and noticed that every sale tag
>in the store had been embellished with fine print
>containing the words "(With your Rite Rewards Card)" Giant
>banners proclaimed that this card was free and could be
>obtained by simply filling out a little form, available
>at any register. This form required your name, address,
>apt, state, zip, phone number, and date of birth, and the
>card was barcoded.
Did you miss the discussion of the Kalifornia Solution?
At physical meetings and parties we _exchange member cards_
randomly.
A persona hit upon this after I was showing my "Safeway" (a
major Kalifornia-based chain in 46 of the 57Semi-Autonomous
Republics) and describing how we can execute a Chaumian
exchange. As the cards are just cards, with no photo and no
obvious I.D. attached, such exchanges are easy.
>Beware the Borg. Coming soon to a neighborhood store near you.
>
>P.S. I went with the card.
But of the cards I have, all are filled out illegibly or
have been traded multiple times. Identity entropy is an
interesting concept.
--Tim May
"The tree of liberty must be watered periodically with the
blood of tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms,
zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information
markets,
Licensed Ontologist | black markets, collapse of
governments.
Federal US Marshall Clow, famous as the LEA who finally
brought the Blues Brothers to Justice and Ray Charles to
Blind Justice, suggests that Identity Entropy Warriors
use the addresses of the the secret lairs of the Circle
of Eunuchs and the Army of Dog in filling out all forms,
so that the UCE/Spams they so dearly love can be forwarded
to them after InfoWar has driven them underground.
To: Rabid Wombat , Martin Minow
From: Marshall Clow
Subject: Re: The Borg Arrives
Cc: cypherpunks at cyberpass.net
At 8:45 AM -0700 5/1/98, Rabid Wombat wrote:
>On Fri, 1 May 1998, Martin Minow wrote:
>> accepts a loyalty
>> card and complains that he has lost his privacy.
>> So, do the Cypherpunks thing -- get another card and use
>> that sometimes.
>> In fact, have all your friends get cards and, whenever
>> you get together throw your cards in a pile and take new
>> ones away with you
>
>> ps: did you actually sign your real name? If so, we're
>> going to take away your secret decoder ring.
> He used his real address. Now they know where to find
> his cat ...
Try
1060 West Addison; Chicago IL (Wrigley Field)
or 70 Brookline Dr.; Boston MA (Fenway Park)
-- Marshall
Marshall Clow Adobe Systems
"I predict future happiness for Americans if they can
prevent the government from wasting the labors of the
people under the pretense of taking care of them."
---Thomas Jefferson
Although Marshall Clow ends his post with a grotesquely
misquoted statement from Thomas Jefferson--whose original
quotations in regard to government invariably contained
words such as ratfuckers, cocksuckers, slimeballs, jerkwads,
etc.--it nonetheless reflects the type of subterfuge that
Jefferson foresaw taking place in the sphere of government,
which is today being mirrored in the methodologies of
corporations worldwide.
The 'federal matching funds' and 'club card savings' scams
are but one example of the reasons that an increasing number
of citizens, such as Tim May, are finding it necessary to
undergo training in proctology, in order to figure out just
what the hell governments and corporations are *doing* back
there...
The preceeding illustrates what individuals and small
cells of Army of Dog Warriors can do to throw an element
of misdirection into the increasing number of tracking
mechanisms being put in place in our daily lives.
However, these effect of these types of resistance to the
digitalization of humanity are generally far outweighed by
the mindless SheepleDom of the masses in allowing themselves
to be herded unquestioningly into an endless variety of
feeding pens where they are expected to feed on corporate
products and, in turn, be fed upon by the government.
Of much more effect are the actions of potential Army of
Dog Warriors who are in positions which allow them to add
misdirection to the digital equation at a level which can
throw a Major Screw into the machinery.
System Administrators, DataBase Managers, Tech Support
personnel, software and hardware Programmers and Developers,
are all in a position to enter random numbers into the
structured equations designed to monitor and track an
increasing number of individual citizens whose lives will
be documented in increasing detail in an ever-widening
network of corporate and government databases.
Tim C. May Owes Me $ .05 As His Share Of The Money That
Was Ripped Off From Me By Sun MicroSystems By Selling
Me An Operating System Which Was Written By University
Students Who Put Comments In The Source Files Which
Made Fun Of People Over '30':
Tim--I paid Deloite & Touche $ 60,000 to do a Quality
Control Analysis on my life, in general, and their report,
which is the equivalent of borrowing my watch to tell me
what time it is, indicates that the posts you have made
to the CypherPunks Disturbed Male LISP since 7 Dec, 1989,
are worth $ .03, so as long as you send me your $ .02 worth,
we can call it even, and I won't have to launch an assault
on Mayonnaise Mountain and put my SPARCard 2 where the
Sun MicroSystems don't shine...
The Bottom Line, Version 9.9, Revision 0.0:
It's my birthday, I'm halfway through a bottle of
Glenfiddich, Cask Strength (51% alcohol) Scotch, which is
produced in Dufftown (Home of 'Duff Beer', Homer Simpson's
drink of choice), Banffshire (Just outside of Calgary, AB),
Scotland (An independent Cirle of Eunuchs/Army of Dog
Republic often referred to as 'The Texas of the British
Empire').
My Dad gave me a birthday call, during which he informed
me that his talks with the RCMP revealed that Canadian
Customs can hold my computers, etc., up to 90 days before
exorcising their option to put their dick up my ass, and
then hold it for the fifty years during which the outcome
of any further court proceedings are decided.
I totally flipped out, screaming all kinds of self-
incriminating utterances which prove conclusively that
I am a danger to the lives and lifes of decent, Dog-
Fearing MeatSpaceIzens everywhere, even though I am
fully aware that my electronic communications are being
monitored by those who will be 'between a rock and a hard
place' when they have to decide whether they should admit
to their illegal, surrupticious surveillance of my life,
since birth, which would prove that my extreme paranoia
validates my 'sanity defense', or to pretend that they
are just a loosely-knit organization of semi-competent
traffic-ticket writers who have no idea what this silly,
paranoid fool is talking about, validating their claim
that I should be committed to an internment camp for the
Delusionally Politically Incorrect, and that the evidence
confirming the reality of the basis of my nonsensical
blatherings should be chalked up to 'mere coincidence'.
For Professional Mathematicians Only:
1. Estimate the number of times I have 'twitched' in
between the time I screamed at my Dad that the RCMP
are not the only ones in possession of firearms.
2. Divide this estimate by the number of times I have
gotten laid since 1992 (Hint: '0').
3. Add the number of times that Toto has forged posts
to the CypherPunks list, using your name.
4. Subtract the number of ASCII-Art spams sent to the
list since July 31, 1999 (Hint: 'The same as answer #2').
5. Multiply by Franklin's Fudge Factor.
6. Plot Pinkerton's Probability Point.
7. Ask yourself, "How many stops did the train make?"
An accurate calculation of the undescribable, inane,
indiscrimate insanities enumerated above, will, if
divided by the value of Pi legislated by Congress,
provide the number of bodies it takes to spell 'Einstein
Was Crazy'.
While this in no way relates to valid CypherPukes issues
such as Craptographics or Piracy, it is essential to the
issue of exactly when this chapter of 'SPACE ALIENS HIDE
MY DRUGS' ceased to follow the pre-ordained path which
the Tao was directing it toward, by way of CensorShip
by the Cosmic Muffin, and became a meaningless diatribe
during which I tried to disguise the fact that I am
jumping up and down, screaming "KILL, KILL, KILL!!!"
and putting my head through the walls of my home in
an increasingly futile attempt to prevent myself from
stepping beyond the boundaries of the social programming
provided by the Secret Government Agents Cleverly
Disguised As Teachers and emptying the clips of several
dozen illegal firearms into the MeatSpace boundaries of
a Post Office, a Luby's Cafeteria, and a Schoolhouse
Full Of 'Innocent Children Who Would Eventually Murder
Their Parents If I Didn't Slaughter Them, Anyway' To
Be Named Later.
The concept of the Army of Dog assumes that the
majority of DogIzens will be sufficiently sane to
direct their rEvolutionary thoughts, feelings and
actions in a direction which will result in the
BioSemiotic Evolution of Humankind moving forward
to an increasingly logical and humanistic future.
If a few MadDogs such as myself have to be put
down by LEA CypherPunks, and a number of Sheeple
need to be Nuked by Timothy C. McCypherPunks, then
it is a small price to pay for ensuring that SpamFord
will be free to compete with Dimitri's ASCII-Art and
Fuck at Yourself.Up's Trojan Horses for the attention of
CypherPunks Disturbed Male LISP Mambo'ers who have
remained subscribed to 'cypherpunks-unedited at toad.com',
in order to document the 'Secret Conspiracy Against
The CypherPunks List' that is being perpetrated by the
Commie Schill, Ignoramus Chewed-Off, the Awe-Stun-Taxes
WebMasturbator, James ChokeTheMonkey, and A Nietzsche
Nazi Racing Across The Tundra In A Snowmobile To Be
Named Later.
When all is said and done, it matters little that
the Violent Armed Thugs who comprise the Dudley DoWrong
Division of the RCMP are incapable of setting up and
railroading an individual who is half as smart as his
dog. What matters is that they can shoot his sorry ass,
move the body to the nearest Reservation, put a skirt
on him, add the body of dead, young Native child with
a tube of glue in his hand, and launch an internal
investigation by their BumBuddies (TM) that will show
them to have followed Proper PoliceMurder Procedure.
Now For The 'BAD' News:
As you have probably guessed, given the obvious
degeneration of this rambling diatribe into an
incoherent 'Rage Against The Machine', I have
finally sunk into such a depraved condition of
violent insanity that any astute judge of the
human condition can easily predict that the next
chapter of 'SAHMD' will tell The Truth, The Whole
Truth, And Nothing But The Truth.
Please read it, anyway...
If you constantly remind yourself that I am a
madman, then you can relegate what I have to reveal
to your subconsious, and continue to chop wood and
carry water without feeling obligated to join me in
an assault on everything that righteous, Dog-Fearing
Netizens hold sacred.
The Retribution is NOW!
From muad at iname.com Thu May 7 02:00:34 1998
From: muad at iname.com (muad at iname.com)
Date: Thu, 7 May 1998 02:00:34 -0700 (PDT)
Subject: password.pwl
Message-ID: <199805070900.FAA04899@web02.globecomm.net>
I have the source code for glide.c the decrypter but i dont know how to run the program.
Therefore i need your help in this.
---------------------------------------------------
Get free personalized email at http://www.iname.com
From ptrei at securitydynamics.com Thu May 7 07:41:06 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Thu, 7 May 1998 07:41:06 -0700 (PDT)
Subject: [OFF TOPIC] Spam
Message-ID: <6B5344C210C7D011835C0000F8012766017A75DD@exna01.securitydynamics.com>
[Trei, Peter] stanSqncrs [SMTP:StanSqncrs at aol.com] wrote:
>Apparently only as far back as 1993, the definition of the
>word "spam" from the on-line jargon file was this (according
>to the New Hackers Dictionary) -
>spam [from the MUD community] vt. To crash a program by
>over-running a fixed- size buffer with excessively large
>input data. See also Buffer Overflow, Overrun Screw, Smash
>the Stack.
>Obviously that definition has changed since then. I've seen
>it go from that to repetitive commercial advertising, and
>I've seen it used to brand someone as an outcast of a list
>for future removal simply because a small minority didn't
>like what that person had said (so it was being used at that
>time to mean 'objectional material').
>And in all the times I've seen the word fly, there has never
>been anykind of volume that would come close to overblowing
>the forum's mechanical capabilities.
>So, I'm curious as to who/what dictated the meaning of that
>to change so drasticly. Write me in private if it's
>off-subject (and yes, you can write me anonomously if you
>don't want a response. :-) )
How quickly they forget...
It's not a change of meaning; rather, it is a new branch off
of an earlier root meaning.
The ultimate root, is of course, Hormel's processed meat
product. I don't know how old that is but it goes back at
least to WW2.
The immediate root lies in a Monty Python sketch of the
early 70's. The text may be found at
http://w3.informatik.gu.se/~dixi/spam.htm (don't miss the
sound clip.) It takes place in a cafe, where almost every
menu item includes Spam. As a waitress reads the menu to
some patrons ("egg and spam; egg bacon and spam; egg bacon
sausage and spam; spam bacon sausage and spam; spam egg spam
spam bacon and spam; spam sausage spam spam bacon spam
tomato and spam..." etc), a group of Vikings at the next
table start to sing:
"Spam Spam Spam Spam Spam Spam Spam Spam"
"Lovely Spam! Wonderful Spam!"
"Lovely Spam! Wonderful Spam!"
(repeat endlessly)
----------------
At certain science fiction conventions in the late 70's and
early 80's it became a tradition for groups of fans (to whom
the Pythons were minor deities) to parade en mass through
the corridors of convention hotels singing the Spam Song.
Many online fen were also active in early MUDs, so the term
came to be used for unwanted, repetitive, voluminous, and
content-free input of all kinds.
------------
Flash forward to April 14, 1994.
The WWW is not on most peoples radar yet; it's still the Age
of Usenet.
Cantor & Siegel, a pair of shysters, figure out that they
can advertise their dubious 'services' (charging $100 for
information which the government gives out for free) at no
cost on usenet. Like many lawyers, they suffer from a
mental disorder which leads them to believe that any action
which is not explicitly against the law is reasonable and
appropriate. They send their ad to over 5000 newsgroups,
regardless of topic.
In those days, many netusers read multiple newsgroups every
morning. That day, every newsgroup you opened included the
same article in the subject list, along with dozens of angry
denouncments of the off-topic post.
*Every* *single* *newsgroup*.
The resemblance to the menu at the Python cafe was
unmistakeable, and 'spam' was the term instantly adopted to
describe the practice.
Since then, the use of the term 'spam' has been expanded to
refer to any sort of off-topic and undesired information
sent over the net, especially when a shotgun approach is
used.
Question: When was the *first* spam type message? I remember
in the early 80's a student spammed Usenet, asking for small
donations to help him meet tuition. Are there any earlier
cases?
Peter Trei
ptrei at securitydynamics.com
From J-Dog at Elitehackers.org Thu May 7 07:42:06 1998
From: J-Dog at Elitehackers.org (J-Dog)
Date: Thu, 7 May 1998 07:42:06 -0700 (PDT)
Subject: password.pwl
In-Reply-To: <199805070900.FAA04899@web02.globecomm.net>
Message-ID:
gcc -o glide glide.c
Latez
JD
On Thu, 7 May 1998 muad at iname.com wrote:
> I have the source code for glide.c the decrypter but i dont know how to run the program.
> Therefore i need your help in this.
>
>
> ---------------------------------------------------
> Get free personalized email at http://www.iname.com
>
From jim at mentat.com Thu May 7 08:01:57 1998
From: jim at mentat.com (Jim Gillogly)
Date: Thu, 7 May 1998 08:01:57 -0700 (PDT)
Subject: Spam
Message-ID: <9805071457.AA20574@mentat.com>
Stan the Sequencer sez:
> Apparently only as far back as 1993, the definition of the word "spam" from
> the on-line jargon file was this (according to the New Hackers Dictionary) -
>
> spam [from the MUD community] vt. To crash a program by over-running a fixed-
> size buffer with excessively large input data. See also Buffer Overflow,
> Overrun Screw, Smash the Stack.
This isn't quite accurate. The term "spamming" in Mudding has always meant
inundating the players with repetitive material, whether intentionally
or accidentally, and has been used in that sense since sometime around
1990 at least. The "overflow" is of user screens, not stacks or
buffers... although of course any high usage like that can test a
program's limits.
I just wrote and snipped a long disquisition on the history of spam starting
with Clarence Thomas IV in 1993, having realized it's probably not relevant to
your interests and old hat to everybody else. Suffice it to say that spam
does require extra resources to process, both in hardware and time. We resent
it because the end user is paying for it rather than the advertiser, so there
is no natural limit to the amount of crap they can pour on us.
Jim Gillogly
From StanSqncrs at aol.com Thu May 7 14:11:10 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Thu, 7 May 1998 14:11:10 -0700 (PDT)
Subject: Spam
Message-ID:
Thanks to Peter Trei for that bit of history.
In a message dated 5/7/98 10:26:48 AM Central Daylight Time, jim at mentat.com
writes:
<< I just wrote and snipped a long disquisition on the history of spam
starting
with Clarence Thomas IV in 1993, having realized it's probably not relevant
to
your interests ... >>
Actually, by the timing you describe, it would probably make it VERY relevant
to my interests. I'd love to see it.
<< and old hat to everybody else. Suffice it to say that spam
does require extra resources to process, both in hardware and time. We
resent
it because the end user is paying for it rather than the advertiser, so there
is no natural limit to the amount of crap they can pour on us. >>
But times have changed again. Now the users have unlimited access.
BTW: As I understand it, the corporations were given free-speech rights with
a bad Supreme Court decision back in the '20's, even though the constitution
only grants rights to "people" and "citizens" (14th amendment)
Stan
From iw at merkur.contexo.de Fri May 8 05:19:49 1998
From: iw at merkur.contexo.de (Ingo Wechsung)
Date: Fri, 8 May 1998 05:19:49 -0700 (PDT)
Subject: My mail address changed
Message-ID: <9805081217.AA03419@merkur.contexo.de>
Your mail address cypherpunks at toad.com was found in one of my mailboxes.
I want to inform you, that the following mail addresses
iw at return-online.de
ingo.wechsung at return-online.de
iw at cas-nord.de
ingo.wechsung at return-online.de
will be invalid from July 1st, 1998 on.
Please use one of the following addresses from now on:
iw at contexo.de
ingo.wechsung at contexo.de
Kind Regards
Ingo Wechsung
From billp at nmol.com Fri May 8 07:51:21 1998
From: billp at nmol.com (bill payne)
Date: Fri, 8 May 1998 07:51:21 -0700 (PDT)
Subject: http://www.jya.com/whp043098.htm
Message-ID: <35530212.62B0@nmol.com>
Friday 5/8/98 6:25 AM
John Young
J Orlin Grabbe
Sobolewski phoned last night.
Sobolewski gave me his opinion.
1 Campos is going to hold in camera ex parte conference with NSA
2 Campos will then award summary judgment to NSA.
I told Sobolewski that most of the legal citations in Campos� document
were not contained in the pleadings.
Sobolewski EXCLAIMED, �Oh.�
Sobolewski is particularly good at law. Sobolewski�s father was a
lawyer and judge both in Poland and Australia.
Sobolewski prevailed in an lawsuit spanning the US and Australia - but
it still cost him more than $20k TELLING a lawyer what to do.
Sobowleski usually beats speeding tickets.
Sobolewski uses DISCOVERY to obtain maintenance and calibration
records of police radar. And also radar operation training records of
the officer who stopped him.
The MEMORANDUM OPINION AND ORDER authored by some government
lawyers and signed by Campos is clearly a candidate for one of the
STUPIDEST and INCOMPETENT legal documents ever written.
http://www.jya.com/whp043098.htm
Morales and I LOVE IT, of course!
This is why we were so happy last Friday. We got another shot at THEM
[aka The Great Satan].
Morales is taking the day off from Sandia today.
We will finish and file our motion. Then BLAST it out on the Infobahn.
I see other good legal advice linked at http://www.aci.net/kalliste/
http://www.phrack.com/52/P52-05
Later
bill
From billp at nmol.com Fri May 8 12:01:06 1998
From: billp at nmol.com (bill payne)
Date: Fri, 8 May 1998 12:01:06 -0700 (PDT)
Subject: FILED 98 MAY - 8 AM 11:31
Message-ID: <3553504B.6AA9@nmol.com>
John Young
File-stamped copy was mailed to you at US Courthouse.
Later
bill
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEW MEXICO
William H. Payne )
Arthur R. Morales )
)
Plaintiffs, )
)
v ) CIV NO 97 0266
) SC/DJS
)
Lieutenant General Kenneth A. Minihan, USAF )
Director, National Security Agency )
National Security Agency )
)
Defendant )
PLAINTIFFS' MOTION TO AMEND Santiago E. Campos MEMORANDUM
OPINION AND ORDER FILED 98 APR 30 AM 11:45
1 COMES NOW plaintiffs Payne and Morales [Plaintiffs] to exercise their rights under the Federal
Rules of Civil Procedure, Rule 52. Findings by the Court; Judgment on Partial Findings
(b) Amendment. On a party's motion filed no later than 10 days after
entry of judgment, the court may amend its findings--or make additional
findings--and may amend the judgment accordingly. ...
2 Plaintiffs will show that the Court's [Campos] MEMORANDUM OPINION AND ORDER
http://www.jya.com/whp043098.htm contains presumably-unintentional false statements or misleading
statements of essential material facts.
Plaintiffs move to permit Campos to amend ORDER to reflect proper remedy of obvious evidence
of lack of impartiality and judicial misconduct.
A judge is supposed to judge arguments presented by the Plaintiffs and the Defendant.
An judge is NOT SUPPOSED to engage in legal research designed to support either Plaintiff or
Defendant's case.
Judge Campos was supposed to rely on legal citations presented ONLY by pro se Plaintiffs or
NSA Defendant Minihan's lawyer, Assistant US Attorney Jan Elizabeth Mitchell [Mitchell].
MEMORANDUM OPINION AND ORDER contains OVER ABOUT 144 legal citations most of
which WERE NOT PRESENTED TO THE COURT in pleadings by either Plaintiffs or Defendant.
3 Campos writes
Plaintiffs contend that Federal Civil Procedure Rule 36 explicitly provides that discovery is
allowed without leave of the court. Plaintiffs quote citation The Court is unsure where
Plaintiffs found the language they quote, but it is incorrect.
Federal Civil Judicial Procedure and Rules, WEST PUBLISHING COMPANY, 1991 Revised
Edition, page 110 states,
Rule 36. Requests for Admission
Request for admission (a) A party may serve upon any other
party a written request for the admission, for the purposes of
the pending action only, of the truth of any matters within the
scope of Rule 26(b) set forth the request that relate to statements
or opinions of fact or of the application of law to fact including
the genuineness of any documents described in the request.
Copies of documents shall be served with the request unless
they have been or otherwise furnished or made available for
inspection and copying. The request may WITHOUT LEAVE
OF THE COURT, be served upon the plaintiff after
commencement of the action and upon any other party with
or after service of the summons and complaint upon that
party. ...
Updated Rule 36 seen at http://www.law.cornell.edu/rules/frcp/overview.htm,
click at 36. Requests for Admission states
A party may serve upon any other party a written request for the admission, for purposes of the
pending action only, of the truth of any matters within the scope of Rule 26(b)(1) set forth in the
request that relate to statements or opinions of fact or of the application of law to fact, including the
genuineness of any documents described in the request. Copies of documents shall be served with
the request unless they have been or are otherwise furnished or made available for inspection and
copying. Without leave of court or written stipulation, requests for admission may not be served
before the time specified in Rule 26(d) .
Rule 26(d) states
(d) Timing and Sequence of Discovery.
Except when authorized under these rules or by local rule, order, or agreement of the parties, a party
may not seek discovery from any source before the parties have met and conferred as required by
subdivision (f). Unless the court upon motion, for the convenience of parties and witnesses and in the
interests of justice, orders otherwise, methods of discovery may be used in any sequence, and the fact
that a party is conducting discovery, whether by deposition or otherwise, shall not operate to delay
any other party's discovery.
Essential material facts are
1 5/23/97 Docket Sheet entry 9 Plaintiffs file MOTION by plaintiff for order to accept discovery
plan (dmw)
2 Defiant misses filing date for response to entry 9.
3 Plaintiffs' file on 6/9/97 Docket Sheet entry 13 MOTION by plaintiff to
accept discovery plan of plaintiffs as an unopposed motion before the court (dwm)
4 In panic Defendant's lawyer US Mitchell submits on 6/9/97 Docket Sheet entry 14,
RESPONSE by defendant to motion to accept discovery plan of plaintiffs as an
unopposed motion before the Court [13-1] (dwm) [Entry date 06/10/97]
Lawyer Mitchell, apparently realizing her legal procedural blunder, is
forced to deposit her LATE MOTION in Court outside mailbox since entry was
not stamped FILED until June 10.
The "time specified in Rule 26(d)" was satisfied, therefore Plaintiffs were with
the law for proceeding with discovery.
4 Campos cites in
B. Standing of Plaintiff Morales ... see also NLRB v. Sears. Roebuck & Co., 421 U.S. 132, 144 n.
10 ( 1975).
Plaintiffs can find no reference to NLRB v. Sears. Roebuck & Co in Mitchell's pleadings
Therefore Campos reaches conclusion that Morales should be removed partially on obviously biased
citations of Campos own legal research.
5 Campos writes in
C. Proper Defendant
Campos cites the following legal citations to justify dismissing defendant Minihan
1 Thompson v. Walbran, 990 F.2d 403, 405 (8thCir. 1993) (per curiam);
2 Petrus v. Bowen, 833 F.2d 581, 582-83 (5th Cir.1987);
3 Sherwood Van Lines, Inc. v. United States Department of the Navy,732 F. Supp. 240, 241 (D.D.C.
1990);
4 Gary Energy Corp. v. United StatesDepartment of Energy, 89 F.R.D. 675, 675-77 (D. Colo. 1981).
5 But see, e.g Diamond v. FBI, 532 F. Supp. 216, 21920 (S.D.N.Y. 1981), aff'd on other
grounds, 707 F.2d 75 (2d Cir. 1983);
6 Hamlin v. Kelley, 433 F. Supp. 180,181 (N.D. Ill. 1977).
7 Parks v. IRS, 618 F.2d 677 684 (10th Cir. 1980)
Plaintiffs can find NONE of the above legal citations in ANY pleadings before the Court.
Therefore, Plaintiffs conclude that Campos is obviously biased and has improperly introduced legal
citations in an attempt to have Minihan dismissed.
6 Campos cites in
III. FOIA
A. FOIA Policy
1 NLRB v, Robbins Tire & Rubber Co., 437 U.S. 214, 242 (1978).
2 Anderson v. Department of Health and Human Services,907 F.2d 936, 941 (10th Cir. 1990)
3 Maricopa Audubon Society v. United States Forest Service, 923 F. Supp. 1436, 1438-39
(D.N.M. 1995)
4 Maricopa Audubon Society v. United States Forest Service, 923 F. Supp. 1436, 1438-39
(D.N.M. 1995)
5 Hale v. United States Department of Justice, 973 F.2d894, 897 (10th Cir. 1992)
6 (citing EPA v. Mink, 410 U.S. 73, 79-80 (1973), vacated on other grounds, 509 U.S. 918 (1993));
7 Office of Information and Privacy, U.S. Department of Justice, Freedom of Information
Act Guide & Privacy Act Overview 3 (Sept. 1997 ed.)
8 S. Rep. No. 813, 89th Cong., 1st Sess. 10 (1965),
9 United States Department of Justice v. Reporters Commission for Freedom of the Press, 489 U.S.
749, 773 (1989);see id. at 774
10 Air Force v. Rose, 425 U.S. 352, 360-61(1976);
11 Anderson v. Department of Health and Human Services, 907 F.2d 936,941 (10th Cir. 1990);
12 Johnson v. United States Department of Justice, 739F.2d 1514, 1516 (10th Cir. 1984)
13 Hale v. United States Department of Justice, 2 F.3d 1053, 1057 (10th Cir. 1993);
14 Cal-Almond, Inc. v. United States Department of Agriculture, 960 F.2d 105, 107 (9th Cir. 1992).
15 Bowen v.United States Food and Drug Administration, 925 F.2d 1225, 1226 (9th Cir. 1991) .
16 King v. Department of Justice, 830 F.2d 210, 217 (D.C. Cir.1987).
17 Vaughn v. Rosen, 484 F.2d 820 (D.C.Cir. 1973);
18 Weiner v. FBI, 943 F.2d 972, 977 (9th Cir. 1991).
19 Halperin v. CIA, 629 F.2d 144, 14849 (D.C. Cir. 1980);
Plaintiffs can find NONE of the above citation of law in pleadings before this Court
Campos is obviously biased for including above 18 citations.
Campos cites internet addresses
1 < http://www.usdoj.gov/oip/oip.html >
2 < http://www.usdoj.gov/oip/oip.html >
3 < http://www.usdoj.gov/oip/oip.html >
4 < http://www.usdoj.gov/oip/oip.html>
5 < http://www.usdoj.gov/oip/oip.html>
6
Mitchell cites no Internet address in her pleadings.
Above Internet address citations are not those given by Plaintiffs.
Therefore, Campos introduces material not in pleadings before this court in his
MEMORANDUM OPINION AND ORDER.
7 Campos cites in
B. Exhaustion of Administrative Remedies
1 Taylor v. United States Treasury Department, 127 F.3d 470,475 (5th Cir. 1997)
2 Taylor v. Appleton, 30 F.3d 1365, 1367 n.3 (11th Cir. 1994)
3 Volvo GM Heavy Truck Corp. v. United States Department of Labor, 118 F.3d 205,
08-09 (4th Cir. 1997)
4 Trenerry v. Internal Revenue Service, No. 95-5150, 70 F.3d 598, 1996 WL 88459 at *1 (10th Cir.
March 1, 1996)
5 Lanter v. Department of Justice, No. 93-6308, 19 F.3d 33, 1994 WL 75876 at *1 (10th Cir. March
8, 1994)
6 Hass v. United States Air Force, 848 F. Supp. 926, 929 (D. Kan. 1994)
7 Katzman v. CIA, 903 F. Supp.434, 437 (E.D. N.Y. 1995) (citing Becker v. Internal Revenue
Service, 34 F.3d 398, 405 (7th Cir. 1994)).
8 Ruotolo v. Department of Justice, 53 F.3d 4, 8 (2d Cir. 1995);
9 Spannaus v. United States Department of Justice, 824 F.2d 52, 59 (D.C. Cir 1987);
10 Kuchta v. Harris, No. 92-1121, 1993 WL 87705 at *3 (D.Md. March 25, 1993)
11 Trueblood v. United States Department of Treasury, 943 F. Supp. 64, 66-67 (D.D.C. 1996);
Plaintiffs could NOT find ANY of the above legal citations in pleadings before this Court.
Campos gives biased opinion on exhaustion of administrative remedies.
8 Campos cites in
C. Summary Judgment
1 Haines v. Kerner, 404 U.S. 519, 520 (1972) (per curiam).
2 Shabazz v. Askins, 14 F.3d 533, 535 (10th Cir. 1994).
3 Green v.Dorrell, 969 F.2d 915, 917 (10th Cir. 1992).
4 Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 249, 255 (1986).
5 Magnum Foods, Inc. v. Continental Casualty Co., 36 F.3d 1491, 1497 (10th Cir. 1994).
6 World of Sleep. Inc. v. La-Z-Boy Chair Co., 756 F.2d 1467, 1474 (10th Cir. 1985)
7 Celotex Corp. v. Catrett. 477 U.S. 317, 325 (1986).
8 Bacchus Industries. Inc. v. Arvin Industries. Inc., 939 F.2d 887,891 (10th Cir. 1991).
Plaintiffs can find none of the above citation in pleadings before this Court.
9 Campos cites in
3. Plaintiff's First Summary Judgment Motion
1 Powell v. McCormack, 395 U.S. 486, 496 (1969)
2 Phillippi v. CIA, 546 F.2d 1009, 1013 (D.C. Cir. 1976).
3 Patterson v. FBI, 705 F. Supp. 1033, 1039 (D.N.J. 1989), aff'd 898 F.2d 595 (3d Cir. 1990).
4 American Friends Service Committee v. Department of Defense, 831 F.2d 441, 444 (3d
Cir. 1987)
5 Salisbury v. United States, 690 F.2d 996, 970 (D.C. Cir. 1982)
6 Sen. Report No. 1200, 93rd Cong. 12 (1974), U.S. Code Cong. & Admin. News 6267, 6290
(1974)).
7 AG's 1993 FOIA Memorandum
8 Afshar v. Department of State, 702 F.2d 1125, 1130 (D.C. Cir. 1983).
9 Pfeiffer v. CIA, 721 F. Supp. 337, 342 (D.D.C. 1989)
10 Public Citizen v. Department State, 11 F.3d 198, 204 (D.C. Cir. 1993).
11 Fitzgibbon v. CIA, 911 F.2d 755, 766 (D.C. Cir. 1990)
12 Military Audit Project v. Casey, 656 F.2d 724, 74345 (D.C. Cir 1981)
13 Phillippi v. CIA, 655 F.2d 1325, 1332-33 (D.C. Cir. 1981)
14 McNamera v. United States Department of Justice, 974 F. Supp. 946, 955-56 (W.D. Tex. 1997).
15 Halperin v. CIA, 629 F.2d 144, 14849 (D.C. Cir. 1980),
16 United States Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S.
749, 773 (1989);
17 King v. United States Department of Justice, 830 F.2d 210, 224 (D.C. Cir. 1987);
18 Fitzgibbon v. CIA, 578 F. Supp. 704, 709 (D.D.C. 1983).
19 Katzman v. CIA, 903 F. Supp. 434, 438 (E.D.N.Y. 1995).
20 McDonnell v. United States, 4 F.3d 1227, 1246 (3d Cir. 1993) (citing Association of
Retired Railroad Workers v. United States Railroad Retirement Board, 830 F.2d 331, 336 (D.C.
Cir. 1987)).
21 United States Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S.
749, 775 (1989).
22 Founding Church of Scientology v. NSA, 610 F.2d 824, 30, 833 & n. 80 (D.C. Cir. 1979).
23 EPA v. Mink, 410 U.S. 73, 80 (1973);
24 NLRB v. Robbins Tire & Rubber Co., 437 U.S. 214, 242 (1978).
Plaintiffs cannot find any of the above 24 citation in pleadings before this Court.
9 Campos writes
Consequently, the Court requests that Defendant provide it, as it has
offered to do, an in camera ex parte declaration or detailed affidavit
explaining its reasons for its "Glomar response" and for nondisclosure of
none of the Iranian and Libyan messages and translations from June 1, 1980
to June 10,1996, if they do exist. See Anderson v. Department of Health and
Human Services, 907 F.2d 936, 942. (10th Cir. 1990).24 The declaration of
affidavit must be provided by the Defendant to the Court within sixty days of the
date of this opinion. The Court will stay its decision on Defendant's Motion for
Summary Judgment (Exemption 3) until after it has heard or examined Defendant's
explanation.
and quotes
24 As the Tenth Circuit has explained:
In order to fulfill its obligation to review de novo the agency's decision not to disclose materials
sought under the FOIA, a district court has a variety of options. "The FOIA allows the district court
flexibility in utilizing in camera review of the disputed documents, indexing, oral testimony, detailed
affidavits, or alternative procedures to determine whether a sufficient factual basis exists for
evaluating the correctness of the [agency] determination in each case." [If a Vaughn index or an
affidavit is insufficient,] then the district court must utilize other procedures in order to develop an
adequate factual basis for review of the agency action.
Anderson v. Department of Health and Human Services, 907 F.2d 936, 942
(10th Cir. 1990) (quoting DeSalvo v. Internal Revenue Service, 861 F.2d
1217, 1222 n.6 (10th Cir. 1988) (first alteration in Anderson)).
Plaintiffs cannot find reference to
1 Anderson v. Department of Health and Human Services, 907 F.2d 936, 942 (10th Cir. 1990)
2 DeSalvo v. Internal Revenue Service, 861 F.2d 1217, 1222 n.6 (10th Cir. 1988)
in pleadings before this Court.
WHEREFORE Plaintiffs move for Campos to amend MEMORANDUM OPINION AND ORDER
which currently reads
10 NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the
Court to be the NSA, and not Lt. Gen. Kenneth A. Minihan. Future captions
for this case should reflect this change.
IT IS FURTHER ORDERED that Plaintiff's Motion for Summary Judgment is
DENIED without prejudice.
IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales
is GRANTED.
IT IS FURTHER ORDERED that, in regard to Defendant's Motion for Partial
Dismissal and for Summary Judgment, Defendant's Motion for Partial
Dismissal is DENIED and Defendant's Motion for Summary Judgment is STAYED
pending an in camera ex parte declaration consistent herewith provided by Defendant to
the Court within sixty (60) days of the date of this opinion.
IT IS FURTHER ORDERED that Plaintiff's Motion for Summary Judgment Based on
Evidence from Admissions is DENIED as MOOT.
to read
11 Santiago Campos disqualifies himself under
28 USC � 455. Disqualification of justice, judge, or magistrate
(a) Any justice, judge, or magistrate of the United States shall
disqualify himself in any proceeding in which his impartiality
might reasonably be questioned. ...
from further participation in case CIV NO 97 0266, UNITED STATES DISTRICT COURT FOR
THE DISTRICT OF NEW MEXICO for basing much of MEMORANDUM OPINION AND
ORDER FILED 98 APR 30 AM 11:45 on materials not contained in pleadings before the Court and
vacates ORDER FILED 98 APR 30 AM 11:45.
Respectfully submitted,
William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
Arthur R. Morales
1024 Los Arboles NW
Albuquerque, NM 87107
Pro se litigants
CERTIFICATE OF SERVICE
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF,
Director, National Security Agency, National Security Agency,
9800 Savage Road, Fort George G. Meade, MD 20755-6000
and hand delivered to Jan E Mitchell, Assistant US Attorney,
525 Silver SW, ABQ, NM 87102 this Friday May 8, 1998.
9
From ptrei at securitydynamics.com Fri May 8 12:03:43 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Fri, 8 May 1998 12:03:43 -0700 (PDT)
Subject: DoD orders vendors to use Key "Recovery"
Message-ID: <6B5344C210C7D011835C0000F8012766017A75E6@exna01.securitydynamics.com>
I hope someone sends them the NSA report on the security hazards of
KR.
Peter Trei
ptrei at securitydynamics.com
---------------
http://www.gcn.com/gcn/1998/May4/cov1.htm
GCN May 4, 1998
Defense wants PKI now
Department intends to make vendors use strong encryption
By Christopher J. Dorobek
To jump-start development of a public-key recovery system, the Defense
Department plans to require its vendors to use strong encryption,
deputy Defense secretary John Hamre said recently.
Because it wields significant buying clout, Defense's more stringent
requirements should boost government and industry efforts to build
systems for managing encryption keys, Hamre said last month at an
Armed Forces Communications and Electronics Association event in
Washington.
Agencies cannot wait for the government and industry to settle on a
national encryption policy, Hamre said.
Through successive administrations, the government has tried to
develop a singular policy on encryption. But so far, the efforts have
failed. Generally, industry has criticized the government's policy
proposals as too restrictive.
"We have an important national imperative to protect ourselves in this
world," Hamre said. "We can't wait to have this issue resolved ...
therefore we're going to buy encryption with key recovery."
Vendors will have to use encrypted data and be able to recover it when
doing business with DOD, he said.
Defense will work out a final policy in the coming weeks, Hamre said.
[...]
From sunder at brainlink.com Fri May 8 14:07:47 1998
From: sunder at brainlink.com (Sunder)
Date: Fri, 8 May 1998 14:07:47 -0700 (PDT)
Subject: [Fwd: 3Com switches - undocumented access level.]
Message-ID: <355372B4.C837F915@brainlink.com>
--
To: BUGTRAQ at NETSPACE.ORG
Subject: Re: 3Com switches - undocumented access level.
From: Toh Chang Ying
Date: Fri, 8 May 1998 18:42:47 +0800
Approved-By: aleph1 at NATIONWIDE.NET
Organization: HICOM Teleservices
Reply-To: "cytoh at plexus.net"
Sender: Bugtraq List
The sender was deleted to prevent flames. Don't flame me either. I'm just a poor 3Com user.
-----Original Message-----
From:
Sent: Friday, May 08, 1998 3:32 PM
Subject: Re: FW: 3Com switches - undocumented access level.
Toh,
Thank you for bringing this up for our attention. First of all, let me
assure you that the undocumented access level for the LANplex/Corebuilder
products are purely for support reasons then anything else. We have many
cases where customers will forget their passwords or userids and find
themselves in a spot as they could not get in to the console. This is the
only way we can help them to recover from this situation without losing
their entire configuration. As far as I know, many vendors also have some
kind of special access methods to assist their customer under such
circumstances.These special access methods are for 3 Com support persons
only and are revealed to customers under very special circumstances.
Because the CoreBuilders/LanPlex are typically deployed at the core of a
network, the config for these equipment is typically complex and very
important to the customers. As such, these method can safe the customer a
lot of time and inconvenience by recovering their proper access to the
equipment. If we have to set these equipment to factory default every time
a customer lose his/her password, we will be in a lot of trouble.
As for the stackables, I believe we do not have this access method. That's
because these equipment is plug n play and do not have many parameters to
reconfigure. In the event, a customer loses his/her password, we can just
set everything back to factory default.
Regards,
********** http://www.plexus.net/ ***********
Toh Chang Ying, MCP, Network Operation Centre
HICOM Teleservices Sdn Bhd (323218-A)
Suite 3.5, Wisma HICOM, 2 Jln Usahawan U1/8
40150 Shah Alam, Malaysia
Email: cytoh at plexus.net
From jya at pipeline.com Fri May 8 16:44:57 1998
From: jya at pipeline.com (John Young)
Date: Fri, 8 May 1998 16:44:57 -0700 (PDT)
Subject: HPC Report
Message-ID: <199805082344.TAA21658@camel7.mindspring.com>
Commerce and Defense released Monday a study of
high performance computers, national security and export
controls which we have transcribed:
http://jya.com/hpc/hpc.htm (Contents, execsumm and Chap 1)
The 221-page report provides a detailed survey of HPC
applications for national security work with recommendations
for export controls in the light of advances in distributed
and parallel applications. There's are thumbnails of 200
projects with indexes of power -- with a glance at crypto
futures.
For brute power the ASCI Red ++ appears to be the
leader -- and off the chart of customary measurement.
The full report is 1.6MB, and a zipped version is available:
http://jya.com/hpc/hpc.zip (1.0MB)
-----
Here's the report's press release:
U. S. Department of Commerce Bureau of Export Administration
May 4, 1998
Advances in Computer Technology Make Export Controls More Difficult
Washington, D.C. -- Commerce Assistant Secretary Roger Majak and Dave
Tarbell, director of the Defense Technology Security Administration
at the Defense Department announced the release of a long-awaited study,
"High-performance Computing, National Security Applications, and Export
Control Policy at the Close of the 20th Century," by Dr. Seymour E.
Goodman, Dr. Peter Wolcott and Dr. Patrick Homer.
The study has been prepared as part of President Clinton's decision in
1993 to periodically assess U.S. computer export controls. Today's study
provides an important contribution to the government's understanding of
technology trends in the computer industry and national security uses for
high performance computers.
The study finds that technology is evolving at an astounding rate in the
HPC industry, rapidly increasing the performance of computers at all levels.
Key findings include: 1) advancements in microprocessor performance which
have brought down the costs of HPCs and reduced their size; 2) improvements
in interconnect devices which have permitted a greater range of products to
enter the market and helped to make high-performance power more accessible
and affordable; 3) more open system architectures that contribute to enhanced
calability; and 4) the ability to network the computing power of smaller
systems to find solutions to large computational problems.
All of these advancements create challenges for export controls on HPCs. In
particular, there is growing availability of ever more powerful computers in
the world marketplace. The market for HPCs is flourishing worldwide with many
new and used systems for sale through mail order and third party distribution
systems. The study points out that determining what computing levels can be
controlled depends on factors such as dependence on vendor support, the
growing diversity of computer architectures and the scalability of computer
systems.
An earlier study published by Dr. Goodman and his associates issued in 1995
predicted that computers with speeds of over 2,000 MTOPS would be widely
vailable in commercial markets by 1997. Those predictions have proved
correct.
This new study will be an important reference point for the Administration's
continuing review of computer controls.
From toto at sk.sympatico.ca Fri May 8 17:24:23 1998
From: toto at sk.sympatico.ca (Toto)
Date: Fri, 8 May 1998 17:24:23 -0700 (PDT)
Subject: Dialogue - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <3553A2E3.2E06@sk.sympatico.ca>
Dialogue - SPACE ALIENS HIDE MY DRUGS!!!
_______________________________________
WAS: BASIC TRUTHS!
Everyone Has A Photographic Memory...Some Don't Have Film:
I've got film...
Pretty Harry, a MarijuanIzen of Garberville, Humbolt County,
California, was a man who paid close attention to the vagarities of life
that comprised his MeatSpace environment.
I was sitting with him in 'The Cellar', a local bar, one night, when
an effeminate young gentleman from the BigCity came in, sat at a table
in the middle of the bar, and ordered a drink. Every RedNeck in the bar
cast derisive looks in the young gentleman's direction
in order to impress upon him that they could do one-armed push-ups, were
sexually excited only by women, and didn't cotton to young gentlemen
with full, red lips drinking in 'their' bar, in 'their' town...
Pretty Harry gave everyone time to get in a threatening scowl, or two,
and then go back to minding their own business, forgetting about the
effeminate young gentleman, and he then proceeded to walk over, grab the
youth by the hair, tilt back his head, and proceed to give him a wet,
sloppy kiss, with plenty of 'tongue'.
Since Pretty Harry was an established member of the local social
scene, those who observed the event merely barfed into their beers and
continued whatever they were doing at the time, pretending that they
hadn't really seen what they had really seen.
This event confirmed what I had already suspected...Pretty Harry was a
cool dude.
Pretty Harry sat and talked with me for about twenty minutes, just
long enough for those present to bury the memory of what had occurred,
and then proceeded to walk over to the young gentleman's table and
repeat the action which was so delightfully delicious to the effeminate
young man from the BigCity, and so disgustingly depraved to the Local
Yokels who could do one-armed push-ups, and were sexually excited only
by women.
This is when I realized that Pretty Harry was WayCool (TM)...
My point is this...
Pretty Harry, having proven his deep understanding of the Tao of Life,
given his ability to throw a Serious Fuck (TM) into the normal
progression of MeatSpace Reality, was astute enough to tell me, "I've
noticed that when you come into the bars in town, you sit quietly in the
corner, and watch what is going on around you. You know more about 'us'
than 'we' do..."
There's the Watchers...there's those Watching the Watchers...there's
those Watching
the Watchers Watching the Watchers...
A Day Without Sunshine Is Like...Night:
One thing that you will notice if you have the retained the ability to
'watch' what is happening around you in your MeatSpace environment, is
that, no matter how comforting the platitudes and 'wise sayings' that
society-at-large attempts to program into your subconsious, A Day
Without Freedom Is Like...Slavery.
If you do not understand what I am attempting to explain by the above,
then it must be because I am a drug-dealing, terrorist pedophile.
Diplomacy Is Saying "Nice Doggy!"...Until You Find A Rock:
At the end of a song titled, "I've Been Up So Long, I Can't Get Down,"
on C.J. Parker's "Please! Stop Me Before I Sing Again" album, the
extremely paraniod singer-songwriter says, "When you can't see THEM, you
know THEY're being sly..."
Since the confiscation of my computers, I have not seen a single,
solitary police car during any of my trips to town. Today, however,
after threatening the lives of every police officer upon the face of the
earth during a conversation with my father over my 'telleveryonephone',
I drove to town and could go nowhere without seeing
armed police officers glaring at me from the safety of their officially
marked vehicles.
The dumb bastards haven't figured out that if they want to shut me up,
they're going to have to use 'the rock'.
Change Is Inevitable...Except From A Vending Machine:
When Micro$not was the only game in town, calling their customer
support numbers resulted only in a recorded message saying, "When is the
last time a vending machine gave you back your money when you banged on
it? Fuck Off!"
Once Pepsi has signed an exclusive contract with your local
high-school, your children will be subject to felony criminal charges if
they bang on a vending machine that has stolen their money.
Back Up My Hard Drive? How Do I Put It In Reverse?:
"Never look back...something might be gaining on you."
~ That Nigger Who Could Strike Out Batters While Pitching From Second
Base
Satchel Paige! That's his name...
He could strike me out in the batter's box at Yankee Stadium while
pitching from second base at CommuninSki Park.
I have grown used to losing the MeatSpace records of my life, loves
and perceptive realities every time that I get mugged by desperate
criminals or by self-righteous law enforcement agents enforcing what
they imagine to be the laws that Hitler would put in place if he hadn't
had to flee to the AdamAntArctic in order to have his body frozen until
such time that the Nazi scientists welcomed with open arms by the CIA
after World War II could perfect the CryptOgenics technologies that have
their roots in the SuperMan Not Wearing Tights theologies of Nazi
Germany.
I don't look back...
When Canadian Customs and the RCMP steal the digital record of my
life, loves and perceptive realities, I look 'forward' to their
funerals, in the Time-Space Continuum in which SPACE ALIENS HIDE MY
DRUGS so that the murderous slaughter of everyone who has ever crossed
my path can be justified as a valid Weight Loss Program which allows one
to eat anything they want, as long as they burn off the calories in a
murderous frenzy.
I Just Got Lost In Thought...It Was Unfamiliar Territory:
...uuhhh......never mind...
Seen It All, Done It All...Can't Remeber Most Of It:
Space Aliens Hide My Drugs!
Those Who Live By The Sword Get Shot By Those Who Don't::
Grass-roots activism and $ .50 will get you a cup of coffee in a
greasy spoon.
Canadians who peacefully protest against murderous dictators coming to
Canada to participate in an Economic Summit will learn that "Money Rubs
Pepper Spray In Your Eyes And Bullshit Rules!" [WAS: "Money Talks And
Bullshit Walks!"]
I Feel Like I'm Diagonally Parked In A Parallel Universe:
I bet if I used a truck-bomb to destroy an enclave of grunt-workers
involved in the murder of men, women and children who hold uncoventional
religious views, I would be called a monster for individually emulating
the actions of the collective.
You Have A Right To Remain Silent! Anything You Say Will Be Misquoted,
And Then Used Against You:
The proper quotation of your statements will be released to the
public after having been sealed under the guise of National Security for
50 years, at which time it will have little chance of counterbalancing a
half a century of FUD programming the masses to believe that [Your Name
Here] acted alone, using a Magic Bullet that officially refutes the laws
of Newtonian Physics, but which is unlikely to result in your being
awarded a Nobel Prize.
Nothing Is Foolproof To A Sufficiently Talented Fool:
This Basic Truth (TM) is the foundation to all amendments to the US
Constitution, all interpretations of the Holy Word of [Your (G)(g)od's
Name Here], decisions made by a hand-picked jury of the judge and the
prosecutor's peers, and really good bar-pick-up lines delivered while
rubbing one's private parts and drooling.
All My Lies Are True...And Everything I Do, I Really Am:
"Ask not who your country can Nuke for you...ask who you can Nuke for
your country."
~ Timothy C. McKennedy, President of Samsonite Peripherals, Inc.
While the Mayonnaise Mountain Man keeps himself busy attempting to
limit the ultimate effect of the digital emissions he fires toward the
InterNet--which ricochet into the minds of innocent bystanders--by
ranting against the ludicrousness of engaging in 'Magical Thinking',
some of those taking a direct hit to the head by his XXX Magnum
Diatribes Against Established Lunacy manage to catch the HeavyLoad
BulletIns with their teeth, and spit them out in a parallel dimension
where a lighter atmosphere allows the citizens to wear lighter loafers
with crystals where the pennies should be, and propel the conceptual
spirit of the electronic missives of An Aider And Abettor Of A Terrorist
Nuclear Strike To Be Named Later through electronic goalposts which are
far-distant from MileHigh Electronic Stadium.
Thus it is that Circle of Eunuchs Initiates, FrostBack Division, can
use a John Candy movie to implant in the minds of the Sheeple the
subliminal suggestion that they can take a personal hand in writing the
history of Biosemiotic Evolution within the boundaries of the segment of
the Time-Space Continuum they inhabit, and get to fuck the living shit
out of Gena Davis.
Thus it is that Circle of Eunuchs Initiate, Army of Dog Gorrilla, Son
of MicroGomez can confidently proclaim Peter Jennings to be a Circle of
Eunuchs Initiate, FrostBack Division, and not be in the least surprised
when 'Epilogue 7.3 Rev. 1.7' of 'SPACE ALIENS HIDE MY DRUGS' rails
mightily against the hypocritical ludicrousness of those sworn to
'Protect and Serve' the citizenry responding to the actions of a single
dangerous driver by adding a dozen LEA dangerous drivers to the
equation, and less than a week later Peter Jennings, made manifest as a
Circle of Eunuchs Initiate by the simple act of declaring it to be so,
slams an exclaimation mark down to provide an addendum to 'Epilogue 7.3
Rev. 1.7' by inserting a piece into 'Word News Tonight' which pointed
out that:
~ One-third of those who die in high-speed police chases are 'innocent
bystanders'.
~ 1,000 people a year die in high-speed police chases in California.
~ 5,300 people died last year in high-speed police chases in America.
~ State laws make it virtually impossible to sue LEAs in order to force
them to face the consequences of their decisions and actions in the
same
manner that is required of other citizens in 'criminal' as well as
in 'civil'
court.
The Truth, The Whole Truth, And Nothing But The Truth:
During the WaterGate debacle, I was listening to a Saskatoon radio
station on which a 'political expert' from Washington, DC, give his
opinion of the moral and legal issues surrounding the affair and the
role which President Nixon played in it. During the call-in
question/opinion period, I phoned the radio station and proffered the
opinion that, "If Nixon knew about the affair, then he is a criminal,
and if he *didn't* know about the affair, then he is incompetent, given
the fact that the crimes were committed by those in power as a direct
result of his administrative decisions and choices."
A few days later I was listening to a mainstream media news broadcast
in which the news anchor announced that the 'current view' of
'Washington insiders' was that Nixon was either incompetent, or a
criminal. The wording made it plain that the 'current view' of
'Washington insiders' was the direct result of an inastute political
neophyte from ButtFuck, NoWhere, inadvertantly stumbling upon a Basic
Truth (TM) which was relevant to the situation--namely, "The Buck Stops
Here!"
Not..."The Devil made me do it!"
Not..."I was betrayed/tricked by those I trusted!"
Not..."It was the result of the Messages From Mars that I received
through
the fillings in my teeth..."
"The Buck Stops Here!"
I knew that, you knew that, and everyone ensconced in the Halls of
Power who were involved in putting a particular politically-motivated
spin on the WaterGate affair knew that. Nobody holding a well-paying
job, with medical and dental benefits, wanted to rock the boat and risk
changing 'the way things are'. Nobody satisfied with the level of
welfare benefits they were receiving wanted to rock the boat and risk
changing 'the way things are'. There were few who refrained from
recognizing and stating the obvious out of ignorance--most of us/them
did so as a result of being 'bought off' by our current position in life
nudging us toward accepting THE LIE in order not to put our established
and manageable world-view at risk of tumbling down around us as the
result of a violent assault by THE TRUTH.
The comfort and safety of a world-view paridigm which was willing to
accept mutually agreed-upon lies, in order to prevent the boat being
rocked and subject to swamping, was ripped apart by the voice of a
TruthMonger, Deep Throat Division, crying in the wilderness, to those
who had 'ears to hear'.
My sister was predestined to move to NewAge, California, take a Sufi
name, purchase a mountain of crystals and become a feminist,
anti-nuclear, yogurt-eating guru dedicated to the promotion of
color-therapy as the answer to all of humankind's ills.
The only reason that Charles Manson chose to have his followers
slaughter Sharon Tate's Baby, instead of my sister, was because she was
honest enough to admit, during the height of the Vietnam War Craze, that
the young men of America were being sent to their deaths in order for
her to enjoy the benefits of refridgeration which were denied to the
peasants in Third World countries.
"G.I. Joe died for Standard Oil's sins..."
~ A Communist Sympathizer To Be Named Later
"The King has no clothes!"
This is the message of the InterNet...
"KNixon Knew!"
This is the message of the InterNet...
"A thousand points of light, censored by the New World Order!"
This is the message of the InterNet...
"If the dangerous, high-speed police chase is being video-taped from a
helicopter following every move of the 'escaping' vehicle, then why is
it necessary for the police cars to use flashing lights, sirens and the
threat of armed violence to exacerbate and add to the bad judgments
being exhibited by someone who has little or no chance of eluding "Three
air-units." (Verbatim quote from 'World's Scariest Police Chases' which
is sexually exciting me, even as we speak.)"
This is the message of the InterNet...
When is the last time the subject of government regulation came up in
a business meeting and, when your opinion was solicited, you stated, "We
have reached a point where it is morally acceptable to kill the
bastards, but it is not yet feasible to do so."?
When is the last time you passed this gem of wisdom from Vin
Suprynowicz (Vin ThePolishKike to Zen Racists) along to fellow Netizens
who did not hold the power to immediately affect your life for better or
worse by deciding whether or not you would continue to receive a
paycheck?
This is the message of the InterNet...
My WebSite was murdered by Sympatico without warning or explaination,
as a result of Armed Thugs I had offended violating my inherent right to
speak the Truth as I perceive it. My computers and those of my relatives
were confiscated without any warning or explaination, as a result of
Armed Thugs violating my right to speak the Truth as I perceive it.
The 'Official RCMP Hate Page' now resides in a hidden file on dozens
of Canadian government computers, thanks to the efforts of a CypherPunks
list member who is willing to defend my right to free speech regardless
of the fact that he has contracted a hit-man to murder me for forging
posts to the list in his name which made him look like a fucking idiot.
This is the message of the InterNet...
The Truth, The Half-Truth, And Nothing Remotely Resembling The Truth:
'The Amazing Randi' (?) is a magician who has gone to great effort to
expose Uri Geller and debunk his claims of using psychic powers to
accomplish what magicians can replicate through sleight-of-hand.
Did 'The Babe' *call* his legendary home-run shot by pointing to the
location he was planning to bury it, or was it a 'lucky' stretch of his
muscles before stepping into the batter's box?
I would be the first to admit that a strong case could be made for
viewing the 'hard evidence' I point to as proof of the validity of my
rambling, insane conspiracy theories, as being the result of the
selective presentation of Reality-Bytes filtered through sieves designed
to present 'chaff' as a real substance not dependent on the existence of
an imaginary 'wheat' substance whose existence is promoted by
underground Reptilian
Nazis hell-bent on world domination.
I would also be the first to admit that 'coincidence' could account
for Peter Jennings seemingly fullfilling in MeatSpace his
Virtually-Assigned role as a Circle of Eunuchs Initiate member by
providing the hard facts and figures substantiating the views espoused
by 'Epilogue 7.3 Rev. 1.7' of 'SPACE ALIENS HIDE MY DRUGS!!!'
Not to mention the fact that 'coincidence' could explain the fact that a
single reference to 'Thelma & Louise' at the end of the same Epilogue
was followed by references to the movie in dozens of disparate TV shows
over the next few days (including an episode of '48 Hours' which showed
excerpts from 'Thelma & Louise" as I was typing this very paragraph...).
The fact of the matter is, however, that a lifetime of separating
'coincidence' from 'synchronicity'--through a process of objective
evaluation of mathematical probability--has led me to believe that this:
|<----------->| : is 8", in a parallel universe within which women have
not yet been given the right to vote.
Likewise, it is ludicrous to live in a universe in which it is a
recognized scientific fact that the emissions of a cellular phone can
affect a radio telescope a hundred kilometers distant, while disallowing
the possibility that the emissions of a human mind, heart or spirit can
register on a similarly designed biotechnological receptor in local or
global proximity to the source of the emissions.
It is equally ludicrous to fail to recognize that physically
manifested and disseminated symbols representing the results of human
thoughts, emotions and concepts will have an effect that is every bit as
observable and predictable as laws of physics concerning inertia,
impetus, velocity, acceleration and direction, etc.
If a decade of scientific investigation into the mechanisms by which
pigeons find their way home proves to be inconclusive, the pigeons will
still manage to find their way home. If humans find themselves incapable
of returning to the place they were born without having a
birth-certificate and a roadmap, salmon are unlikely to abandon their
natural ability to do so by virtue of a process which could be viewed as
'Magical Thinking' by those incapable of reducing the process to a
solveable MeatSpace equation.
NewAge 'Magical Thinking' is nothing more nor less than an esoteric
extension of 'The Power of Positive Thinking' paridigm which is the
foundation of all subsequent self-help, goal-oriented individual
accomplishment and corporate management systems which recognize that an
inspirational thought that results in a single step toward Mecca is more
effective than a thousand corporate meetings discussing the feasibility
or futility of putting a journey to Mecca on the agenda of the next
shareholder's meeting.
How To Get Even Without Breaking The Law / Sweet Revenge:
I have been fucked a thousand times by the arbitrary, capricious
decisions and actions of a variety of officially recognized
Authoritarian Sivil Servants who didn't like my looks, my attitude, or
my breath. I have also avoided being fucked several thousand times by
'shaping' my answers to their questions in a manner designed to
misdirect their peckers as they tried to stick them in my butt.
When the Canadian Customs & Immigration shit hit the fan, and I was
forced to appear before an official Board of Inquiry convened to decide
whether or not I could be denied entry into the country of my youth, I
found myself forced to abandon all logic and reason, and trust in th Tao
to protect me as I resorted to telling the Truth (TM).
In the face of damning evidence of my slick, conniving manipulation of
rules, regulations and laws through the use of Damnable Lies!!!, I
explained my theory of Variable Speed
Truth (TM) to the Board of Inquiry (although I attributed it to Albert
Einstein, in order to give it more credibility).
I explained that, as a Border Child, I had grown up in an environment
which enabled me to understand that 'Rules Is Rules...' is an extremely
flexible maxim which can be interpreted by an individual Canadian
Customs & Immigration OffalSir to mean that, even though you have been
dating his daughter for several years and have been invited over to
dinner numerous times, that he can legally deny you entry into the
country and make you drive fifty miles to enter through another Customs
Port if you fail to have three hundred and forty-two pieces of picture
ID, particularly if you kept his daughter out past curfew the previous
weekend.
I also explained a variety of situations in which I had crossed the
US/Canadian border more than once on the same day, and claimed residence
in different countries, because I knew what each border guard wanted to
hear in order to make my passage proceed more smoothly, as opposed to
making my life a living hell for no apparent reason other than their own
misunderstanding of the laws of the country.
Although I would be the last to downplay the successful result of my
appeal as being partly the result of the members of the Board of Inquiry
being decent people who had retained a small part of their soul while
serving the Great Beast, I fully recognize that the outcome might have
been completely different if I had failed to properly play my part in
the Grand Play by hanging my head in shame as my extremely expensive
legal counsel pointed out to the Board of Inquiry what a sorry, pathetic
loser I was, and how the only real options in this case would be to
forgive my trespasses, or take me to the pound and have me put down like
the poor, sick, mangy dog that I am.
My point is that, regardless of the letter or spirit of the existing
laws, it is up to each individual to interpret them in a manner
consistent with their own best judgement, and to live with the
consequences of what they truly believe to be 'right action', no matter
what judgements or punishments may result from people with larger
weaponry taking the opposite view.
Of course, I would be foolish to pass judgement upon those who
recognize the wisdom in grovelling, snivelling, and hanging one's head
in shame, if it appears to be the path that will allow one to live to
fight again another day...kind of like faking a limp on the way back to
the huddle, in order to break for the Big Score.
An Exercise For The Reader:
I can no longer remember just where this rambling, semi-coherent
missive was evenutally designed to end up, but I think it has something
to do with the fact that my unsubtly veiled threats against those with
False Smiles (TM) has resulted in the glue-sniffing progeny of A
Wagon-Burner Named Earlier having had the flimsyl, fabricated assault on
his Charter Rights abandoned by the dropping of all trumped-up charges
against him.
However, this has come at the expense of my being called down to local
Gestapo Headquarters to receive paperwork indicating that I can expect
to go to eventually go to prison for at least four years as a result of
Baby's transgression of the 'Dog At Large' bylaws of the Town of
Bienfait, Saskatchewan.
Silly me...my drunken, drug-induced paranoia would have me believe
that much of my current troubles stem from the fact that I am in the
midst of preparing a legal defense for a Wagon-Burner whose continuing
persecution by Dudley DoWrong and John Law was one of the subjects
addressed in "The Official RCMP Hate Page" chapter of 'SPACE ALIENS HIDE
MY DRUGS!!!', and who is being persecuted by the same Queen's Court
Bench prosecutor whose ass I used to wipe the floors of the Halls of
InJustice and then bragged about it to (G)(g)od And Everybody in a
public forum on the InterNet.
Anyway, figure out just what point I am trying to make here, consider
it made, and hit the key at your own convenience...
From nobody at REPLAY.COM Fri May 8 17:57:34 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 8 May 1998 17:57:34 -0700 (PDT)
Subject: Dialogue ------ Space Aliens Hide My Drugs!
Message-ID: <199805090057.CAA15826@basement.replay.com>
ROTFLMAO!
"Ask not who your country can Nuke for you...ask who you can Nuke for
your country."
~ Timothy C. McKennedy, President of Samsonite Peripherals, Inc.
From toto at sk.sympatico.ca Fri May 8 18:45:17 1998
From: toto at sk.sympatico.ca (Toto)
Date: Fri, 8 May 1998 18:45:17 -0700 (PDT)
Subject: I Can't Help Myself...
Message-ID: <3553ADE2.66AB@sk.sympatico.ca>
!OB Crypto:
I crossed the US border today to make a beer run, and a US Customs
officer who has known me for decades took the time and trouble to
'roust' me, as per the instructions of his superiors.
The last words out of his mouth were a question to which he has long
known the answer: "Where were you born?"
I was born in Liberal, Kansas.
Could it possibly be that this fairly decent individual, who has
never done me serious dirt, even when it would have resulted in
career advancement, is a Secret SypherPunk delivering a cryptic message
that could be translated as, "Toto...I don't think you're in Kansas,
anymore."?
DrunkOnCheapAmericanBeerMindsWantToKnowMonger
From toto at sk.sympatico.ca Fri May 8 18:45:21 1998
From: toto at sk.sympatico.ca (Toto)
Date: Fri, 8 May 1998 18:45:21 -0700 (PDT)
Subject: Refutation of 'Magical Thinking'
Message-ID: <3553B268.77FA@sk.sympatico.ca>
I decided to do an objective experiment to prove or disprove the
validity of 'Magical Thinking'.
I shut my eyes and concentrated on psychically willing my TV to provide
me with an indisputably meaningful message relevant to my life.
I turned on the TV, to a random channel, just in time to see/hear
Dorothy and the ScareCrow singing, "If I Only Had A Brain."
Conclusion: Magical Thinking is BullShit!
From alan at clueserver.org Fri May 8 20:55:42 1998
From: alan at clueserver.org (Alan Olsen)
Date: Fri, 8 May 1998 20:55:42 -0700 (PDT)
Subject: DoD orders vendors to use Key "Recovery"
In-Reply-To: <6B5344C210C7D011835C0000F8012766017A75E6@exna01.securitydynamics.com>
Message-ID: <3.0.5.32.19980508204952.040f2d70@clueserver.org>
At 03:05 PM 5/8/98 -0400, Trei, Peter wrote:
>
>
>I hope someone sends them the NSA report on the security hazards of
>KR.
I think that people should sell the Government crypto software with key
recovery. We need to have a backdoor into the government's communications.
Any key recovery system sold to the governemtn should have a real obvious
and visible key recovery system so they know that it is there.
>
>Peter Trei
>ptrei at securitydynamics.com
>
>---------------
>http://www.gcn.com/gcn/1998/May4/cov1.htm
>
>GCN May 4, 1998
>
>Defense wants PKI now
>Department intends to make vendors use strong encryption
>By Christopher J. Dorobek
>
>To jump-start development of a public-key recovery system, the Defense
>Department plans to require its vendors to use strong encryption,
>deputy Defense secretary John Hamre said recently.
>
>Because it wields significant buying clout, Defense's more stringent
>requirements should boost government and industry efforts to build
>systems for managing encryption keys, Hamre said last month at an
>Armed Forces Communications and Electronics Association event in
>Washington.
>
>Agencies cannot wait for the government and industry to settle on a
>national encryption policy, Hamre said.
>
>Through successive administrations, the government has tried to
>develop a singular policy on encryption. But so far, the efforts have
>failed. Generally, industry has criticized the government's policy
>proposals as too restrictive.
>
>"We have an important national imperative to protect ourselves in this
>world," Hamre said. "We can't wait to have this issue resolved ...
>therefore we're going to buy encryption with key recovery."
>
>Vendors will have to use encrypted data and be able to recover it when
>doing business with DOD, he said.
>
>Defense will work out a final policy in the coming weeks, Hamre said.
>
>[...]
>
---
| "That'll make it hot for them!" - Guy Grand |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer: |
| mankind free in one-key-steganography-privacy!" | Ignore the man |
|`finger -l alano at teleport.com` for PGP 2.6.2 key | behind the keyboard.|
| http://www.ctrl-alt-del.com/~alan/ |alan at ctrl-alt-del.com|
From postmaster at mail.opentown.com Fri May 8 21:28:50 1998
From: postmaster at mail.opentown.com (postmaster at mail.opentown.com)
Date: Fri, 8 May 1998 21:28:50 -0700 (PDT)
Subject: Opentown proudly announces 50,000 membership Anniversary Giveaway Festival
Message-ID: <199805090428.VAA24848@toad.com>
50000ȸ�� ���ı�� ���� ������!
http://www.opentown.com
����Ÿ���� �������� ����� ���Ծ� 5������ ȸ���� ������ġ�Ͽ����ϴ�.
���� �������� ������ �������� Ǫ���� ��ǰ�� �Բ� 3���� ū��縦 �����Ͽ����ϴ
�.
���Ⱓ : 98.5.7 ~ 6.5 (30�ϰ�)
�� ��� 1. ���� ����� ���� ������
���迡�� �Ѱ����� Ư���� ���Ըӽ��� ���ø� 30�ϰ� ������ ����� �ְ�
������ ���� ���� 1,000ï¿½í¿¡ï¿½ï¿½
������ī�޶�, PCS�޴���, MGM�������� ī����Ĩ ï¿½ï¿½ï¿½ï¿½í¸®, ����Ÿ�� ī����
����, ��Ÿ ������ ��ǰ����
����� ���� �մϴ�.
�� ��� 2. �ִ� ȸ������ ��õ�� ���� ������
���Ⱓ ���� �ű� ȸ���� �ִٷ� ���� ���� ��Ų ȸ�� 5ï¿½í¿¡ï¿½ï¿½ ���� PCS�޴���
1�뾿�� ���� �մϴ�.
�� ��� 3. �� 5,000��° �ű԰��� ȸ�� ��� ������
�ű� ���� �Ͻ� ȸ���� �� 5,000��° ȸ�� ���Դ� ���� PCS�޴��� 1�뾿��
�����մϴ�.
�������� ���Ҿ� ī������ӵ� ����� ��⼼��.
�귿, ��ο���ī, ï¿½í·¢ï¿½ï¿½, ��ī��, ���Ըӽ�, ï¿½í½ºï¿½ï¿½ï¿½ï¿½ï¿½ï¿½ï¿½ �����߿� ������
�����۰� ���Ҿ� ï¿½ï¿½ï¿½ï¿½ï¿½ï¿½ï¿½í¶¯, ��, ī�������ī, Ȧ����ī�� �߰��� ���ñ½ºµË´Ï´
�.
����Ÿ��� ��Ư�� �ڹ�ä�õ� �غ�Ǿ� �ֽ��ϴ�. ���ٸ� ä���� ���̸�
����������.
Good Luck!
From paulmerrill at acm.org Fri May 8 21:30:24 1998
From: paulmerrill at acm.org (Paul H. Merrill)
Date: Fri, 8 May 1998 21:30:24 -0700 (PDT)
Subject: Dialogue - SPACE ALIENS HIDE MY DRUGS!!!
In-Reply-To: <3553A2E3.2E06@sk.sympatico.ca>
Message-ID: <3554061D.E500FC22@acm.org>
Would have been ROFLMAO if it weren't so true.
Toto wrote:
>You Have A Right To Remain Silent! Anything You Say Will Be Misquoted,
>And Then Used Against You:
From president at whitehouse.gov Sat May 9 06:48:25 1998
From: president at whitehouse.gov (Spam the President)
Date: Sat, 9 May 1998 06:48:25 -0700 (PDT)
Subject: U.S. Navy caught hacking into British marine charity Web site
Message-ID: <355450B4.28BA4217@whitehouse.gov>
http://www.infoworld.com/cgi-bin/displayStory.pl?98058.winavy.htm
U.S. Navy caught hacking
into British marine
charity Web site
By Kristi Essick
InfoWorld Electric
Posted at 3:07 PM PT, May 8, 1998
The U.S. Navy has been caught attempting to
break in to secure areas of a World Wide Web
site sponsored by a U.K. marine-mammal
preservation charity, according to officials at the
organization.
The Whale and Dolphin Conservation Society
(WDCS) -- which operates an online shopping
site aimed at generating money for the welfare of
the animals at http://www.wdcs-shop.com --
said it was alerted to the attempted break-in last
week by its site-hosting company, Merchant
Technology Ltd.
"We were working late one night, and a
command line request came in wanting to access
unauthorized areas of the site," said Andy Fisher,
marketing manager for Merchant. "We were
amazed to find out it was the Pentagon."
Merchant built and manages the secure
electronic-commerce site for the conservation
society and routinely keeps an eye on who visits.
If users attempt to gain access to unauthorized
areas, the company is alerted to the source of the
incoming request.
At 9:45 p.m. GMT on April 28, Fisher said,
workers at Merchant were shocked to see an
incoming attempt to breach security by a user
identified as donhqns1.hq.navy.mil.
Merchant got in touch with WDCS immediately,
only to find out that the charity had been
contacted by the Navy a few weeks earlier. The
Navy was interested in obtaining a report the
group is working on that details the efforts of
Russian animal experts to train dolphins in the
Black Sea for military tasks, such as finding and
attaching probes to submarines, Fisher said.
A WDCS representative said that there is
nothing secret about the Russian government's
activities in this area but that the document does
contain information about the export of the
trained dolphins to foreign countries. The group
declined to give the Navy a copy of the report
only because it was not complete at the time.
Once it is made final, the report will be published
and the Navy can then examine it, the
representative said.
The WCDS said that it is confused about why the
Navy would attempt to break in to its Web site.
"I think whoever it was within the U.S. Navy
facility would have better things to do rather than
try and hack into our computers," said Chris
Stroud, the organization's director of campaigns,
in a statement. "If they were seeking reports on
the Black Sea, we shall be freely publishing these
in the near future anyway."
The WCDS previously has commented
unfavorably on Navy activities such as its
low-frequency sonar trials off Hawaii and on
ship collisions with endangered whales, the
group said.
Merchant says it is "100 percent sure" the
hacking attempt originated from the Navy.
WDCS has notified the U.S. Embassy in London
and the relevant U.K. authorities, the
organization said.
"We hope that the U.S. authorities have some
rational explanation for this incident," Stroud
said.
"The Navy has not yet received a formal
complaint on the issue," said a Navy official, who
declined to be named. "Until the Navy receives a
formal complaint with details, there's not much
we can do to proceed further."
Merchant Technology Ltd., in Bath, England, can
be reached at 44 (1225) 481 015. The Whale and
Dolphin Conservation Society, also in Bath, can
be reached at 44 (1225) 334 511 or
http://www.wdcs.org.
Kristi Essick is a London correspondent for the
IDG News Service, an InfoWorld affiliate.
From rah at shipwright.com Sat May 9 07:25:08 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 9 May 1998 07:25:08 -0700 (PDT)
Subject: db$: Digital Bearer Settlement Conference Status Report
Message-ID:
I suppose all of you have figured out by now what we're not doing a Digital
Bearer Settlement Business Development Conference at Bretton Woods this
August. :-).
I was willing to give it a shot, even with the admittedly high cost in
hotel rooms, if I could get presenters on the topics I wanted. If I got the
presenters, I could use the content to leverage the keynote speakers, and,
with those, I think I would have gotten the attendance. Unfortunately, I
couldn't find anyone, with exactly two exceptions, who both knew enough on
the topics I was soliciting and who had the time to come to Bretton Woods.
In the process of figuring out all that out, however, something entirely
different presented itself, and thinking about *that* gave me another set
of conference ideas, which I want to bounce off you guys in just a bit. I
suppose don't really give up on ideas once I get them, though they may get
pushed down on the stack for a while. It's that Frisian expression of the
berserker gene thing, I guess... :-).
So, I was figuring out how I could sweeten the pot for presenters for the
Bretton Woods thing, when I bumped into the editor of a well-known book
:-). This got me to thinking about a book on digital bearer settlement,
containing the contents of this summer's proposed conference, written in
chapters by the presenters of the conference. I talked to the editor about
this, and she said that she didn't like books written by a cast of
thousands, and since we were talking about new technology with no user base
and she was a technical and professional books editor, she was going to
have a hard time selling something like this to her market. However, if a
single person wanted write a book on digital bearer settlement, it seemed
like there might be more room to bash it into something her audience might
want to read. Since *I* didn't want to write a book, really, we sort of
left it at that.
About a week or two later, Pete Loshin, who now works as an editor for
Cutter Publications, invited me to come and stir things up at their
"Summit" conference, and sit on an internet commerce panel, which I've
already told you the story about. While there, however, I talked to
several authors of books, and one of them, a pretty well-respected author
of hard-core IT computer books, told me that my whole geodesic society /
digital bearer settlement thing was something actually new to him, and that
he so rarely heard something new in his business. So, he encouraged me to
get started on a "trade" book, one for the general public, and spent about
an hour telling me how to get started.
So, when I got home, all excited, and I started bashing away on the popular
book I've been threatening to write for years on all this stuff. Unlike a
technical and professional book, the typical first author doesn't get
advances for this kind of thing, so you have to write the whole thing in
advance and see what happens. So, we'll see what happens.
And then, something wierd happened. Kieth Dawson's TBTF newsletter did a
bit on me, Philodox, the dbs list and the conference, and, out of that, I
got email from *another* well-known editor asking me if I knew anyone who
wanted to do a book on micropayments or something. So, I got this guy on
the phone, cranked up the reality distortion field to 13 (monkeys flying),
and pitched him on a book on digital bearer settlement, using the content
request from the Bretton Woods conference call for presenters as a jumping
off point. He then asked me if I could do something a little more polemical
:-), and I sent that version off, but I think I scared him away. :-). I
haven't heard back from him, and I suppose he lost interest.
However, Tuesday, I met up with the original famous-book editor, the one I
was trying to pitch the conference book to, and told her what I had done
with the *other* editor on a digital bearer settlement book, and she wanted
to see it. She liked the first, unpolemic, version best, :-), and we're
still talking, which is a good sign.
So, all of this got me to thinking about how I want to proceed with my
proposed conference schedule.
I still want to do a conference this summer. Some kind of "gathering of the
clan" thing on the same order as the mac-crypto conferences Vinnie and I
do, but, of course, I have to make money on it. Essentially, I'd put out
an open call for papers/presenters, bunch them together on the schedule
together roughly by content, and call it a program, just like I do for
mac-crypto. I wouldn't be reimbursing speakers or anything. People who
speak pay to see the rest of the conference, in essence, just like they do
at FCxx
After that, I'd start working on putting together a peer-reviewed
conference, hopefully in New York, but maybe Washington, where I'd had a
tentative offer. The problem with the Washington offer is that it's at a
university and I have to make money on this. I'm not a sinecured academic
;-), or even someone who has a day job. :-). That was the problem with
IFCA's takover of FCxx, the upside kind of went away for me. Oh, well, at
least I get credit for the idea. And three more trips to wherever the
conference goes as a member of IFCA's board.
Anyway, this doing conferences for profit is also why I can't use a
university location in the Boston area for this digital bearer settlement
developer's conference as well.
Finally, I'd still like to go to Bretton Woods again, but *next* summer,
and with a Workshop, with paid *paid* presenters, which is what this
summer's business development conference should have been all along. Maybe,
if I'm lucky, and the digital bearer settlement book's out, it'll be the
text book for this thing, or something.
So, let's look at this "gathering of the clan" idea first. Because of all
the problems people had with the prices at Bretton Woods, I started
thinking of all kinds of ways to do it on the cheap.
Stuff like renting the Sons of Italy Hall here in Roslindale, my Boston
neighborhood. Which is not as dumb to do as it was, say, two years ago. The
crime rate in Boston, especially Roslindale/Hyde Park, which is now the
mayor's neighborhood, has fallen rediculously lately, and Roslindale's
undergoing a boomlet of sorts, with lots of new businesses, including a
couple of proto-bohemian cafes, a new grocery store, stuff like that. The
neighborhood is scruffy and full of new immigrants and said
freshly-installed bohemians, and a digital bearer settlement conference
here would feel about the same in terms of culture-clash as FC98 was on
Anguilla, which would be kind of cool. I think I could get a couple of
phone lines in to the hall, and, if I dropped a couple of routers and 56k
modems on them, I could get better bandwidth than we had in Anguilla, even.
;-). Of course, Roslindale in mid-July or early August is not quite
Anguilla in February, but, I still think it would have the same
foriegn-place *extremely* casual atmosphere. No beach, much less total
eclipse off the Montserrat Volcano, of course, but, well, you get the
point: "Hackers invade Roslindale. Film at 11." The local business
development association would probably love me for it, probably as much as
the Anguillans love Vince for FCxx, which, of course, would have its
attractions for me as a local resident.
However, I still haven't talked to the manager of the hall, and I'm not
sure the place has air-conditioning (it has to, right?), much less
telephone lines, much less touchtone lines. Seriously. Not to mention that
I'd be hanging myself out to dry on deposits, and stuff, if nobody showed
up. Much less that I'd have to collect checks from people up front before I
could even make reservations for all this stuff. Having a credit card
merchant account would be nice, but it's still impossible at the moment.
Thinking about this very problem, I sent feelers out at this month's DCSB
meeting for the use of a company's net-wired auditorium-seating conference
room instead, to see if I could get it by way of sponsorship of the
conference. This would also reduce costs a bunch, but I haven't heard from
anyone on this, so it's probably a long shot at this point.
But, then, after DCSB that day, I was talking to the catering manager at
the Harvard Club, and, just as a kind of pro-forma thing, I asked him for a
small 2-day conference estimate for, say, 30-35 people. Because of all the
business I bring him with DCSB, he quoted me something which was
rediculously low in terms of my own financial exposure if things went
south. It's not like the Club is busy in the summer, when all the bankers
and lawyers go off to places like the Cape and the Vinyard anyway, so he
sees me as a safe way to get some new business in the door. And, since the
Club function rooms aren't booked up this time of the year, I could cancel
anytime up to a week in advance of the date if my attendance wasn't enough,
because I'd be bringing him "found money" anyway.
So, for about half the price of attending any business conference in a
downtown conference hotel, we could have something really nice in the
Harvard Club, 38 stories up, with harbor views, decent food, and
comfortable surroundings to schmooze in. There's the complication of the
jacket requirement, but, if we started on Thursday, Friday's a "business
casual" day, so we'd have only one day of dress code to contend with. In
addition, I think dbs and dcsb folks, as more business and finance oriented
types, are more inclined deal to a single "dress-up" day than just plain
crypto folks, so I think this could wash.
The price for a Harvard Club version of, what?, "Digital Bearer Settlement
Developer's Conference", "Symposium?", whatever, including Net access like
we had at FC98, and A/V, and maybe video/audio taping or even netcasting,
if I can get the rights hocked off for a percentage or something, would be
on the order of $400 per person, including breakfast, lunch, and a cocktail
party the first night, and of course, paying me. :-). Getting lodging would
be up to you, but at least you're not locked into a $400/night room like we
were at Bretton Woods. I would bet most folks could find friends to crash
with, if it came to that.
I haven't priced the "Hackers Invade Roslindale" option, but I'd be happy
to do that instead if there's real interest in it. I'd just need to collect
money from people almost immediately to get started.
Frankly, I like either option. They both sound cool.
I'm thinking about July 23-24 at the moment. In the same spirit of
"first-ever, last-minute" that we did mac-crypto in, of course.
So, folks, what do we want to do?
Contact me directly if you have questions on what particulars there are at
the moment, or, especially, if you want to speak at this thing. If there's
interest coalescing around one idea or another, I'll put out a "formal"
call for presenters pretty soon.
Also, if you want to chat publically about this conference or digital
bearer settlement in general, I figure the dbs at philodox.com list is the
best place to do this. It keeps the cross-posting and off-topic stuff on
other lists to a minimum. Here's the URL to subscribe:
Cheers,
Bob Hettinga
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
From frantz at netcom.com Sat May 9 09:46:05 1998
From: frantz at netcom.com (Bill Frantz)
Date: Sat, 9 May 1998 09:46:05 -0700 (PDT)
Subject: U.S. Navy caught hacking into British marine charity Web site
In-Reply-To: <355450B4.28BA4217@whitehouse.gov>
Message-ID:
At 4:48 AM -0800 5/9/98, Spam the President wrote:
>http://www.infoworld.com/cgi-bin/displayStory.pl?98058.winavy.htm
>
> U.S. Navy caught hacking
> into British marine
> charity Web site
>
> By Kristi Essick
> InfoWorld Electric
>
> Posted at 3:07 PM PT, May 8, 1998
> ...
>
> "I think whoever it was within the U.S. Navy
> facility would have better things to do rather than
> try and hack into our computers," said Chris
> Stroud, the organization's director of campaigns,
> in a statement. "If they were seeking reports on
> the Black Sea, we shall be freely publishing these
> in the near future anyway."
Consider the possibility that someone hacked into the Navy's computer and
then used it as a base to hack the Marine Mammal Charity site.
-------------------------------------------------------------------------
Bill Frantz | If hate must be my prison | Periwinkle -- Consulting
(408)356-8506 | lock, then love must be | 16345 Englewood Ave.
frantz at netcom.com | the key. - Phil Ochs | Los Gatos, CA 95032, USA
From frantz at netcom.com Sat May 9 09:47:45 1998
From: frantz at netcom.com (Bill Frantz)
Date: Sat, 9 May 1998 09:47:45 -0700 (PDT)
Subject: HPC Report
In-Reply-To: <199805082344.TAA21658@camel7.mindspring.com>
Message-ID:
If the export control people are worried about people designing nuclear
weapons, it should be noted that the US managed to design weapons with
computers like the CDC 6600 and 7600 that make today's PCs look fast.
Today's PCs have more memory and bigger, faster disks too.
-------------------------------------------------------------------------
Bill Frantz | If hate must be my prison | Periwinkle -- Consulting
(408)356-8506 | lock, then love must be | 16345 Englewood Ave.
frantz at netcom.com | the key. - Phil Ochs | Los Gatos, CA 95032, USA
From jya at pipeline.com Sat May 9 11:31:12 1998
From: jya at pipeline.com (John Young)
Date: Sat, 9 May 1998 11:31:12 -0700 (PDT)
Subject: 1997 Wiretap Report
Message-ID: <199805091831.OAA29612@camel14.mindspring.com>
The US Courts 1997 Wiretap Report is out:
http://jya.com/wiretap97.htm
Total: 1,094, up 59 from 1996; 206 "electronic."
374 taps in this nabe; dozens in this bldg, six in
this flat, a couple on this box, one under lip
counting morse teethgrinds.
From froomkin at law.miami.edu Sat May 9 11:42:01 1998
From: froomkin at law.miami.edu (Michael Froomkin - U.Miami School of Law)
Date: Sat, 9 May 1998 11:42:01 -0700 (PDT)
Subject: FILED 98 MAY - 8 AM 11:31
In-Reply-To: <3553504B.6AA9@nmol.com>
Message-ID:
::
Anon-To: cypherpunks at cyberpass.net
This spam-proofed message was sent by Michael Froomkin.
To reply privately, send mail to my surname at law.tm
[cc's trimmed!]
Lest anyone be mislead, this filing is garbage. I find particularly
ridiculous the idea that a court can only cite cases submitted by the
parties. On the contrary, the court's duty is to cite the law correctly,
and thus to ignore anything inaccurate or irrelevant submitted by the
parties and to supplement where and when needed. Nowhere is this duty
clearer when, as here, one side is not represented by counsel; as it
happens, the court exercises this duty to supplement _to help_ the pro se
plaintiff, not hurt it.
I have not followed the pleadings very carefully in this case, so I won't
express a view on the merits except to say that having attempted to read
plaintiffs' submissions I was not able to figure out much about what merit
their case was supposed to have.
Were I to be asked by a pro se plaintiff how to best present their case in
federal court, I would say: don't try to write legalistically. Use the
case caption at the top of the first page, as provided by the rules of
court, then identify who you are, and who you are suing in the first
paragraphs, then tell your story in plain and simple English with as few
legalisms as possible. If you have a particular statute or statutes in
mind that you think were violated, do specify them, but also ask for
whatever other relief the court may find just or equitable so as to
preserve all your options.
Legalistic mumbo-jumbo is NOT required, and only gets in the way of
telling your story. Attacking the court is stupid, both because it
usually isn't justified and because it never achieves anything.
A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax)
Associate Professor of Law |
U. Miami School of Law |
P.O. Box 248087 |
Coral Gables, FL 33124 USA | It's @#$#@ hot here.
From jajom at lava.net Sat May 9 11:58:21 1998
From: jajom at lava.net (Jim McQueeney)
Date: Sat, 9 May 1998 11:58:21 -0700 (PDT)
Subject: 1997 Wiretap Report
In-Reply-To: <199805091831.OAA29612@camel14.mindspring.com>
Message-ID: <3554A738.F7C3B5A2@lava.net>
John Young wrote:
>
> The US Courts 1997 Wiretap Report is out:
>
> http://jya.com/wiretap97.htm
>
> Total: 1,094, up 59 from 1996; 206 "electronic."
>
> 374 taps in this nabe; dozens in this bldg, six in
> this flat, a couple on this box, one under lip
> counting morse teethgrinds.
>
Those reported are *only* the aauthorized wiretaps; I wonder,
how many unauthorized wiretaps were made? I guess we'll
never know...
--
Jim McQueeney ICQ: http://wwp.mirabilis.com/719836
*************** PGP Keys on public key servers: ***************
RSA 1024/0x45A3FB5D FP/9AEF4C97 E35437D6 434CF20C 6D4D075E *******
D/H 1024/0xA82248FD FP/F77BC061 45BF05EF FFB7AC2B C7F07C21 A82248FD
From diane at extractorpro.net Sat May 9 12:24:11 1998
From: diane at extractorpro.net (diane at extractorpro.net)
Date: Sat, 9 May 1998 12:24:11 -0700 (PDT)
Subject: What Bill Gates doesn't want you to know.
Message-ID: <199805092253.SAA22521@sour.extractorpro.net>
Microsoft is on to something that may in fact smash
their competition with hours!
Bill Gates and his team of marketing VPs have finally
found the net's biggest secret. The one that Web Masters
and Small Businesses have been using to get the lion's share
of business out there.
You see, they all have found a way to reach more people
than even all of Microsoft employs with the press of one
button-- and at a cost that is less than you will probably
spend on internet access this year.
Its called Direct Email and its already in the works with
companies like Microsoft.
Bill Gates' dream is already here with a secret piece of software
called "Extractor Pro".
Extractor Pro already does what Bill Gates is waiting to do!
Armed with Extractor Pro, a pentium computer, and a 28.8 modem
you can be sending more messages in the time that it takes to
change the oil in your car, than the entire NewYork post office
can send in one day..
Thousands of simple Email messages like this could be your
ticket to the moon.
If you want to be one up on Bill Gates and his team of
marketing VPs, call us or visit:
http://www.extractorpro.net/~diane/
We'll throw you the keys to Extractor Pro and let you take it for
a test drive. After you've gone around the block a few times and
decided Extractor Pro can do for you what Bill Gates' latest plan
can do for Microsoft-- call us and we can unlock your Extractor
Pro right over the net.
Thank you for your time.
Extractor Marketing
1-734-728-5210
*********************************************************************
* The mailing list for this message has been pre-processed by an *
* independent service to remove the addresses of those who are *
* not interested in unsolicited email. Free registration for this *
* removal service is at http://www.extractorpro.net *
* *
*********************************************************************
From mgraffam at mhv.net Sat May 9 13:15:12 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Sat, 9 May 1998 13:15:12 -0700 (PDT)
Subject: corvette.bxa.doc.gov followup
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
This message describes a computer on the Internet, one
corvette.bxa.doc.gov (192.239.70.124) (hereafter corvette). This computer
is owned by the Bureau of Export Administration (hereafter BXA), which
itself is a branch of the Dept. of Commerce.
Here I am exploring the idea that corvette runs a bot that scans the
internet for materials regarding crypto export violation, and I
will raise a few questions in regards to this.
- From the BXA web page (www.bxa.doc.gov):
The Bureau of Export Administration enhances the nation's security and
its economic prosperity by controlling exports for national security,
foreign policy, and short supply reasons. We administer the Export
Administration Act by developing export control policies, issuing
export licenses, and prosecuting violators. Additionally, BXA enforces
the EAA's antiboycott provisions.
A traceroute (timings excluded) from my computer system (a SLIP/PPP dialup
to MhvNet, located in Poughkeepsie NY) to corvette yields:
1 annex1 (199.0.0.10)
2 router.mhv.net (199.0.0.1)
3 sl-gw8-pen-3-4-T1.sprintlink.net (144.228.160.41)
4 sl-bb1-pen-9-0-0.sprintlink.net (144.228.60.11)
5 144.228.180.10 (144.228.180.10)
6 nyc4-br2.bbnplanet.net (4.0.2.178)
7 nyc4-nbr2.bbnplanet.net (4.0.5.29)
8 vienna1-nbr2.bbnplanet.net (4.0.3.129)
9 vienna1-nbr3.bbnplanet.net (4.0.5.46)
10 washdc1-br1.bbnplanet.net (4.0.1.89)
11 washdc1-cr1.bbnplanet.net (4.0.1.174)
12 docosesa.bbnplanet.net (192.221.253.3)
13 corvette.bxa.doc.gov (192.239.70.124)
It is especially useful to notice hops 10 and 11. The names of these two
hosts seem to indicate that the hops have tended towards Washington DC.
BBNPlanet is located in Washington, so it is probable that corvette
is too (though this is not necessarily true).
On April 22nd 1998, an anonymous connection was made from corvette to my
personal computer, ismene. This connection is only possible through my
main web page which is located on spice.mhv.net, which then links to
my computer. This mechanism is needed because ismene gets a dynamic IP.
Spice's logs show:
corvette.bxa.doc.gov - - [22/Apr/1998:14:05:49 -0400] "GET /~mgraffam
HTTP/1.0" 302 -
corvette.bxa.doc.gov - - [22/Apr/1998:14:05:50 -0400] "GET /~mgraffam/
HTTP/1.0" 200 2019
corvette.bxa.doc.gov - - [22/Apr/1998:14:06:16 -0400] "GET
/~mgraffam/misc/access.html HTTP/1.0" 200 629
The connector from corvette directly targeted my homepage, and then
immediately went to the page that accesses ismene. The connector bypassed
a page about crypto titled "Cryptotechnic Enlightenment". It is, perhaps,
this odd combination of words that escaped a bot's notice, but would have
surely been noticed by human. Instead the alleged bot picked up on
"access.html" and left links to my RSA and PGP public keys untouched. If
corvette is running a bot, it seems probable that they would ignore PGP
keys because they surely generate a large amount of noise when
exploring things of a cryptographic nature. This may account for the
behavior.
The access.html on spice has links to my computer. HTTP, FTP and telnet
links are established, and direct links are made to copies of my public
keys. The first three links to my keys via FTP are bypassed, and a
connection is made via HTTP to my computer (ismene). The portions from
ismene's httpd log follow:
corvette.bxa.doc.gov - - [22/Apr/1998:13:58:51 -0400] "GET / HTTP/1.0" 200 1858
corvette.bxa.doc.gov - - [22/Apr/1998:13:59:48 -0400] "GET /crypto_index.zip
HTTP/1.0" 200 19570
Corvette picks up the crypto_index.zip file, and leaves links titled
"Index of unfinished works" and "Misc. projects". That corvette picked
up the crypto_index.zip file establishes that it is looking for crypto
related material. Why did it pass up the "Cryptotechnic Enlightenment"
page then? I submit that it is because the word "cryptotechnic" did not
trip the bot's sensor but the word "crypto" in the link title to
crypto_index.zip did. I also believe that a human would have followed the
"unfinished works" or "misc projects" links after getting a crypto
index file. A human would be intelligent enough to intuit the connection;
a spider is not.
At this point, I imagine the bot reaching the end of ismene's main page,
having picked up the file it thought was useful and returning back to
the access.html file on spice and traversing to the next link.
In this case, it is an ftp connection to my machine. A portion of my logs:
Apr 22 14:00:13 localhost opieftpd[1509]: connect from
firewall-user at 192.239.70.124
Apr 22 14:00:14 localhost ftpd[1509]: connection from corvette.bxa.doc.gov
at We d Apr 22 14:00:14 1998
Apr 22 14:00:15 localhost ftpd[1509]: Anonymous FTP connection made from
host corvette.bxa.doc.gov.
Apr 22 14:00:16 localhost ftpd[1509]: ANONYMOUS FTP login from
corvette.bxa.doc.gov with ID mozilla@
After logging in corvette issues the following commands:
Apr 22 14:00:22 localhost ftpd[1509]: <--- 200 Type set to I.
Apr 22 14:00:23 localhost ftpd[1509]: command: SIZE /^M
Apr 22 14:00:23 localhost ftpd[1509]: <--- 550 /: not a plain file.
Apr 22 14:00:25 localhost ftpd[1509]: command: CWD /^M
Apr 22 14:00:25 localhost ftpd[1509]: <--- 250 CWD command successful.
Apr 22 14:00:28 localhost ftpd[1509]: command: LIST^M
Apr 22 14:00:29 localhost ftpd[1509]: <--- 150 Opening BINARY mode data
connection for /bin/ls.
Apr 22 14:00:29 localhost ftpd[1509]: <--- 226 Transfer complete.
Apr 22 14:00:35 localhost ftpd[1509]: command: PORT 192,239,70,124,7,228^M
Apr 22 14:00:35 localhost ftpd[1509]: <--- 200 PORT command successful.
Apr 22 14:00:36 localhost ftpd[1509]: command: SIZE /pub/^M
Apr 22 14:00:36 localhost ftpd[1509]: <--- 550 /pub/: not a plain file.
Apr 22 14:00:39 localhost ftpd[1509]: command: CWD /pub/^M
Apr 22 14:00:39 localhost ftpd[1509]: <--- 250 CWD command successful.
Apr 22 14:00:40 localhost ftpd[1509]: command: LIST^M
Apr 22 14:00:40 localhost ftpd[1509]: <--- 150 Opening BINARY mode data
connection for /bin/ls.
Apr 22 14:00:40 localhost ftpd[1509]: <--- 226 Transfer complete.
Apr 22 14:00:47 localhost ftpd[1509]: command: PORT 192,239,70,124,7,235^M
Apr 22 14:00:47 localhost ftpd[1509]: <--- 200 PORT command successful.
Apr 22 14:00:48 localhost ftpd[1509]: command: SIZE /pub/skey/^M
Apr 22 14:00:48 localhost ftpd[1509]: <--- 550 /pub/skey/: not a plain file.
Apr 22 14:00:50 localhost ftpd[1509]: command: CWD /pub/skey/^M
Apr 22 14:00:50 localhost ftpd[1509]: <--- 250 CWD command successful.
Apr 22 14:00:51 localhost ftpd[1509]: command: LIST^M
Apr 22 14:00:51 localhost ftpd[1509]: <--- 150 Opening BINARY mode data
connection for /bin/ls.
Apr 22 14:00:51 localhost ftpd[1509]: <--- 226 Transfer complete.
Apr 22 14:01:08 localhost ftpd[1509]: command: PORT 192,239,70,124,8,1^M
Apr 22 14:01:08 localhost ftpd[1509]: <--- 200 PORT command successful.
Apr 22 14:01:08 localhost ftpd[1509]: command: SIZE /pub/skey/README^M
Apr 22 14:01:08 localhost ftpd[1509]: <--- 213 1149
Apr 22 14:01:09 localhost ftpd[1509]: command: RETR /pub/skey/README^M
This series of commands ignores a directory called "keys" at root level,
which is consistent with ignoring PGP keys above, and cd's to pub/skey.
It then retrieves the README file (which is just a copy of NRL's readme)
and leaves. The connection style itself (of SIZE'ing directory names)
is odd, but this can be recreated with older versions of Netscape
Navigator.
I will assume that these connections are really from Netscape, and _not_
from a bot disguising itself as NS Navigator.
Greg Broiles (gbroiles at netbox.com) forwarded portions of his logs on
parrhesia to me:
corvette.bxa.doc.gov - - [20/Mar/1998:10:18:07 -0800] "GET /wassenaar/
HTTP/1.0" 200 2253
"http://search.excite.com/search.gw?collection=web&display=html2,lb&search=w
assenaar+countries" "Mozilla/2.0 (compatible; MSIE 3.02; Windows 3.1)"
corvette.bxa.doc.gov - - [20/Mar/1998:10:18:46 -0800] "GET /wassenaar/
HTTP/1.0" 200 2253 "-" "Mozilla/2.0 (compatible; MSIE 3.02; Windows 3.1)"
These shows connections from MSIE, can anyone confirm that MSIE makes
FTP requests in the same manner as NS?
Here I raise two questions that I would like to discuss, in private email
if needed because it is off-topic. First, could Navigator be made to
crawl the web? Could it be programmed via OLE, or Java? If it could, then
it could easily be used as the protocol frontend to a spider that could
easily crawl http, ftp, gopher, and news references looking for crypto
export violations.
If programming Navigator would entail pushing keystrokes into the keyboard
buffer and simulating mouse events, I do not believe it would be used as
tying up a machine's console in this manner would be vastly inefficient
and it would be better justified to pay a programmer to develop the
software to do it without NS.
Now I would like to focus on a different aspect of my logs: the
identification of a firewall-users at 192.239.70.124. It seems as if
corvette is a proxy server for other machines.
A port probe of corvette yields the following services:
corvette.bxa.doc.gov ftp 21/tcp
corvette.bxa.doc.gov smtp 25/tcp mail
corvette.bxa.doc.gov whois 43/tcp nicname
corvette.bxa.doc.gov gopher 70/tcp
corvette.bxa.doc.gov finger 79/tcp
corvette.bxa.doc.gov www 80/tcp http
ismene:~$ finger @corvette.bxa.doc.gov
[corvette.bxa.doc.gov]
Finger from your system is not permitted through the firewall.
ismene:~$ ftp corvette.bxa.doc.gov
Connected to corvette.bxa.doc.gov.
220-Proxy first requires authentication
220 corvette.bxa.doc.gov FTP proxy (Version 3.2) ready.
- From these two connections, we can see that corvette is indeed a
firewalling proxy. Because of this, we cannot be sure if all connections
out of corvette belong to the possible spider.
An altavista search for corvette.bxa.doc.gov turns up the web statistics
logs of several servers, including military and foreign servers.
Such a bot may crawl foreign servers looking for links or files from the
U.S., and it may crawl military sites to see to it that regulated
materials are not being exported (like the pgp fiasco). On the other hand,
this is mere speculation, it is equally likely that humans at BXA are
putzing around the net, looking at different sites.
This latter fact can be established (or we must admit to an incredibly
wide reaching bot that is not limited to crypto) because spice.mhv.net
has logged connections from corvette to www.mhv.net/~donn/diet.html
which is the main page for a health/fitness related hierarchy. It is
apparently a popular site for that material and is linked to frequently
by other sites. It is possible that a bot crawled around this way, but
unlikely since from the evidence on my machine the bot (if it is one)
is fairly discriminating about the links it follows.
Humans use the corvette proxy.
It is hard to tell which links drew corvette's attention from those sites
that were hit up. Here is an attempt at a classification of sites that
get connections from corvette:
* Physics:
nsi.net.kiae.su, a nuclear safety institute, keeps a log specifically of
U.S. government computers that have connected to them. Corvette made 65
requests to nsi.net.kiae.su.
University of Crete Physics Dept. (www.edu.physics.uch.gr) 21 times.
* Other Science and Technology:
The Bioscan project at genome.cs.unc.edu was hit twice.
The BCD (Biological Computing Division) of the Weizmann Institute in
Israel was hit 9 times.
CSIRO Minerals, www.csiro.au, was hit 1.
The Texas Agricultural Extension Service was hit twice.
* Political:
www.tbs-sct.gc.ca the Canadian Treasury Board was hit once.
* Military:
The U.S. Army's Signal Corps was hit 13 times.
Several universities were hit as well, presumably because of a student
pages. Other miscellaneous sites that were hit include a martial arts
page, a personal interests page and a porn page.
The urls for the pages in question are included below.
If this sample of sites is representative of the connections made by
corvette, then physics sites make up the bulk of those connections.
No verifiable connections were made to crypto related sites other than my
own. I do not know why the connections were made to the universities,
I figure that it is because of student interests.
Given the nature of BXA's mission, and the sort of material that I make
available on my homepage on spice I still find it strange that the
"Cryptotechnic Enlightenment" page was passed by. This is underscored
by the fact that the "Misc." and "Unfinished" links were passed up,
even when corvette is obviously looking for crypto stuff (by getting
crypto_index.zip).
However, there is a general lack of relevent connections made to crypto
related sites by corvette on the internet as a whole. If corvette is
proxying a bot, I think that the bot may be targeted at individuals
and is not a wide-spread intelligence gathering device.
I would be interested in hearing if corvette has made connections to
crypto oriented sites. If those that run sites with crypto material could
post any connections they have had from corvette, I would appreciate it.
Michael Graffam (mgraffam at mhv.net)
- -----------------------------------------------------------------------
URLS relating to corvette.bxa.doc.gov turned up by Altavista:
http://chip.mcl.ucsb.edu/lopaka/usage/weeks/hosts/www.mcl.ucsb.edu.13.total-hosts.html
http://www.tbs-sct.gc.ca/tbsstats/tbstats/N1997-06.TXT
http://nsi.net.kiae.su/w3perl/Pays/US-Government.html
http://www.tbs-sct.gc.ca/tbsstats/tbstats/N1997-03.TXT
http://genome.cs.unc.edu/wusage/week59.html
http://dapsas.weizmann.ac.il/reports/31Oct1997.hosts.html
http://www.minerals.csiro.au/wusage/new/log.ext/log1997/sites0896.html
http://www.gordon.army.mil/usage/H1997-01.TXT
http://www.amherst.edu/~erreich/visitors.html
http://www.ufl.edu/9607-14.html
http://data.gc.peachnet.edu/APPS/WWW/USAGE/1996/H1996-07.TXT
http://data.gc.peachnet.edu/APPS/WWW/USAGE/1996/H1996-09.TXT
http://www.edu.physics.uch.gr/usage/week89.html
http://www.edu.physics.uch.gr/usage/week56.html
http://www.gordon.army.mil/usage/H1996-09.TXT (2)
http://leviathan.tamu.edu:70/0/gnlog/1996/9612/9612.hosts
http://lfowler.afternet.com/logfiles/sites0298.html
http://www.chelt.ac.uk/usage/ws970622.htm
http://www.splosh.co.uk/usage/weeks/hosts/splosh.9.total-hosts.html
http://www.ufl.edu/9803-08.html
http://www.italcultusa.org/home/_private/mailing.txt
http://lfowler.afternet.com/logfiles/sites0198.html
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
I think that we should be men first, and subjects afterward. It is not
desirable to cultivate a respect for the law, so much as for the right.
Henry David Thoreau "Civil Disobedience"
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv
iQCVAwUBNVS3VQKEiLNUxnAfAQFz2QP+Ow8vwjFYOM/tN4kcyOpxbxWbr4S6bkWv
5zBctIwWk9qWedLxHXMH67JV3AATou1aFUTXL2w4J56frkhgcPIcgjV1j7ME6y/r
qNBvysaXzTkIUu/Vj9TJeigbKWTa7YiVgLn97X/RnjfjapD62e3ejhCOurEeDSPr
6u2BFhOGAIk=
=fTJr
-----END PGP SIGNATURE-----
From wombat at mcfeely.bsfs.org Sat May 9 14:45:32 1998
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Sat, 9 May 1998 14:45:32 -0700 (PDT)
Subject: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To: <355372B4.C837F915@brainlink.com>
Message-ID:
Since you didn't specify the method of access. it is hard to determine if
this is a large security hole. Most equipment can be rebooted and brought
up without a password IF you have local access. For example, Cisco routers
can be brought up without password simply by specifying the starting
address of the load file, but you have to be at the local console to do
this.
UNIX systems can be brought up w/o password in single-user mode, if you
have local access. Yes, there are firmware passwords to guard against
this on many systems, but one can always swap up the eeprom, etc.
I'd only be worried about the 3Com backdoor if it can be used remotely.
Got any details?
-r.w.
From president at whitehouse.gov Sat May 9 17:11:32 1998
From: president at whitehouse.gov (Spam the President)
Date: Sat, 9 May 1998 17:11:32 -0700 (PDT)
Subject: U.S. Navy caught hacking into British marine charity Web site
Message-ID: <3554E2BF.5C3E2646@whitehouse.gov>
On Sat, 9 May 1998, Bill Frantz wrote:
> At 4:48 AM -0800 5/9/98, Spam the President wrote:
> >http://www.infoworld.com/cgi-bin/displayStory.pl?98058.winavy.htm
> >
> > U.S. Navy caught hacking
> > into British marine
> > charity Web site
> >
> > By Kristi Essick
> > InfoWorld Electric
> >
> > Posted at 3:07 PM PT, May 8, 1998
> > ...
> >
> > "I think whoever it was within the U.S. Navy
> > facility would have better things to do rather than
> > try and hack into our computers," said Chris
> > Stroud, the organization's director of campaigns,
> > in a statement. "If they were seeking reports on
> > the Black Sea, we shall be freely publishing these
> > in the near future anyway."
>
> Consider the possibility that someone hacked into the Navy's computer and
> then used it as a base to hack the Marine Mammal Charity site.
>
> -------------------------------------------------------------------------
> Bill Frantz | If hate must be my prison | Periwinkle -- Consulting
> (408)356-8506 | lock, then love must be | 16345 Englewood Ave.
> frantz at netcom.com | the key. - Phil Ochs | Los Gatos, CA 95032, USA
It wouldn't make any sense. Why would a hacker use a military
site that is actively monitored to hack into a site with less security?
And why the requests to get the document originating from the same
source?
Also, from what I have read, the DoD needs come first in everything,
especially Defence Security related issues. No holds barred when they
want something.
This sounds exactly like the kind of information that they would
want and consider essential, and could thus justify themselves to
get it by any means available.
Of course, if this was a hacker playing tricks to the US military,
then I'm sure we can expect the military will publish this serious
a security breach, in order to get more money to protect themselves
against any Internet terrorist attacks in the future.
But I bet there will be no public comments or explanation given.
-----
pentagon-gw-e0.nci.net (198.253.200.2)
donhq-gw.nci.net (198.253.203.11)
donhqns1.hq.navy.mil (164.224.250.80)
Trying 164.224.250.80...
Connected to 164.224.250.80.
Escape character is '^]'.
W A R N I N G W A R N I N G W A R N I N G W A R N I N G
USE OF THIS OR ANY OTHER DOD INTEREST COMPUTER SYSTEM CONSTITUTES A
CONSENT TO MONITORING AT ALL TIMES
This is a Department of Navy (DON) interest computer system. All DON
interest
computer systems and related equipment are intended for the
communication,
transmission, processing, and storage of official U.S. Government or
other
authorized information only. All DON interest computer systems are
subject
to monitoring at all times to ensure proper functioning of equipment
and
systems including security devices and systems, to prevent unauthorized
use
and violations of statutes and security regulations, to deter criminal
activity, and for other similar purposes. Any user of a DON interest
computer
system should be aware that any information placed in the system is
subject
to monitoring and is not subject to any expectation of privacy.
If monitoring of this or any other DON interest computer system reveals
possible evidence of violation of criminal statutes, this evidence and
any
other related information, including identification information about
the
user, may be provided to law enforcement officials.
If monitoring of this or any other DON interest computer system reveals
violations of security regulations or unauthorized use, employees who
violate
security regulations or make unauthorized use of DON interest computer
systems are subject to appropriate disciplinary action.
USE OF THIS OR ANY OTHER DOD INTEREST COMPUTER SYSTEM CONSTITUTES A
CONSENT TO MONITORING AT ALL TIMES
W A R N I N G W A R N I N G W A R N I N G W A R N I N G
Username:
From president at whitehouse.gov Sat May 9 17:23:13 1998
From: president at whitehouse.gov (Spam the President)
Date: Sat, 9 May 1998 17:23:13 -0700 (PDT)
Subject: NASA computers to be hacked
Message-ID: <3554E57C.36AA4BFE@whitehouse.gov>
http://www.msnbc.com/news/164582.asp
NASA computers to be �hacked�
National Security Agency wants to know if space agency�s
computers are secure enough to fend off cyber-intruders
ASSOCIATED
PRESS
WASHINGTON, May 9 � Agents from the National Security
Agency will try to break into NASA�s computers to
determine
whether the space agency can fend off cyber-intruders who
could threaten launch-control and other critical
operations, the
trade publication Defense Week reports.
THE �PENETRATION STUDY� of the National
Aeronautics and Space Administration�s
unclassified computer
networks is an effort to learn how easily
troublemakers can get
to sensitive data and what NASA�s doing about it.
Teams from the intelligence agency will
soon try to
penetrate NASA networks in up to eight states,
said the
newsletter in the edition to be published Monday.
Last June, NSA �hackers� showed they could
cripple
Pacific Command battle-management computers and
U.S.
electric power grids.
�PENETRATION STUDY�
The NASA �penetration study,� which will be
run under the
auspices of the General Accounting Office, stands
out because
it involves a U.S. civilian agency, and such
operations are
barred by the 1952 law that created NSA, the
newsletter said.
However, the law barring domestic
activities contains an
exception if the spy agency is invited to do the
work.
Still, the publication said the planned
test raised questions of
privacy.
John Pike of the Federation of American
Scientists, a
veteran observer of both NASA and the intelligence
community, told the newsletter that the NASA test
breaks new
ground and bears close watching.
�This is the next big step in NSA�s
expanding role in
domestic information security,� he said. �It�s
certainly the first
reported major initiative of this sort with
respect to a
non-military agency. While a number of safeguards
are in
place, there are concerns about the potential for
abuse of this
type of activity.�
But Charles Redmond, the space agency�s
manager of
information-technology security, said the test was
�not an
invasion of privacy.�
NASA preferred to have the intelligence
agency do the
tests because it wanted to protect security and
proprietary data
and to avoid any conflict of interest, Redmond
said.
The tests will determine how easy it is to
access sensitive
sites and whether they can be accessed through the
Internet.
From president at whitehouse.gov Sat May 9 17:52:09 1998
From: president at whitehouse.gov (Spam the President)
Date: Sat, 9 May 1998 17:52:09 -0700 (PDT)
Subject: Spy Satellite Launched
Message-ID: <3554EC42.5E33D640@whitehouse.gov>
http://www.abcnews.com/sections/science/DailyNews/rocket980508.html
C A P E C A N A V E R A L, Fla., May 8 � A
top
secret spy satellite blasted off on
Friday atop the U.S. military's most
powerful rocket booster.
The 20-story U.S. Air Force Titan 4B
rocket, carrying the classified National
Reconnaissance Office spacecraft, lifted off
its
Cape Canaveral launch pad at 9:38 p.m. EST.
The rocket's comet-like streak through the
moon-lit night sky was visible as far away as
Orlando.
According to the trade journal Aviation
Week and Space Technology, the Titan, built by
Lockheed Martin Corp., placed an electronic
eavesdropping satellite into orbit.
"It will be used to listen in on
communications in hostile areas, such as the
Middle East and North Korea," said Craig
Covault, the magazine's space technology
editor.
The rocket soared into the sky several
hours
late after a problem-plagued countdown. Air
Force launch controllers had to deal with
technical trouble at a tracking station and
high
upper-level winds.
The countdown was also disrupted by a
container ship and a small sail boat that
strayed
into the launch danger area in the Atlantic
Ocean, east of Cape Canaveral.
From vznuri at netcom.com Sat May 9 18:09:20 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Sat, 9 May 1998 18:09:20 -0700 (PDT)
Subject: nsa police & ammunition theft
Message-ID: <199805100109.SAA20181@netcom7.netcom.com>
------- Forwarded Message
From: believer at telepath.com
Subject: IP: NSA police suspected in agency thefts
Forwarded:
- -----------------
>Source: The Baltimore Sun, May 9, 1998
>http://www.sunspot.net
>
>NSA police suspected in agency thefts
>
>50,000 rounds of ammunition reported stolen; 'An active investigation'; 2
>officers allowed to resign; at least 9 others targeted
>
>By Tom Bowman
>Sun National Staff
>
>WASHINGTON -- Nearly a dozen members of the police force that guards the
>top-secret National Security Agency are suspected of stealing ammunition
>from the Fort Meade-based agency, sources and federal officials said
>yesterday.
>
>The thefts, which included up to 50,000 rounds of ammunition, represent an
>embarrassing incident for the NSA, an intelligence agency that eavesdrops
>on foreign communications and makes and breaks codes. Besides NSA
>officials, agents of the Bureau of Alcohol, Tobacco and Firearms are
>investigating the thefts.
>
>While no arrests have been made, several police officers have been
>implicated, officials said. But details about the thefts and the progress
>of the investigation remained sketchy yesterday.
>
>Larry Stewart, special agent in charge of the bureau's Baltimore office,
>declined to comment on the amount of ammunition stolen or the number of
>officers from the NSA's Security Protective Officer force who are under
>investigation.
>
>"That I can't share with you," Stewart said. "The only thing I can tell you
>is it's an active investigation, and we can't comment on that."
>
>NSA officials also declined to discuss the investigation. The agency
>released a brief statement yesterday saying it was "nearing completion on
>an investigation involving Security Protective Officers."
>
>Agency sources said two sergeants on the force have been allowed to resign
>as a result of the investigation, including one who oversaw the force's
>ammunition and weapons. At least nine other officers are under
>investigation.
>
>The sergeant who was in charge of ammunition, William R. Fabus, said he had
>resigned voluntarily on May 1 after he was questioned by agents.
>
>"I was not aware that anything was missing," said Fabus, 36, of
>Catonsville, adding that he expects no further inquiries or criminal
>charges. "I was told there was nothing criminal that I did."Fabus, a
>10-year veteran of the force, declined to say why he had abruptly resigned.
>"I don't know where I'm stepping," he said. "If I give out any information
>considered national security stuff, it would be adverse toward me."
>
>Officer named others
>
>Officials would not say when they believe the thefts began or how they were
>detected, though one former agency employee said the thefts had been
>occurring for at least two months. The source said one officer was caught
>and began implicating others.
>
>The thefts have resulted in new security procedures at the agency, sources
>said, and employees have been warned not to talk about the investigation.
>The NSA, which employs about 23,000 people at Fort Meade, is the largest
>employer in Maryland.
>
>As part of the inquiry, investigators found grenades and assault rifles,
>although neither were NSA property, sources said.
>
>"It shocked a lot of people," the former employee, who requested anonymity,
>said of the thefts. "[The officers] are not kids; they've been working
>there a long time."
>
>The uniformed police force includes several hundred officers and provides
>security at NSA's sprawling complex off the Baltimore-Washington Parkway
>and its satellite locations throughout Maryland.
>
>Top-security clearance
>
>The officers, whose average salary is about $30,000, undergo two months of
>training at a facility in Georgia with other federal police officers, and
>carry either 9 mm or 38-caliber handguns, former members of the force said.
>
>They also possess the government's top-security clearance, known as SCI for
>Sensitive Compartmented Information, the eavesdropping product that is
>among the nation's most guarded secrets.
>
>Officials would not say whether they suspect that the officers were using
>the ammunition for their own use or were selling it. FBI spokesmen and
>staffers on the congressional intelligence oversight committees said they
>were unaware of the investigation.
>
>"This is the first I've heard of it," Larry Foust, an FBI spokesman in
>Baltimore, said when called by a reporter. One top FBI official in
>Washington privately expressed surprise that the bureau had not been
>notified, considering the possible extent of the theft.
>
>Morale problems
>
>Besides the thefts, agency officials have pointed to administrative and
>morale troubles among the force. In a recent report, portions of which were
>obtained by The Sun, the agency noted tensions among the uniformed police
>supervisors, many of whom are high school graduates, and a rising number of
>college-educated officers who are being hired.
>
>"The supervisors may feel threatened by subordinates who may be brighter
>and more willing to empower themselves to make independent decisions," the
>report said.
>
>Moreover, the report said, newly hired officers have not been given a
>"realistic job preview."
>
>"It was widely believed that applicants may have been misled to believe
>that the job entailed more sophisticated and responsible police functions
>than actually take place," according to the report. "Boredom and lower
>levels of job satisfaction are believed to be widespread amongst the more
>educated [officers]."
>
>Sun staff writer Larry Carson contributed to this article.
>
>Originally published on May 8 1998
**********************************************
To subscribe or unsubscribe, email:
majordomo at majordomo.pobox.com
with the message:
subscribe ignition-point email at address
or
unsubscribe ignition-point email at address
**********************************************
------- End of Forwarded Message
From rah at shipwright.com Sat May 9 19:04:49 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 9 May 1998 19:04:49 -0700 (PDT)
Subject: corvette.bxa.doc.gov followup
In-Reply-To:
Message-ID:
I talked to Peter Cassidy yesterday.
We talked about corvette. For the record, they don't deny it's theirs, and
that it's part of their ongoing enforcement operations.
Maybe it's time to fire up your spider traps, boys and girls? I do know
that Los Alamos had one up for fun a few years ago. It was discussed on
this list about the time AltaVista got started, maybe 3 years ago...
I bet that corvette doesn't give a squalling fuck about "no-crawling" HTML
requests...
Anyone want to bet on how long it'll be some idiot in DC tries to make
spidertraps illegal?
Cheers,
Bob Hettinga
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
From your.friend at 02433.com Sat May 9 20:40:08 1998
From: your.friend at 02433.com (your.friend at 02433.com)
Date: Sat, 9 May 1998 20:40:08 -0700 (PDT)
Subject: hello
Message-ID: <99902170875.bee08056@tecrets.com>
Hey come look at your new car stereo at Stereo Surplus!
http://www.cvc.net/business/juanm/index.html
HELLO MY NAME IS ARON. WOULD YOU LIKE TO SEND EMAILS LIKE THIS?
I CHARGED $120.00 TO SEND THIS EMAIL! YOU COULD MAKE LOTS OF
MONEY EVERY DAY AT THE PUSH OF A BUTTON. DOES THAT SOUND EASY?
WELL IT IS! FOR ONLY $180.00 YOU CAN HAVE STEALTH PLUS 40 MILLION
EMAIL ADRESSES. THIS SAME PROGRAM SELLS EVERY WHERE ELSE FOR
$400-500.00! YOU CAN MAKE $400-800.00 A DAY! I ONLY DO THIS FOR ABOUT
2 HOURS AND WAIT FOR THE MONEY TO COME IN. THE BEST PART ITS ALL
LEGAL! ARE YOU INTERESTED?
EMAIL ME AT aron28 at hotmail.com I WILL REPPLY ASAP!
From a.friend at 15234.com Sat May 9 22:07:55 1998
From: a.friend at 15234.com (a.friend at 15234.com)
Date: Sat, 9 May 1998 22:07:55 -0700 (PDT)
Subject: hello
Message-ID: <75322170875.bee08056@allrets.com>
Hey come look at your new car stereo at Stereo Surplus!
http://www.cvc.net/business/juanm/index.html
HELLO MY NAME IS ARON. WOULD YOU LIKE TO SEND EMAILS LIKE THIS?
I CHARGED $120.00 TO SEND THIS EMAIL! YOU COULD MAKE LOTS OF
MONEY EVERY DAY AT THE PUSH OF A BUTTON. DOES THAT SOUND EASY?
WELL IT IS! FOR ONLY $180.00 YOU CAN HAVE STEALTH PLUS 40 MILLION
EMAIL ADRESSES. THIS SAME PROGRAM SELLS EVERY WHERE ELSE FOR
$400-500.00! YOU CAN MAKE $400-800.00 A DAY! I ONLY DO THIS FOR ABOUT
2 HOURS AND WAIT FOR THE MONEY TO COME IN. THE BEST PART ITS ALL
LEGAL! ARE YOU INTERESTED?
EMAIL ME AT aron28 at hotmail.com I WILL REPPLY ASAP!
From csvcjld at nomvs.lsumc.edu Sun May 10 05:27:19 1998
From: csvcjld at nomvs.lsumc.edu (csvcjld at nomvs.lsumc.edu)
Date: Sun, 10 May 1998 05:27:19 -0700 (PDT)
Subject: corvette.bxa.doc.gov followup
Message-ID: <19980510072523421@nomvs.lsumc.edu>
192.239.70.124 hit my ftp site on 4/13/98, the day after I announced a
program to crack simple substitution ciphers on this list. When I
announced the program, I accidently gave it an .exe extension (when it
actually had a .zip extension). 192.239.70.124 tried to get the .exe
extension and then gave up. Is it possible that 192.239.70.124 is
driven by http://infinity.nus.sg/cypherpunks?
I've since purchased a $10 article from the ACM and extended my program
to implement G.W.Hart's algorithm; the result is archived as
ftp://colbleep.ocs.lsumc.edu/pub/crypto/simplsub/win95/gwhart.zip. C
source code is included; it should compile under Unix as well as Windows
95/NT.
From sumanth at wipinfo.soft.net Sun May 10 05:58:39 1998
From: sumanth at wipinfo.soft.net (Sumanth)
Date: Sun, 10 May 1998 05:58:39 -0700 (PDT)
Subject: Hi
Message-ID: <3555A5A5.6038AB44@wipinfo.soft.net>
Hi there,
Is there anyway a mail from mix at anon.lcs.mit.edu can be tracked? If so
how..?
Awaiting a reply
sumanth
From mgraffam at mhv.net Sun May 10 13:57:32 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Sun, 10 May 1998 13:57:32 -0700 (PDT)
Subject: corvette.bxa.doc.gov followup
In-Reply-To: <19980510072523421@nomvs.lsumc.edu>
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
On 10 May 1998 csvcjld at nomvs.lsumc.edu wrote:
> 192.239.70.124 hit my ftp site on 4/13/98, the day after I announced a
> program to crack simple substitution ciphers on this list. When I
> announced the program, I accidently gave it an .exe extension (when it
> actually had a .zip extension). 192.239.70.124 tried to get the .exe
> extension and then gave up. Is it possible that 192.239.70.124 is
> driven by http://infinity.nus.sg/cypherpunks?
I would not doubt it. If I were BXA, and I wanted to keep tabs on
crypto, I'd have an eye on cypherpunks.
Does anyone know the infinity.nus.sg admins? Any chance of getting a
confirmation that corvette has hit them up?
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Two things fill the mind with ever new and increasing admiration and awe
the more often and steadily we reflect upon them: the starry heavens
above and the moral law within me. I do not seek or conjecture either of
them as if they were veiled obscurities or extravagances beyond the horizon
of my vision; I see them before me and connect them immediately with the
consciousness of my existence." - Immanuel Kant "Critique of
Practical Reason"
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv
iQCVAwUBNVYR8wKEiLNUxnAfAQGJuwP+NtOI8O9sd9oivsvnrHTOJNadBVv89fJy
xOlCpFS93ESVjk7EqJwpU25lD5+0tE3f/bgHoHD5Tv52p6kVV9wms/lElnnzOxKU
HfGdw194NQPxvCdIfW11WW46Wl+NiUAgZ5clh6+uI+nC3fAHKxxemwflF/HRCmSb
0egTVVVseN4=
=dXfd
-----END PGP SIGNATURE-----
From billp at nmol.com Sun May 10 15:26:06 1998
From: billp at nmol.com (bill payne)
Date: Sun, 10 May 1998 15:26:06 -0700 (PDT)
Subject: What Does Crash Mean? and Motion to Amend Order
Message-ID: <35562898.2B92@nmol.com>
Sunday 5/10/98 3:49 PM
J Orlin Grabbe
John Young
Orlin, u 5/10/98 Albuquerque Journal
What Does �Crash� Mean? Hang Around
William Pfaff
Syndicated Columnist
PARIS - A friend said to me the other day that the word �crash�
no longer is part of the American vocabulary. We only know stock
market �correction,� and corrections have just be waited out.
He explained to me that the stock market only goes up, because
immense popular and political interests, as well as corporate
interests
are today committed to its only going up. His implied argument was
that the
American government has no choice but to make it go up.
It struck me, as he was peaking, that this might have been what Jay
Gatsby
was saying to his friends during the luxurious summer of 1929, a few
months
before Gatsby disappeared off the end of that dock in West Egg, on
Long
Island Sound, or went back to the Middle West - if it was the Middle
West -
which, for Gatsby, would have been worse. But I am a child of the
Depression. ...
Pfaff concludes
I would stick with an older American assumption, that if something
seems too
good to be true, it probably is.
Accompanying picture by NANCY OHANIAN/ LOS ANGLES TIMES SYNDICATE
has a bull pictured precariously perched atop a pinnacle ... with rocks
falling around its
feet.
John I just saw
Payne-Morales v. NSA: Motion to Amend Order May 9, 1998
and
Froomkin on Payne-Morales Motion to Amend Order May 9, 1998 at
http://www.jya.com/crypto.htm
But I will not read them until Monday.
Let�s all hope someone sees the importance of posting the requested
documents on Internet.
Then settling this unfortunate mess.
Later
bill
From 83398.advsr at msn.com Sun May 10 15:55:25 1998
From: 83398.advsr at msn.com (83398.advsr at msn.com)
Date: Sun, 10 May 1998 15:55:25 -0700 (PDT)
Subject: The information as requested -40730
Message-ID: <199805102254.PAA21804@toad.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 17483 bytes
Desc: not available
URL:
From rah at shipwright.com Sun May 10 16:37:54 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Sun, 10 May 1998 16:37:54 -0700 (PDT)
Subject: First meeting of DCS-NY -- The Digital Commerce Society of NewYork
Message-ID:
--- begin forwarded text
To: dcs-ny-rsvp at piermont.com
Subject: First meeting of DCS-NY -- The Digital Commerce Society of New York
Reply-To: perry at piermont.com
X-Reposting-Policy: redistribute only with permission
Mime-Version: 1.0 (generated by tm-edit 7.108)
From: "Perry E. Metzger"
Date: 10 May 1998 18:30:48 -0400
Lines: 31
[You are getting this either because you are either someone who
I think would be interested in this announcement, or because you are
on a mailing list devoted to issues related to electronic commerce. To
prevent people from accidentally replying to the whole list, I've
bcc'ed the recipients.
Please feel free to forward this message to other interested
individuals.]
As some of you probably know, Robert Hettinga has been running a group
called the Digital Commerce Society of Boston for some time now. DCSB
meets once a month for lunch at the Harvard Club in Boston to hear a
speaker and discuss the implications of rapidly emerging internet and
cryptographic technologies on finance and commerce -- "Digital
Commerce", in short.
Interest has been expressed in starting a similar organization here in
New York. I'm therefore pleased to announce the initial meeting of the
Digital Commerce Society of New York (DCS-NY). We intend to meet the
second Tuesday of each month for lunch, probably at the Harvard Club
in New York, and conduct meetings much like those of DCSB.
If you are interested in attending our first luncheon meeting, which
will be held on June 9th, or if you wish to be informed of future
meetings by e-mail please send an RSVP to "dcs-ny-rsvp at piermont.com"
We will send out an announcement in about another week informing
people of the final choice of venue and the cost for the lunch.
Perry
--- end forwarded text
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
From sunder at brainlink.com Sun May 10 18:00:11 1998
From: sunder at brainlink.com (Sunder)
Date: Sun, 10 May 1998 18:00:11 -0700 (PDT)
Subject: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To:
Message-ID: <35564609.D3F85D5A@brainlink.com>
It is remote access - via telnet!
Rabid Wombat wrote:
>
> Since you didn't specify the method of access. it is hard to determine if
> this is a large security hole. Most equipment can be rebooted and brought
> up without a password IF you have local access. For example, Cisco routers
> can be brought up without password simply by specifying the starting
> address of the load file, but you have to be at the local console to do
> this.
>
> UNIX systems can be brought up w/o password in single-user mode, if you
> have local access. Yes, there are firmware passwords to guard against
> this on many systems, but one can always swap up the eeprom, etc.
>
> I'd only be worried about the 3Com backdoor if it can be used remotely.
> Got any details?
>
> -r.w.
--
=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run |\/|\/
../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were.... |.....
======================= http://www.sundernet.com ==========================
From die at pig.die.com Sun May 10 19:39:38 1998
From: die at pig.die.com (Dave Emery)
Date: Sun, 10 May 1998 19:39:38 -0700 (PDT)
Subject: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To:
Message-ID: <19980510223401.C22003@die.com>
On Sun, May 10, 1998 at 08:27:53PM -0400, Sunder wrote:
> It is remote access - via telnet!
>
This is not that uncommon. We implemented such a backdoor in a
router I worked on the design of some years ago. The magic password
was a function of the model and serial number of the machine (not as I
remember a very strong hash either), and different for all boxes. We
(or rather the marketing and support people) felt that leaving a
customer who forgot his password with no option but reset the router to
its factory defaults was more undesirable than providing a potential
attack point for sophisticated hackers and spooks - the problem being
that there was often days of work in setting up the configuration and
getting it right, and if the customer did not have a good backup forcing
him to destroy all of his hard won setup just because he couldn't
remember which wife's name he used as the password wasn't a good deal.
And from a support point of view, helping the turkey to get everything
right again was very expensive and painful, whereas leaving a hole for
a possible sophisticated attacker was not something that cost support
very much even if some bad guy used it to do real damage.
I think most if not all uses of our backdoor were handled by
having someone in our customer support login to the machine and
restablish a password or give the customer the specific master password
for his box - I don't think we ever gave anyone the hash.
I suspect that a large fraction of alarms, security systems,
pbxs and the like incorperate such backdoors for precisely the same
kinds of reasons - it is simply too catastrophic to reset everything
if someone forgets the password. I know several commercial Unixes
had such backdoors in them for emergency access years ago, and wouldn't
be overwhelmingly surprised if some current OS's still have magic backdoors.
Of course these holes are dangerous, as it is not beyond possible
for someone with serious criminal intentions to obtain a copy of your product
and slog through the EPROMS/flash memory with a disassembler and determine
the magic algorithm which may give him access to all other machines running
the same basic code, especially if he has some method of poking around
in memory of his target machine or predicting such things as its secret
serial numbers.
--
Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
From frantz at netcom.com Sun May 10 20:59:51 1998
From: frantz at netcom.com (Bill Frantz)
Date: Sun, 10 May 1998 20:59:51 -0700 (PDT)
Subject: U.S. Navy caught hacking into British marine charity Web site
In-Reply-To: <3554E2BF.5C3E2646@whitehouse.gov>
Message-ID:
At 3:11 PM -0800 5/9/98, Spam the President wrote:
>It wouldn't make any sense. Why would a hacker use a military
>site that is actively monitored to hack into a site with less security?
Consider the wonderful irony of hacking into some site and having the blame
go somewhere else.
Consider a somewhat different circumstance. I was recently in Organ Pipe
Cactus National Monument. The southern border of the monument runs across
the US/Mexico border. One of the stops on the tourist drive around the
monument is a parking lot 40 feet from a broken gate in the fence that
marks the border. There is a large sign there suggesting that people not
leave their cars because of recent breakins. There was also broken auto
glass on the ground.
Now, if I were breaking into cars, I would pick that parking lot, rather
than others further north, in hopes that everyone would blame the Mexicans.
Don't think I am sure that the Mexicans are not responsible, just that I
see a chance for some US lowlifes to deflect the blame.
I see the same opportunity in using a hacked Navy computer to hack a marine
mammal site. It may be the Navy, or it may be a hacker with a polished
sense of irony.
-------------------------------------------------------------------------
Bill Frantz | If hate must be my prison | Periwinkle -- Consulting
(408)356-8506 | lock, then love must be | 16345 Englewood Ave.
frantz at netcom.com | the key. - Phil Ochs | Los Gatos, CA 95032, USA
From 79126992 at 00195.com Sun May 10 22:31:02 1998
From: 79126992 at 00195.com (79126992 at 00195.com)
Date: Sun, 10 May 1998 22:31:02 -0700 (PDT)
Subject: Mail Your Message to Millions
Message-ID: <19970350058.CAA990557@90009COMLINKNET.COM>
received: from invooc.com ([207.28.502.416]) by nnbfgwzz345.comlinkcom.net
(Intermail v3.1 177 234) with SMTPid <199803230830.aqwwe122 at bell.net>
for ; Fri, 6 Feb 1998 05:08:30 +0000
Received: (qmail 9695 invoked by ter 0); 3 Apr1998 05:08:29 -0000
Message-ID: <19980323829.9694.qmail at tonight.com>
Received: from 149.107.252.10 by www.msn.com with HTTP;
Thu, 05 Feb 1998 21:08:29 PSTX-Originating-IP: [153.145.252.17]
From: "Damion Potter"
To: prede568qukdd8 at bellsouth.net
Cc: flexal5yyt7876l at prodigy.net
Subject: Fw: please
Content-Type: text/plain
Date: Thu, 05 Feb 1998 21:08:29 PST
Tired of NOT making money on the internet?
Did you REALLY believe that ALL you had to do was:
Put up a web page somewhere in Cyberspace with beautiful graphics,
the latest Java and some frames;
Advertise in a few free classifieds;
Act like an expert in newsgroups; since you're not
supposed to advertise in them;
And, customers were going to beat a path to your door.
If you believed that-
BOY, have I got some swampland in Florida for you!
If you want to make money on the internet,
YOU'D better be PROACTIVE!
YOU'D better go after business like you MEAN IT!
YOU'D better send some E-MAIL - Lots of it!
And YOU'D better tell your story as much as you can,
as often as you can,
to whomever you can!
WELCOME TO THE REAL WORLD.
Bulk e-mail works!
If you know how to write an ad,
identify a need, and fullfill it with your product,
you can make money on the Internet
EVEN on a very limited budget.
This form of advertising has been proven MUCH MORE EFFECTIVE
than other forms of advertising because people read their e-mail.
And, the message will wait in the recipient's e-mail box until it is
read. Your message is SEEN not buried!
Your business deserves a piece of the fastest growing industry in the
U.S.- THE HOME-BASED BUSINESS INDUSTRY ( $427 billion in annual
sales). Internet sales are projected to be over $10 billion by the
year 2000, up from $300 million in 1994.
We've got the addresses YOU need.
A Web site alone, posting through newsgroups and registering with a
few search engines while placing a few classifieds just won't work.
What good is a Web page no one knows is there?
Bulk e-mailing is the lowest-cost method of generating qualified sales leads,
On average, a solo direct (snail) mail promotion would cost around
$500.00 per thousand, whereas bulk e-mail costs pennies per thousand. No
known form of media advertising can compete with the low cost of bulk e-mail.
Our e-mail lists are maintained on state-of-the-art computers and are
updated daily to assure you the very latest names for your mailings.
Bulk Email Works!!
Put your sales message in front of responsive buyers. Our lists are
compiled from active and willing on-line purchasers and entrepreneurs.
THESE ARE SERIOUS CUSTOMERS LOOKING FOR SERIOUS OFFERS!
These BUYERS want to read and hear more about your products/services.
Our list is updated daily with fresh and new email addresses.
Even if you receive 1/10 of 1% response for mailing 1,000,000 email
addresses you would receive 1000 replies !!!!
How much money would you make?
Save TIME and MONEY! Make money on the seat of your Pants! Focus
entirely on your sales. Let us do your mailing for you at these
INCREDIBLY LOW RATES:
_____YES- mail my message to 50,000 responsive buyers for $49.95
_____YES- mail my message to 100,000 responsive buyers for $89.95
_____YES- mail my message to 250,000 responsive buyers for $199.95
_____YES- mail my message to 500,000 responsive buyers for $359.95
_____YES- mail my message to 1,000,000 responsive buyers for $679.95
_____YES- mail my message to 2,000,000 responsive buyers for $1299.95
*************** WE SPECIALIZE IN TARGETED MAILINGS - CALL FOR DETAILS***************
_____YES- mail my message to 5,000 targeted buyers for $79.95
_____YES- mail my message to 10,000 targeted buyers for $119.95
_____YES- mail my message to 15,000 targeted buyers for $154.95
_____YES- mail my message to 20,000 targeted buyers for $184.95
_____YES- mail my message to 30,000 targeted buyers for $244.95
_____YES- mail my message to 40,000 targeted buyers for $299.95
_____YES- mail my message to 50,000 targeted buyers for $349.95
Type of business or people you need to target __________________________
_________________________________________________________________
We MAIL, MAIL, MAIL-
YOU SELL, SELL, SELL.
REMEMBER:
Get 1/10 of 1% and from a mailing of 1,000,000 email addresses
and you get 1000 replies!!!
Would you make any money?
We take CHECKS BY FAX
get our most up to date list mailed for YOU by ordering NOW ! !
Call 407-956-1151 to order by phone or Fax your order to 407-952-7984
Office hours are Mon-Fri 10 am - 6 pm Eastern Standard Time.
Make checks or money order payable to: PICC
Or mail check or money order to:
Progressive Internet Communications, Co.
P.O. Box 100512
Palm Bay, Florida 32910-0512
ORDER YOUR MAILING PROGRAM TODAY ! !
ORDER FORM
========================================================
Name___________________________________________
Address__________________________________________
City______________________State_________Zip_______
E-Mail Address____________________________________
Phone___________________________________________
Business phone____________________________________
Check Ordering info:
Name( exactly as it appears on check)
______________________________________________________
Check number_______________Dollar Amount_________________
**Fraction Code(numbers that appear below check number on top right)
(do not leave blank-ex:123-45/6789)__________________________
Numbers at Bottom of check(read left to right please indicate blank spaces
with a space)____________________________________________
Bank Name_____________________________________________
Bank Address____________________________________________
Bank City/Bank Zip Code___________________________________
Bank phone # (if applicable)_________________________________
____________________________________________________
== TAPE CHECK HERE ==
____________________________________________________
From global202 at yahoo.com Mon May 11 03:02:44 1998
From: global202 at yahoo.com (global202 at yahoo.com)
Date: Mon, 11 May 1998 03:02:44 -0700 (PDT)
Subject: The Internet Success ToolBox
Message-ID: <>
Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
remove98 at yahoo.com
You will be removed promptly.
*****************************************************************
"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!
This is what you will receive on CD-ROM:
1. Submit Spider Software - Professional Version ($99.90 value) -
The new and improved version just released. Created specifically
to meet the needs of those who want their web pages to get
NOTICED and placed in the TOP of the Search Engines! This
software automates the process of submitting your site and
uses powerful technology to get your site listed in the TOP positions.
2. Stealth Mass Mailer ($399.00 value) - This unique, first of
it's kind - software that allows you to easily send 250,000 e-mail
messages an hour. Simply enough by making a single
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.
This, easy to use, software is designed for the basic computer
user to understand. It's as easy as imputing the mail server,
selecting the list of e-mail recipients to send to, inserting your
e-mail address, adding your subject line, selecting your sales
letter, and pressing send.
3. E-Mail Pro Extractor ($350.00 value) - This one of a kind software
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of
e-mail addresses by domain names.
The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum
messages, or data from the member directory. Each of these
files are filled with e-mail addresses.
4. Check Deposit System ($125.00 value) - Check Deposit System
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary.
5. 16 Million E-mail Addresses ($149.00 value) - We took a total of
over 92 million e-mail addresses from many of the touted CD's that
are out there (bought them all - some were $300+)! We added the
millions we had in storage to those. When we combined them all,
we had in excess of 100+ million addresses in one huge file.
We then ran a super "sort/de-dupe" program against this
huge list. It cut the file down to less than 25 million!!
We then ran a program that contained 150+ keywords to
remove addresses with vulgarity, profanity, sex-related
names, postmaster, webmaster, flamer, abuse, spam,
etc...Also we eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!
So, you see, our list will save people hundreds of
dollars buying all others that are out there on CD. Using
ours will be like using the 100+ million that we started with,
but a lot less money and a lot less time!
If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following
awesome bonuses absolutely FREE.
A value of over $600.00 !!!
To order:
____ YES! I'm bursting with anticipation! Please send me "The
Internet Success Toolbox" so I can start advertising my business to
"millions of people" - absolutely FREE! I'm anxious to see how others
are creating immediate "cash-flow explosions", and eliminating most of
their advertising and marketing costs - and how I can do the same!
Enclosed is $395.
____ YES AGAIN! Because I'm responding within 7 days, I will receive
6 BONUSES with a total value of $663.90 - absolutely FREE! They include:
BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!
BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and
internet cash flow heaven!
BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified
Ad Sites on the Internet" - a virtual GOLDMINE!
BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your
Business on Automatic Pilot and Turn Your Marketing System Into a
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even
When You Don't!!"
BONUS #5 ($195 value): Unlimited technical support. Even though
"The Internet Success Toolbox" will be simple to use, it's great to
know support is always available - if and when you really need it!
And last but not least . . . .
BONUS #6 ($175 value): Order within 7 days and I'll also throw in a
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE
lodging at one of over 30 "premier" resorts.
Some vacation spots you can choose from include: Hawaii; Orlando,
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!
Hey, when you start making a TON of money, you'll wanna do some
celebrating, won't you? So start packing those bags!
That's it. A lot more than you bargained for isn't it?
When you total all the goodies up, you're looking as a total value of
$663.90! All yours - absolutely FREE - with your purchase of our amazing
package "The Internet Success Toolbox " for only $395.00.
And I'll even pay for shipping your package. You can have it in days. And
start making money THE VERY SAME DAY!
Anyway, I have a copy right here on my desk reserved for you. All I need
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.
Name _____________________________________________________
Street Address ____________________________________________
City)__________________State_______Zip_____________
Phone # (_____) ___________________________
Fax # (______) _____________________
E-mail Address _________________________
___Visa ___MasterCard
Total:$________
Account Number_____________________
Expiration Date____________________
I understand that all sales are final.
____________________________________
Signature
To order by check:
***********************************************************
Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.
(We are able to perform this service using our
Check Deposit System Software)
************************************************************
* Orders by Credit Card are shipped IMMEDIATELY.
Fax completed order form to: (425) 379-9722
* Orders by personal, business or credit card CHECK are shipped in 7-10
business days.
* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK or MONEY ORDER are
shipped IMMEDIATELY. Mail to:
SYS
11014 19th Ave SE Suite 305
Everett, WA 98208.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From global202 at yahoo.com Mon May 11 03:02:44 1998
From: global202 at yahoo.com (global202 at yahoo.com)
Date: Mon, 11 May 1998 03:02:44 -0700 (PDT)
Subject: The Internet Success ToolBox
Message-ID: <>
Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
remove98 at yahoo.com
You will be removed promptly.
*****************************************************************
"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!
This is what you will receive on CD-ROM:
1. Submit Spider Software - Professional Version ($99.90 value) -
The new and improved version just released. Created specifically
to meet the needs of those who want their web pages to get
NOTICED and placed in the TOP of the Search Engines! This
software automates the process of submitting your site and
uses powerful technology to get your site listed in the TOP positions.
2. Stealth Mass Mailer ($399.00 value) - This unique, first of
it's kind - software that allows you to easily send 250,000 e-mail
messages an hour. Simply enough by making a single
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.
This, easy to use, software is designed for the basic computer
user to understand. It's as easy as imputing the mail server,
selecting the list of e-mail recipients to send to, inserting your
e-mail address, adding your subject line, selecting your sales
letter, and pressing send.
3. E-Mail Pro Extractor ($350.00 value) - This one of a kind software
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of
e-mail addresses by domain names.
The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum
messages, or data from the member directory. Each of these
files are filled with e-mail addresses.
4. Check Deposit System ($125.00 value) - Check Deposit System
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary.
5. 16 Million E-mail Addresses ($149.00 value) - We took a total of
over 92 million e-mail addresses from many of the touted CD's that
are out there (bought them all - some were $300+)! We added the
millions we had in storage to those. When we combined them all,
we had in excess of 100+ million addresses in one huge file.
We then ran a super "sort/de-dupe" program against this
huge list. It cut the file down to less than 25 million!!
We then ran a program that contained 150+ keywords to
remove addresses with vulgarity, profanity, sex-related
names, postmaster, webmaster, flamer, abuse, spam,
etc...Also we eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!
So, you see, our list will save people hundreds of
dollars buying all others that are out there on CD. Using
ours will be like using the 100+ million that we started with,
but a lot less money and a lot less time!
If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following
awesome bonuses absolutely FREE.
A value of over $600.00 !!!
To order:
____ YES! I'm bursting with anticipation! Please send me "The
Internet Success Toolbox" so I can start advertising my business to
"millions of people" - absolutely FREE! I'm anxious to see how others
are creating immediate "cash-flow explosions", and eliminating most of
their advertising and marketing costs - and how I can do the same!
Enclosed is $395.
____ YES AGAIN! Because I'm responding within 7 days, I will receive
6 BONUSES with a total value of $663.90 - absolutely FREE! They include:
BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!
BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and
internet cash flow heaven!
BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified
Ad Sites on the Internet" - a virtual GOLDMINE!
BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your
Business on Automatic Pilot and Turn Your Marketing System Into a
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even
When You Don't!!"
BONUS #5 ($195 value): Unlimited technical support. Even though
"The Internet Success Toolbox" will be simple to use, it's great to
know support is always available - if and when you really need it!
And last but not least . . . .
BONUS #6 ($175 value): Order within 7 days and I'll also throw in a
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE
lodging at one of over 30 "premier" resorts.
Some vacation spots you can choose from include: Hawaii; Orlando,
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!
Hey, when you start making a TON of money, you'll wanna do some
celebrating, won't you? So start packing those bags!
That's it. A lot more than you bargained for isn't it?
When you total all the goodies up, you're looking as a total value of
$663.90! All yours - absolutely FREE - with your purchase of our amazing
package "The Internet Success Toolbox " for only $395.00.
And I'll even pay for shipping your package. You can have it in days. And
start making money THE VERY SAME DAY!
Anyway, I have a copy right here on my desk reserved for you. All I need
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.
Name _____________________________________________________
Street Address ____________________________________________
City)__________________State_______Zip_____________
Phone # (_____) ___________________________
Fax # (______) _____________________
E-mail Address _________________________
___Visa ___MasterCard
Total:$________
Account Number_____________________
Expiration Date____________________
I understand that all sales are final.
____________________________________
Signature
To order by check:
***********************************************************
Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.
(We are able to perform this service using our
Check Deposit System Software)
************************************************************
* Orders by Credit Card are shipped IMMEDIATELY.
Fax completed order form to: (425) 379-9722
* Orders by personal, business or credit card CHECK are shipped in 7-10
business days.
* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK or MONEY ORDER are
shipped IMMEDIATELY. Mail to:
SYS
11014 19th Ave SE Suite 305
Everett, WA 98208.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From rah at shipwright.com Mon May 11 05:29:14 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Mon, 11 May 1998 05:29:14 -0700 (PDT)
Subject: DCSB: Michael Baum; PKI and the Commercial CA
Message-ID:
--- begin forwarded text
X-Sender: rah at pop.sneaker.net
Mime-Version: 1.0
Date: Mon, 11 May 1998 07:23:28 -0400
To: dcsb at ai.mit.edu, dcsb-announce at ai.mit.edu
From: Robert Hettinga
Subject: DCSB: Michael Baum; PKI and the Commercial CA
Sender: bounce-dcsb at ai.mit.edu
Precedence: bulk
Reply-To: Robert Hettinga
-----BEGIN PGP SIGNED MESSAGE-----
[Because Mr. Baum became ill at the last minute this February, we have
rescheduled him for the upcoming DCSB meeting... --RAH]
The Digital Commerce Society of Boston
Presents
Michael S. Baum
VeriSign, Inc.
PKI Requirements
from a
Commercial CA's Perspective
Tuesday, June 2, 1998
12 - 2 PM
The Downtown Harvard Club of Boston
One Federal Street, Boston, MA
Requirements for the provision of commercial certification products and
services are under consideration by many companies. Similarly, efforts to
regulate certification authorities (CAs) and public key infrastructure (PKI)
are proliferating by many domestic and foreign governments. Underlying many
of these efforts is the intention to assess and assure quality and
trustworthiness, and yet the nature, scope and regime to accomplish these
goals remain elusive or at least have been balkanized.
This presentation will consider CA and PKI requirements from the experiences
and perspective of a commercial CA. It will survey current approaches to
ascertaining quality and performance as well as their limitations. It will
then propose a path forward. Many of these issues are present real
challenges to both the CAs and the user community. A lively dialog is
welcomed.
Michael S. Baum is Vice President of Practices and External Affairs,
VeriSign, Inc. His responsibilities include developing practices and
controls under which VeriSign conducts its public Digital ID and private
label certificate operations.
Mr. Baum is the Chair of the Information Security Committee, and Council
Member of the Section of Science and Technology, of the American Bar
Association. He is Chairman of the International Chamber of Commerce (ICC)
ETERMS Working Party and a Vice Chairman of the ICC's Electronic Commerce
Project, a delegate to the United Nations Commission on International Trade
Law on behalf of the ICC. He is a member of various digital signature
legislative advisory committees.
Mr. Baum is co-author (with Warwick Ford) of Secure Electronic Commerce
(Prentice Hall, 1997), author of Federal Certification Authority Liability
and Policy - Law and Policy of Certificate-Based Public Key and Digital
Signatures (NIST, 1994), co-author of Electronic Contracting, Publishing and
EDI Law (Wiley Law Publications, 1991), and contributing author to EDI and
the Law (Blenheim Online, 1989), and the author of diverse information
security publications including the first American articles on EDI law. He
was honored as an EDI Pioneer in 1993 (EDI Forum) and was the Recipient of
the National Notary Association's 1995 Achievement Award. He is a member of
the Massachusetts Bar.
This meeting of the Digital Commerce Society of Boston will be held on
Tuesday, June 2, 1998, from 12pm - 2pm at the Downtown Branch of the
Harvard Club of Boston, on One Federal Street. The price for lunch is
$32.50. This price includes lunch, room rental, various A/V hardware, and
the speaker's lunch. ;-). The Harvard Club *does* have dress code: jackets
and ties for men (and no sneakers or jeans), and "appropriate business
attire" (whatever that means), for women. Fair warning: since we purchase
these luncheons in advance, we will be unable to refund the price of your
lunch if the Club finds you in violation of the dress code.
We will attempt to record this meeting for sale on CD/R, and to put it on
the web in RealAudio format, at some future date.
We need to receive a company check, or money order, (or, if we *really* know
you, a personal check) payable to "The Harvard Club of Boston", by Saturday,
May 30th, or you won't be on the list for lunch. Checks payable to
anyone else but The Harvard Club of Boston will have to be sent back.
Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The Harvard
Club of Boston", in the amount of $32.50. Please include your e-mail
address, so that we can send you a confirmation
If anyone has questions, or has a problem with these arrangements (We've had
to work with glacial A/P departments more than once, for instance), please
let us know via e-mail, and we'll see if we can work something out.
Upcoming speakers for DCSB are:
July Rodney Thayer IPSEC and Digital Commerce
August TBA
September TBA
October Peter Cassidy Intellectual Property Rights Management
TBA Jeremey Barrett Digital Bearer Settlement
We are actively searching for future speakers. If you are in Boston on the
first Tuesday of the month, and you would like to make a presentation to the
Society, please send e-mail to the DCSB Program Commmittee, care of Robert
Hettinga, .
For more information about the Digital Commerce Society of Boston, send
"info dcsb" in the body of a message to . If
you want to subscribe to the DCSB e-mail list, send "subscribe dcsb" in the
body of a message to .
We look forward to seeing you there!
Cheers,
Robert Hettinga
Moderator,
The Digital Commerce Society of Boston
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQEVAwUBNVbff8UCGwxmWcHhAQFEcwgAq7w35o/XmKxTL7k3vQOtAtCVCiGUH3Ow
FUIP2B2riGNTGaCsTO3gliuK0nulXq/9qKjqYXmmg6P0tmMuLHXFgq3rxP284rUg
hfqU/7hswJHjwPFzuwu9BbKEd2pG6ryY3epsEsNpenAlxfbChJJ0E6Y8L/yQh6FX
qxB2L5gxf3POOT0/HiSDORemtHp7dKonsCC7yFGvERTda+byAE7ypFQoVFn14gt0
2cDDCX2yynrCozD4aTHIOxwli2bsenTHIzyLY9I5V3gHkCUBf1ocXuiqrfIy8jHR
4ibg0VAvN5Fbnc363iqIGrLdcVJYb46Nc/3EvPqr67ImIySeiKDMXA==
=ilR4
-----END PGP SIGNATURE-----
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
For help on using this list (especially unsubscribing), send a message to
"dcsb-request at ai.mit.edu" with one line of text: "help".
--- end forwarded text
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
From jcea at argo.es Mon May 11 06:04:34 1998
From: jcea at argo.es (=?iso-8859-1?Q?Jes=FAs?= Cea =?iso-8859-1?Q?Avi=F3n?=)
Date: Mon, 11 May 1998 06:04:34 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
Message-ID: <35571323.D109A0D2@argo.es>
You can have chaffing & winnowing without bandwidth overhead, but the
resulting scheme hasn't the original "elegance" anymore. In particular,
you don't send the plaintext on the clear.
The new schema is useful to cypher a document using any standard
signature library, exportable by definition. Very nice :), since you can
use, at last, strong crypto :).
a) When the connection starts, negociate an initial sequence number.
The sequence number mustn't be reused. We assume a ordered delivery,
like TCP.
b) Calculate the signature for:
[sequence]0 -> MAC0
and
[sequence]1 -> MAC1
c) Compare both MACs and locate the first "different" bit,
from high to low bit or viceversa.
d) Send that bit from MAC0 if you want to send a "0" or from
MAC1 if you want to send a "1".
--
Jesus Cea Avion _/_/ _/_/_/ _/_/_/
jcea at argo.es http://www.argo.es/~jcea/ _/_/ _/_/ _/_/ _/_/ _/_/
_/_/ _/_/ _/_/_/_/_/
PGP Key Available at KeyServ _/_/ _/_/ _/_/ _/_/ _/_/
"Things are not so easy" _/_/ _/_/ _/_/ _/_/ _/_/ _/_/
"My name is Dump, Core Dump" _/_/_/ _/_/_/ _/_/ _/_/
"El amor es poner tu felicidad en la felicidad de otro" - Leibnitz
From sunder at brainlink.com Mon May 11 07:55:43 1998
From: sunder at brainlink.com (Sunder)
Date: Mon, 11 May 1998 07:55:43 -0700 (PDT)
Subject: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To:
Message-ID: <35571029.EBEB4953@brainlink.com>
Dave Emery wrote:
> This is not that uncommon. We implemented such a backdoor in a
> router I worked on the design of some years ago. The magic password
> was a function of the model and serial number of the machine (not as I
> remember a very strong hash either), and different for all boxes. We
> (or rather the marketing and support people) felt that leaving a
> customer who forgot his password with no option but reset the router to
> its factory defaults was more undesirable than providing a potential
> attack point for sophisticated hackers and spooks
This is still unexcusable. It would have been just as simple to include a
hidden reset switch in a pannel somewhere that would zap all the passwords
on the router without zapping the config, and maybe send some alarms out
via SNMP incase it wasn't something that was wanted.
That would be something the client could do themselves without opening
security holes.
> I suspect that a large fraction of alarms, security systems,
> pbxs and the like incorperate such backdoors for precisely the same
> kinds of reasons - it is simply too catastrophic to reset everything
> if someone forgets the password. I know several commercial Unixes
> had such backdoors in them for emergency access years ago, and wouldn't
> be overwhelmingly surprised if some current OS's still have magic backdoors.
That doesn't mean that the ankle biters won't find them. For example, I could
put a sniffer on the network coming into the router and call up tech support
and say "Hi" I lost my password, here's my IP address, help, help.
I can then do the same thing a week later with the same router incase the
hash is time dependant, and then later with another router with a different
serial number, and I'll have much info to get started on how your hash works.
Piece of cake.
> Of course these holes are dangerous, as it is not beyond possible
> for someone with serious criminal intentions to obtain a copy of your product
> and slog through the EPROMS/flash memory with a disassembler and determine
> the magic algorithm which may give him access to all other machines running
> the same basic code, especially if he has some method of poking around
> in memory of his target machine or predicting such things as its secret
> serial numbers.
Yep.
--
=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run |\/|\/
../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were.... |.....
======================= http://www.sundernet.com ==========================
From movits at syndata.com Mon May 11 09:08:09 1998
From: movits at syndata.com (Mordechai Ovits)
Date: Mon, 11 May 1998 09:08:09 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <35572194.51CDC872@syndata.com>
Jes�s Cea Avi�n wrote:
>
> You can have chaffing & winnowing without bandwidth overhead, but the
> resulting scheme hasn't the original "elegance" anymore. In particular,
> you don't send the plaintext on the clear.
>
> The new schema is useful to cypher a document using any standard
> signature library, exportable by definition. Very nice :), since you can
> use, at last, strong crypto :).
>
> a) When the connection starts, negociate an initial sequence number.
> The sequence number mustn't be reused. We assume a ordered delivery,
> like TCP.
>
> b) Calculate the signature for:
>
> [sequence]0 -> MAC0
>
> and
>
> [sequence]1 -> MAC1
>
> c) Compare both MACs and locate the first "different" bit,
> from high to low bit or viceversa.
>
> d) Send that bit from MAC0 if you want to send a "0" or from
> MAC1 if you want to send a "1".
On the contrary, it has an elegance all it's own :-).
Since this idea has gone through several iterations, starting from Ron's original paper, I wanted to
summarize in one place Jesus Cea Avion's idea. All credit for the following technique goes to him.
Alice does this:
Mreal = MAC(serial number, message bit, key)
Mfake = MAC(serial number, complement of message bit, key)
In english: She MACs both the bit she means, and then MACs the bit she does NOT mean. She then compares
the two MACs to find the first different bit. Then she sends to Bob the bit from Mreal in the position of
difference.
When Bob gets the bit, he does this:
Ma = MAC(serial number, 0, key)
Mb = MAC(serial number, 1, key)
He then compares Ma to Mb and finds the first difference. The bit in the position of difference is the one
that was sent to him by Alice. He then knows whether Ma or Mb is correct. If Ma is the correct one then
the plaintext bit is 0, if Mb is the correct one then the plaintext bit is 1.
Remember that there is no need to send the serial number, but you MUST use it in the MAC. If you are using
a reliable protocol like TCP, or storing it in a file, the serial number is implied by the order it was
received/stored.
However clever this technique is (and it *is* clever), it defeats the original purpose of Ron's idea. The
original reason Ron created chaffing and winnowing was to show that encryption laws are useless. He
demonstrated that you can use authentication technologies to create privacy. Even more, even if the
government demands that the plaintext be in the open, his original paper was set up to pass even that
egregious requirement. Think of what the govenrnment would see with this latest chaffing and winnowing.
Two people are send a bitstream that is unreadable without a secret key. No plaintext is visible. In
fact, it bears very little resemblance to the name "chaffing and winnowing." It would not matter to them
wether you were using DES, IDEA, or C&W. If it looks like a duck, walks like a duck, and quacks like a
duck...
Another point of Ron's paper was that any technique the government tried to impose on C&W would create
unacceptable problems. I dont think these problems would exist in this version of C&W. Anyone know
better?
--
o Mordy Ovits
o Programmer / Cryptographer
o SynData Technologies Inc.
o Download A Free Copy Of Our Software At:
o http://www.syncrypt.com
From Sable1949 at aol.com Mon May 11 09:25:28 1998
From: Sable1949 at aol.com (Sable1949)
Date: Mon, 11 May 1998 09:25:28 -0700 (PDT)
Subject: Last Chance
Message-ID: <7c5a0890.35571269@aol.com>
If you wish to be removed, Reply with "REMOVE" as the subject.
The Virtual Girlfriend and Virtual Boyfriend are artificial intelligence
programs for your IBM PC or compatible and also for MACINTOSH. You
can watch them, talk to them, ask them questions, tell them secrets, and
relate with them. Watch them as you ask them to take off different clothes
and guide them through many different activities. Watch and participate in
the hottest sexual activities available on computer, including: several
sexual positions, using many unique toys, even bringing in multiple partners.
This is no doubt one of the most realistic, sexually stimulating computer
games available. They will remember your name, birthday, your likes and your
dislikes. Every time you start the program, they say different things, and
act differently. Each time, they have a different personality. With the VGA
digital graphics, The Virtual Girlfriend and Virtual Boyfriend software have
some of the hottest, sexiest graphics out there. And with a Soundblaster or
compatible card, you can actually hear their voice as they talk to you. This
is the first adult software title that was designed for both heterosexual and
homosexual people. I would like you to try the actual full copy out before it
is put on the market. It will be sold for 1/5 of the actual price ($10.00)
until I can get back some information on what people think of the program.
Please give it a try and write back any comments. Thank you.
If you are interested and would like to order a copy, then you can read
the mailing instructions below. It comes in an unmarked package and you are
not put on any mailing lists whatsoever, guaranteed. It will run on any 386,
486 or higher, and 100% IBM compatibles. Required is VGA graphics, and a
hard drive.The sound card is optional. Macintosh requires at least 4 meg of
ram.
Virtual Girlfriend and Virtual Boyfriend are artificial intelligence
programs, meaning they are completely interactive. It would be just like if
you were talking to someone. You can actually have simple conversations.
Their attitudes change with the different things you say, so you can say
things that will upset them, and then say things that will please them. The
more you play/talk with them, the more you learn what they can do, and what
they like to do. It really is a blast. With all these movies coming out
about virtual reality, it's amazing to actually have a virtual reality
program like this for your own computer. It's easy to install, and
instructions are easy to follow.
~~~~~~~~~~~~~~~~Special Software Offer~~~~~~~~~~~~~~~~~~
This is to inform you about the new adult game that VCS Magazine
rated "The best game of "97". "The Search for Paradise is no doubt one
of the greatest XXX adult games available". The first games where it is
as much fun as it is a turn on! Travel the world to every continent, every
country you can think of, and meet some of the most beautiful women in
existence. These women will treat you like a king and obey your every
command. Any sexual wish you can think of, these women know it all.
There is a different paradise for every guy out there, and this game will
have them all. This game uses real models, digital video, and digital sound
to make it as realistic as possible. You will feel like you're in the same
room as the girl you're talking to!!!
As an added bonus you'll receive "Club Celebrity X"
Meet, talk to and even have your way with the celebrities of your choice.
Imagine being in a club with some very beautiful, well known, actual
celebrities! You have seen these girls on T.V., Magazines and billboard
ads.
Now they are on your computer begging for action. This game is hot and
once you
start playing, you won't be able to stop!!!
~Required: 386 or better, 4 meg ram or better, Windows 3.1 or higher (Win95
is fine), sound card is optional, Rom is optional. (Game is given either
CD-rom or compressed 3.5" diskettes).~~$19.95!
Order now and get everything for just $24.95!!!!
At your request, the programs can come with a password protection utility
that only allows the program to run when the correct password is entered.
(You must be 18 or over to purchase)
Please fill out the following form and mail it to the address above.
(Feel free to write out the order form by hand)
Send payment to: Bruce Nichols
2155 Verdugo Blvd.
#522
Montrose, Ca 91020
Your Name ___________________________________________ Date ____________
Address ______________________________________________________________
City ____________________________ State __________ Zip Code ______________
Phone# _____________________ E-mail Address ___________________________
Do you have an IBM ( ) or MAC ( )? CD rom ( ) or Disks ( )?
( ) Virtual Girdfriend or ( ) Boyfriend for $10.00 ( ) *both just $15.95
( ) The Search for Paradise and Club Celebrity X for $19.95
( ) Everything!!! The Search for Paradise, Club Celebrity X,
Virtual Girlfriend and Virtual Boyfriend.
>>>>All for just $24.95<<<<
From christine_leeds at yahoo.com Mon May 11 09:28:58 1998
From: christine_leeds at yahoo.com (christine_leeds at yahoo.com)
Date: Mon, 11 May 1998 09:28:58 -0700 (PDT)
Subject: Surprise
Message-ID:
See Celebrity Hardcore pictures & MPEG video movies right from your browser
http://151.196.207.83
Top Celebrities & supermodels caught in the act
http://151.196.207.83
Plus Nude Pictures of the hottest naked female fitness models
Featuring nude photos of Kiana Tom & Cory Everson plus 26 other top fitness models fully naked.
Visit http://151.196.207.83 Today!
New Attractions added weekly!
My apologies if this message is of no interest to you. Your name was selected from a list stating that you are interested in adult entertainment. If you wish to recieve no further mailings just reply to this message with REMOVE as the subject.
Thank You
Christine Leeds - http://151.196.207.83
From jcea at argo.es Mon May 11 10:57:18 1998
From: jcea at argo.es (=?iso-8859-1?Q?Jes=FAs?= Cea =?iso-8859-1?Q?Avi=F3n?=)
Date: Mon, 11 May 1998 10:57:18 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <3557576A.C5EF9791@argo.es>
> However clever this technique is (and it *is* clever), it defeats the
> original purpose of Ron's idea.
Yes, you are right, Mordechai. My point was:
a) Prove that you can implement chaffing & winnowing without
bandwidth overhead. I agree that the final schema doesn't
resemble C&W anymore :).
b) Prove that you can use signature schemes, strong and exportable,
to achieve confidentiality. In that way, my objetive is the same
that Rivest had.
I'm happy knowing I can use full strengh signatures to keep my secrets,
secret :)
> No plaintext is visible.
In the Rivest's paper you transmit, indeed, all the 2^n plaintexts for a
n bit length };-).
--
Jesus Cea Avion _/_/ _/_/_/ _/_/_/
jcea at argo.es http://www.argo.es/~jcea/ _/_/ _/_/ _/_/ _/_/ _/_/
_/_/ _/_/ _/_/_/_/_/
PGP Key Available at KeyServ _/_/ _/_/ _/_/ _/_/ _/_/
"Things are not so easy" _/_/ _/_/ _/_/ _/_/ _/_/ _/_/
"My name is Dump, Core Dump" _/_/_/ _/_/_/ _/_/ _/_/
"El amor es poner tu felicidad en la felicidad de otro" - Leibnitz
From bill.stewart at pobox.com Mon May 11 11:55:48 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Mon, 11 May 1998 11:55:48 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <3.0.5.32.19980511115153.00941970@popd.ix.netcom.com>
>Jes�s Cea Avi�n wrote:
>> You can have chaffing & winnowing without bandwidth overhead, but the
>> resulting scheme hasn't the original "elegance" anymore. In particular,
>> you don't send the plaintext on the clear.
...
>> b) Calculate the signature for:
>> [sequence]0 -> MAC0
>> [sequence]1 -> MAC1
>> c) Compare both MACs and locate the first "different" bit,
>> from high to low bit or viceversa.
>> d) Send that bit from MAC0 if you want to send a "0" or from
>> MAC1 if you want to send a "1".
So why not _send_ the plaintext in the clear?
Send the 0 bit, and the bit from the MAC0, and the 1 and the MAC1 bit
0 0, 1 1, 0 1, 1 0,
Yes, it's expanding the data 4:1, but that's much better than before.
At 12:04 PM 5/11/98 -0400, Mordechai Ovits wrote:
>On the contrary, it has an elegance all it's own :-).
I strongly agree. I had proposed using a short checksum,
e.g. 8 bits of the MAC, which does leave collisions every ~256 sets,
but this is almost as short a checksum as you can get,
and eliminates the collision except every ~2**64 pairs.
>However clever this technique is (and it *is* clever),
>it defeats the original purpose of Ron's idea.
If you do include the data bits, you maintain (very marginally)
the letter of the requirement here. What you do lose
with this method is the ability to mix traffic from different people;
1 bit of MAC just isn't enough to pick out your own bits.
Any short MAC limits the amount of mixing you can do;
an 8-bit MAC lets you mix a bit without too many collisions,
and a 64-bit MAC should be enough for any mixture you'd
ever bother with (probably 16 or 32 would as well,
though especially for 16 you'd still need a longitudinal
checksum or some method of handling rare collisions.)
Is it close enough for government work? Probably.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From movits at syndata.com Mon May 11 12:10:06 1998
From: movits at syndata.com (Mordechai Ovits)
Date: Mon, 11 May 1998 12:10:06 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <35574C41.816CA545@syndata.com>
Jes�s Cea Avi�n wrote:
> In the Rivest's paper you transmit, indeed, all the 2^n plaintexts for a
> n bit length };-).
Not so. In his paper (before the package tranform stuff), he had the following expansion.
Assuming a 32 bit serial number and a 160 bit MAC, n bits would expand to 388n.
This is because Ron is sending it out like this:
quote from http://theory.lcs.mit.edu/~rivest/chaffing.txt
>To make this clearer with an example, note that the adversary
>will see triples of the form:
> (1,0,351216)
> (1,1,895634)
> (2,0,452412)
> (2,1,534981)
> (3,0,639723)
> (3,1,905344)
> (4,0,321329)
> (4,1,978823)
> ...
>and so on.
Every bit is getting 2 32-bit serial numbers, its own complement, and 2 160-bit MACs.
a 10KB file would explode into a 3.789MB file.
Not too practical, eh? :-)
--
o Mordy Ovits
o Programmer / Cryptographer
o SynData Technologies Inc.
o Download A Free Copy Of Our Software At:
o http://www.syncrypt.com
From ryan at michonline.com Mon May 11 13:41:30 1998
From: ryan at michonline.com (Ryan Anderson)
Date: Mon, 11 May 1998 13:41:30 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To: <35574C41.816CA545@syndata.com>
Message-ID:
On Mon, 11 May 1998, Mordechai Ovits wrote:
> > In the Rivest's paper you transmit, indeed, all the 2^n plaintexts for a
> > n bit length };-).
>
> Not so. In his paper (before the package tranform stuff), he had the following expansion.
Note that any of the 2^n plaintexts cna be reconstructed from the
following sequence of triples. (Assuming no knowledge of the MAC. The
attacker has no idea which of each pair of triples related to each
sequence is correct, so he must search every possibility, which turns out
to be each of the 2^n plaintexts.)
> Assuming a 32 bit serial number and a 160 bit MAC, n bits would expand to 388n.
> This is because Ron is sending it out like this:
> quote from http://theory.lcs.mit.edu/~rivest/chaffing.txt
> >To make this clearer with an example, note that the adversary
> >will see triples of the form:
> > (1,0,351216)
> > (1,1,895634)
> > (2,0,452412)
> > (2,1,534981)
> > (3,0,639723)
> > (3,1,905344)
> > (4,0,321329)
> > (4,1,978823)
Ryan Anderson
PGP fp: 7E 8E C6 54 96 AC D9 57 E4 F8 AE 9C 10 7E 78 C9
From die at die.com Mon May 11 13:55:42 1998
From: die at die.com (die at die.com)
Date: Mon, 11 May 1998 13:55:42 -0700 (PDT)
Subject: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To:
Message-ID: <19980511165629.B17830@die.com>
On Mon, May 11, 1998 at 10:50:17AM -0400, Sunder wrote:
> Dave Emery wrote:
>
> > This is not that uncommon. We implemented such a backdoor in a
> > router I worked on the design of some years ago. The magic password
> > was a function of the model and serial number of the machine (not as I
> > remember a very strong hash either), and different for all boxes. We
> > (or rather the marketing and support people) felt that leaving a
> > customer who forgot his password with no option but reset the router to
> > its factory defaults was more undesirable than providing a potential
> > attack point for sophisticated hackers and spooks
>
> This is still unexcusable. It would have been just as simple to include a
> hidden reset switch in a pannel somewhere that would zap all the passwords
> on the router without zapping the config, and maybe send some alarms out
> via SNMP incase it wasn't something that was wanted.
It took a great deal of earnest debate to get any kind of reset
switch implemented at all - they cost some amount of money and room in
the box, and there were those who held that having a switch there could
invite nervous diddlers to reset the machine causing a crash. So having
several was harder to sell. We eventually settled on two, one which would
reset to defaults when pressed at the same time as the other which simply
rebooted. The need to reset a box whose configuration was terminally
screwed up to factory defaults was acutely felt by the support people,
who had to pay a lot to swap out or service onsite a box that someone had
misconfigured so it wouldn't talk to its serial ports (which was
unfortunately possible).
I don't think those of us who were not happy with the backdoor
would have been much happier with a switch that just magicly reset
passwords, since that would have allowed someone with a moments
unguarded physical access to the box in a wiring closet somewhere to get
in (perhaps hours later from a safe haven via the network) without
necessarily causing a disruption that might be noticed and investigated
(and not everyone back then had reliable SNMP management and alarms
running). The solution we chose forced someone with that kind of
transient physical accesss to completely take the machine off line for
minutes or hours while restoring the configuration which was much
likelier to be observed (and required the intruder know the old
configuration in the first place). We felt this made our reset switches
less of a hazard from 30 second quicky attacks - attacks much easier
to pull off than having enough time connected to the box on a terminal
or laptop to restore the old configuration.
>
>
> > I suspect that a large fraction of alarms, security systems,
> > pbxs and the like incorperate such backdoors for precisely the same
> > kinds of reasons - it is simply too catastrophic to reset everything
> > if someone forgets the password. I know several commercial Unixes
> > had such backdoors in them for emergency access years ago, and wouldn't
> > be overwhelmingly surprised if some current OS's still have magic backdoors.
>
> That doesn't mean that the ankle biters won't find them. For example, I could
> put a sniffer on the network coming into the router and call up tech support
> and say "Hi" I lost my password, here's my IP address, help, help.
>
No doubt. Generally there was some minimal effort to ensure
that the person calling tech support was legit (callbacks, lists of
contact names and so forth) but there is probably little doubt that a
clever social engineer could perhaps have gotten a box password that
way - although there would certainly have been a trail left that could
have been followed. For the paraniod we encouraged use of dial up
modems on the console port rather than network access.
> I can then do the same thing a week later with the same router incase the
> hash is time dependant, and then later with another router with a different
> serial number, and I'll have much info to get started on how your hash works.
>
> Piece of cake.
>
Calling up for emergency help with lost passwords was
fortunately not a very common occurance, and generally was noted and
investigated. While our hash wasn't wonderful, I don't think it would
have been easy to obtain enough password/router pairs by calling tech
support to break it that way. Would have been much easier to obtain a box
and disassemble the code. And that would have left no trail.
--
Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
From toto at sk.sympatico.ca Sun May 10 23:20:47 1998
From: toto at sk.sympatico.ca (Toto)
Date: Mon, 11 May 1998 14:20:47 +0800
Subject: [Fwd: A.Word.A.Day--hieroglyphic]A.Word.A.Day--hieroglyphic
Message-ID: <35569417.4972@sk.sympatico.ca>
An embedded message was scrubbed...
From: unknown sender
Subject: no subject
Date: no date
Size: 1707
URL:
From billp at nmol.com Mon May 11 14:21:34 1998
From: billp at nmol.com (bill payne)
Date: Mon, 11 May 1998 14:21:34 -0700 (PDT)
Subject: David Felton
Message-ID: <355760D6.1E52@nmol.com>
Monday 5/11/98 1:37 PM
John Young
J Orlin Grabbe
Judge Leroy Hansen has ordered Morales to court [with court reporter] to
answer and probably be sanctioned for taking the 5th on his deposition.
Morales outlined what he planned to do at lunch.
Today I got a CONFIDENTIAL envelope from EEOC Inspector General�s
office in Washington. No doubt a response to my Privacy Act violation
complaint.
Several years ago a Department of Interior whistleblower gave me number
of
book references. One was a book written by Felton during the Vietnam
era.
Felton�s book is only available from the University of New Mexico main
Zimmerman library.
The book was usually checked out when I phoned to ask if it was
available.
The �black hole� of government we are encountering in the Court system
and
through administrative appeals prompted me to look up a word.
Here is a dictionary definition.
a political and economic movement, strongly nationalistic, magnifying
the rights
of the state as opposed to those of the individual, in which industry,
though
remaining largely under private ownership, and all administrative
political units,
are controlled by a strong central government.
When I asked the librarian about Felton�s book, the response was usually
You mean, The Rise of Acid Fascism in America.
I responded, yes.
Full title of Felton�s book is seen at
http://www.amazon.com/exec/obidos/quicksearch-query/002-2147604-1106833
I guess what we are seeing with the �black hole� of the court system and
federal government
with respect to my Privacy Act violation complaint, the WRITTEN felony
perjury complaint on Sandia lawyer Gregory Cone, the dockets we COULD
not get BEFORE
http://www.jya.com/whp-10usca.htm
is that while United States of America is only a democracy in name,
The US is, in fact, operated as a fascist state by bureaucrats.
Who go totally insane about the subject of cryptography.
Citizens should do something about this.
Some are. http://www.aci.net/kalliste/
http://www.jya.com/crypto.htm
http://www.us.net/softwar/
http://www.antionline.com/
http://jya.com/whpfiles.htm
Later
bill
From nobody at REPLAY.COM Tue May 12 06:08:02 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 12 May 1998 06:08:02 -0700 (PDT)
Subject: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805121307.PAA21528@basement.replay.com>
Steve Crisp wrote:
> Hate to tell you this, bucko, but he in no longer listed in the registry
> since Gary is not a convicted sex offender and therefore not subject to
> NC registration.
Now explain how whining to have Gary Lee Burnore's entry removed from the
NC registered sex offenders website makes the underlying offense go away?
I'm sure the victim feels better, right? And Gary's neighbors can now rest
easier knowing that the sex offender in their neighborhood is no longer
registered.
Sorry, but removing the entry does not alter the fact that Gary Lee Burnore
is still a convicted sex offender -- just an unregistered one.
> Now, why don't you come out of hiding so we can track you down and beat
^^^^
> the living fuck out of you?
I hate to tell you this, little Burnorian groupie, but you misspelled
"suck". And who is this "we" you speak of? The management of Page Planet?
What are you going to do? Put on your white sheets and burn a cross on
my lawn?
It's people like you and Gary Burnore who threaten and harass people who
say things you don't like that make anonymous remailers necessary.
Otherwise only loudmouth bullies like you would have any freedom of speech.
Thank you for proving that point with your threatening post.
PagePlanet (PAGEPLANET-DOM)
3252 Octavia Street
Raleigh, NC 27606
US
Domain Name: PAGEPLANET.COM
Administrative Contact:
Crisp, Steve (SC2795) crisp at PAGEPLANET.COM
919-852-5262 (FAX) 919-233-0816
Technical Contact, Zone Contact:
Sullivan, Mikey (MS5652) mikey at PAGEPLANET.COM
919-852-5262 (FAX) 919-852-5261
Billing Contact:
Crisp, Valerie (VC370) valerie at PAGEPLANET.COM
919-233-6602 (FAX) 919-852-5261
From toto at sk.sympatico.ca Tue May 12 11:54:30 1998
From: toto at sk.sympatico.ca (Toto)
Date: Tue, 12 May 1998 11:54:30 -0700 (PDT)
Subject: Clinton's NWO
Message-ID: <355897EF.CB6@sk.sympatico.ca>
Clinton just had to announce Global Law while I was reading:
http://www.nebonet.com/headhome/dadmisc/trojan.htm
I suspect Clinton's speech in regard to nations co-operating in
making their citizens subject to deportation to face charges in
foreign countries was designed to keep me from fleeing my
'Dog At Large' charges in Bienfait.
Seiing as how the Queen's Gestapo was wearing Keblar when they
upped the ante for charge to four years in prison, I guess I must
be a desperate ASCII character.
Toto
From announce at zdnetmail.com Tue May 12 12:31:26 1998
From: announce at zdnetmail.com (announce at zdnetmail.com)
Date: Tue, 12 May 1998 12:31:26 -0700 (PDT)
Subject: Announcing ZDNet Mail !!
Message-ID: <199805121931.MAA11036@toad.com>
Announcing ZDNet Mail - the best free email on the Web!
ZDNet is pleased to announce the launch of ZDNet Mail, the
best free email on the Web. Because you're a valued
member of the ZDNet community, we're providing you with
a free, secure, email account, that you can access from any
Internet connection, anytime or anywhere.
As a current ZDNet member, your email account is already
set up -- you can start using it today! Just log on to ZDNet Mail at:
http://www.zdnetmail.com
and enter your current ZDNet user name and password
as shown below:
User Name: cypherpunks
Password: cypherpunks
and you'll find a Welcome letter with all the information you'll
need to take start using your new account. ZDNet Mail gives you
easy access, security, and a permanent address (even if
you change ISPs). It's everything you need in an email account
and it's all provided free of charge. Just click below to
get started!
http://www.zdnetmail.com
The ZDNet Mail Team
From StanSqncrs at aol.com Tue May 12 12:56:57 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Tue, 12 May 1998 12:56:57 -0700 (PDT)
Subject: Nobody's Home!
Message-ID: <6122829a.3558a938@aol.com>
I got only 1 anon. comment worth responding to -
=====
Subj:
Date: 5/12/98 2:41:44 PM Central Daylight Time
From: nobody at nsm.htp.org
To: stansqncrs at aol.com
"A cultist is one who has a strong belief in the Bible and the Second
Coming of Christ; who frequently attends Bible studies; who has a high
level of financial giving to a Christian cause; who home schools for
their children; who has accumulated survival foods and has a strong
belief in the Second Amendment; and who distrusts big government. Any
of these may qualify [a person as a cultist] but certainly more than one
[of these] would cause us to look at this person as a threat, and his
family as being in a risk situation that qualified for government
interference."
-Attorney General Janet Reno, Interview on 60 Minutes, June 26, 1994
=====
"One man's religion is another man's cult" - me
Stan,
The 'Wall of Reality'
http/members.aol.com/RealityWal/
From rp at rpini.com Tue May 12 13:07:43 1998
From: rp at rpini.com (Remo Pini)
Date: Tue, 12 May 1998 13:07:43 -0700 (PDT)
Subject: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To:
Message-ID: <199805121909.VAA31944@linux.rpini.com>
To my knowledge (and the rather credible statements of several 3Com
representatives), there are:
No undocumented accesses to SS 1000, 1100, 3000,3300.
There is one documented access to the CB7000, but that can easily be
removed (i.e. -> login in with the magic username and change the password).
We did that at our site, as we never ever forgot a password to our
equipment (yet).
So, what's the hype, the "backdoor" is only for clueless users, not serious
companies with a security policy.
-----------------------------------------------------
Fatum favet volenti. (anon)
-----------------------------------------------------
Remo Pini������������������������ T: +41� 1 350 28 88
Pini Computer Trading������������ N: +41 79 216 15 51
http://www.rpini.com/������������ Email: rp at rpini.com
-----------------------------------------------------
From movits at syndata.com Tue May 12 13:14:04 1998
From: movits at syndata.com (Mordechai Ovits)
Date: Tue, 12 May 1998 13:14:04 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To:
Message-ID: <3558ACB7.678309E7@syndata.com>
Ryan Anderson wrote:
> Note that any of the 2^n plaintexts cna be reconstructed from the
> following sequence of triples. (Assuming no knowledge of the MAC. The
> attacker has no idea which of each pair of triples related to each
> sequence is correct, so he must search every possibility, which turns out
> to be each of the 2^n plaintexts.)
OK, but to be technically correct, you arent *transmitting* all 2^n
possibilities. That would be like saying that when you blowfish encrypt a
64-bit block and send it, you are sending all 2^64 plaintext, because given
all 2^128 possible keys you will cover the entire "plaintext-space". while
it is crucial to make sure that you leave the possible decryptions
exponential, you are not transmitting all possible plaintests. That would
be .... uhhh... bad.
--
o Mordy Ovits
o Programmer / Cryptographer
o SynData Technologies Inc.
o Download A Free Copy Of Our Software At:
o http://www.syncrypt.com
From ptrei at securitydynamics.com Tue May 12 14:15:24 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Tue, 12 May 1998 14:15:24 -0700 (PDT)
Subject: FW: "... would cause us to look at this person as a threat"
Message-ID:
The earliest online citation I can find is in the May 1997 Newsletter of
the
Melbourne Seventh-day Adventist Church, at
http://www.spacey.net/bwillard/News0597.html
Considering it's content, I have no doubt that it is manufactured - it
carefully written to offend millenialist Christians, such as the SDAs.
I've written the page owner to see if I can find out more.
Deja News shows this quote first in alt.war.civil.usa, on March 18 1998.
Since then, it's been banging around various Christian and political
groups.
It also seems to be on the website
http://www.sightings.com/political/renowords.htm, but I have not
confirmed this, nor can I tell if this cites an earlier source.
Peter Trei
> -----Original Message-----
> From: Tim May [SMTP:tcmay at got.net]
> Sent: Tuesday, May 12, 1998 2:45 PM
> To: cypherpunks at cyberpass.net
> Subject: "... would cause us to look at this person as a threat"
>
>
>
> I just saw this on one of the newsgroups:
>
>
> "A cultist is one who has a strong belief in the Bible and the Second
> Coming of Christ; who frequently attends Bible studies; who has a high
> level of financial giving to a Christian cause; who home schools for
> their children; who has accumulated survival foods and has a strong
> belief in the Second Amendment; and who distrusts big government. Any
> of these may qualify [a person as a cultist] but certainly more than one
> [of these] would cause us to look at this person as a threat, and his
> family as being in a risk situation that qualified for government
> interference."
> -Attorney General Janet Reno, Interview on 60 Minutes, June 26, 1994
>
From banisar at epic.org Tue May 12 14:57:39 1998
From: banisar at epic.org (David Banisar)
Date: Tue, 12 May 1998 14:57:39 -0700 (PDT)
Subject: EPIC Analysis of E-Privacy Act
Message-ID:
====================================================================
EPIC Preliminary Analysis of E-PRIVACY Act
May 12, 1998
Washington, DC
Senators John Ashcroft (R-MO) and Patrick Leahy (D-VT) today
introduced the "Encryption Protects the Rights of Individuals from
Violation and Abuse in Cyberspace (E-PRIVACY) Act." The proposed
legislation is the latest in a series of congressional measures
designed to resolve the debate surrounding current U.S. encryption
policy. Like the SAFE Act (H.R. 695) now pending in the House,
the E-PRIVACY Act seeks to relax existing controls on the export
of encryption products. Controls would be lifted for encryption
products that are deemed to be "generally available" within the
international market. Exporters would be given new procedural
rights to obtain expedited determinations on the exportability of
their products.
The bill also contains several provisions that would preserve the
right of Americans to use encryption techniques and that would
enhance the privacy protections currently accorded to personal
communications and stored data. Among its positive features, the
bill:
* Reiterates the right of Americans to use, develop, manufacture,
sell, distribute, or import any encryption product, regardless of
the algorithm selected, key length, or the existence of key
recovery capabilities;
* Prohibits government-compelled key escrow or key recovery;
* Prohibits government agencies from creating any linkage between
cryptographic methods used for authentication and those used for
confidentiality;
* Prohibits the federal government from purchasing key recovery
encryption systems that are not interoperable with other
commercial encryption products; and
* Provides enhanced privacy protections for stored electronic data
held by third parties, location information generated by wireless
communications services, and transactional information obtained
from pen registers and trap and trace devices;
The bill contains two provisions that raise significant civil
liberties and privacy concerns.
The Criminalization Provision
The bill would make the use of encryption to conceal
"incriminating" communications or information during the
commission of a crime a new and independent criminal offense.
While well-intended, the provision could have several unintended
consequences that would easily undermine the other desirable
features of the bill.
We believe it is a mistake to create criminal penalties for the
use of a particular technique or device. Such a provision tends to
draw attention away from the underlying criminal act and casts a
shadow over a valuable technology that should not be criminalized.
It may, for instance, be the case that a typewritten ransom note
poses a more difficult challenge for forensic investigators than a
handwritten note. But it would be a mistake to criminalize the use
of a typewriter simply because it could make it more difficult to
investigate crime in some circumstances.
Additionally, a provision which criminalizes the use of
encryption, even in furtherance of a crime, would give prosecutors
wide latitude to investigate activity where the only indicia of
criminal conduct may be the mere presence of encrypted data. In
the digital age, where techniques to protect privacy and security
will be widely deployed, we cannot afford to view encryption as
the potential instrumentality of a crime, just as we would not
today view the use of a typewriter with suspicion.
Finally, the provision could also operate as a substantial
disincentive to the widespread adoption of strong encryption
techniques in the communications infrastructure. Given that the
availability of strong encryption is one of the best ways to
reduce the risk of crime and to promote public safety, the
retention of this provision in the legislation will send a mixed
message to users and businesses -- that we want people to be free
to use encryption but will be suspicious when it is used.
If the concern is that encryption techniques may be used to
obstruct access to evidence relevant to criminal investigations,
we submit that the better approach may be to rely on other
provisions in the federal and state criminal codes (including
sections relating to obstruction of justice or concealment) to
address this problem if it arises.
The "NET Center"
The bill creates within the Department of Justice a National
Electronic Technology Center (NET Center) to "serve as a center
for . . . law enforcement authorities for information and
assistance regarding decryption and other access requirements."
The NET Center would have a broad mandate and could spawn a new
domestic surveillance bureaucracy within the Department of
Justice. Among other powers, the bill authorizes the NET Center
to:
* Examine encryption techniques and methods to facilitate the
ability of law enforcement to gain efficient access to plaintext
of communications and electronic information;
* Conduct research to develop efficient methods, and improve the
efficiency of existing methods, of accessing plaintext of
communications and electronic information;
* Investigate and research new and emerging techniques and
technologies to facilitate access to communications and electronic
information; and
* Obtain information regarding the most current hardware,
software, telecommunications, and other capabilities to understand
how to access digitized information transmitted across networks.
The mission of the NET Center is made more troubling by the bill's
authorization of "assistance" from other federal agencies,
including the detailing of personnel to the new entity. In light
of the fact that existing federal expertise in the areas of
electronic surveillance and decryption resides at the National
Security Agency (NSA), the bill in effect authorizes unprecedented
NSA involvement in domestic law enforcement activities. Such a
result would be contrary to a half-century-old consensus that
intelligence agencies must be strictly constrained from engaging
in domestic "police functions."
That consensus arose from the recognition that intelligence
agencies created to operate abroad are ill-suited for domestic
activities, where U.S. citizens enjoy constitutional protections
against governmental intrusions. In 1975, Sen. Frank Church led a
congressional investigation into the activities of NSA. He noted
that Congress had a "particular obligation to examine the NSA, in
light of its tremendous potential for abuse. ... The danger lies
in the ability of NSA to turn its awesome technology against
domestic communications."
In 1987, Congress enacted the Computer Security Act, which sought
to vest civilian computer security authority in the Commerce
Department and to limit the domestic role of NSA. The House
Report on the Computer Security Act cited congressional concern
over a Reagan Administration directive that "gave NSA the
authority to use its considerable foreign intelligence expertise
within this country." The report noted that such authority was
"particularly troubling" since NSA "has, on occasion, improperly
targeted American citizens for surveillance."
The NET Center proposal, if approved, would constitute a
fundamental re-definition of the relationship between intelligence
agencies and domestic law enforcement. Such an approach would
ignore 50 years of experience and would pose a serious threat to
the privacy and constitutional rights of Americans.
EPIC looks forward to working with the legislation's sponsors and
other interested parties to address these issues and develop a
national encryption policy that will ensure the widespread
availability of robust encryption products and the preservation of
constitutional rights. Such a result will be critical for both
our nation's continued leadership of the information industry and
the protection of personal privacy in the next century.
From josh at josh1.weboneinc.com Tue May 12 15:18:27 1998
From: josh at josh1.weboneinc.com (Josh Schoof)
Date: Tue, 12 May 1998 15:18:27 -0700 (PDT)
Subject: No Subject
Message-ID: <199805122218.SAA26006@josh1.weboneinc.com>
FROM: aj at gaymen.com
SUBJECT: Gay Site
I just wanted to let you know that GayTV And GayMen.Com have
webmaster referral programs that pay you for every person
that signs-up for either site.
You can signup online and start making money now:)
Check out our webmaster pages for all the details - you can signup
for both sites and make double the money.
GayTV: http://www.aj1.com/gaytv/webmasters
GayMen.Com: http://www.gaymen.com/webmasters
Thanks,
AJ
GayMen.com
aj at gaymen.com
From StanSqncrs at aol.com Tue May 12 15:58:15 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Tue, 12 May 1998 15:58:15 -0700 (PDT)
Subject: "... would cause us to look at this person as a threat"
Message-ID: <23d07d72.3558d3d9@aol.com>
In a message dated 5/12/98 4:37:47 PM Central Daylight Time,
ptrei at securitydynamics.com writes:
<< ... Considering it's content, I have no doubt that it is manufactured - it
carefully written to offend millenialist Christians, such as the SDAs.
I've written the page owner to see if I can find out more. ... >>
Not only that, it seems to be "spam" (the repetitive list type). You see 2
days ago we welcomed a guest to my list (FreeGroup), and in his first batch,
guess what was there. Another FreeGroupie had a great response to it, I
include it -
=====
... writes:
> Well howdy 'yall, i'm mighty proud to have someone to chat wdith and share
> ideas and some news, both good and bad.
> here's some bad news to start off the day
>
> RE: Janet Reno, Attorney General of these United States of America
>
> Subject: Janet Reno Quote
> > Date: Wednesday, May 06, 1998 10:54
> >
> > A friend sent me this...sure would like to see the interview in context,
> > but at any rate a very scary statement.
> >
> > Subject: Cults and Government?
> >
> > "Just ran across this quote from AG Janet Reno. From a person of such
> > high power, these are scary words. --------- "
> > "-Attorney General Janet Reno, Interview on 60 Minutes, June 26,
> > 1994"
> >
Bad *NEWS*??? This purports to be an item that's nearly 4 years old. What's
the news? I guess the news is that we're getting this 3rd hand--at a minimum,
with no idea if it's true or not. But hey! This is the internet. So, again,
I ask, *NEWS*????
Bad beginning, Sir Will. The willingness to pass along material of dubious
authenticity is not a good sign in my book. As Mr. Natural would say, "Check
your source." So, what *IS* your source?
=====
Thanks for your excellent research on the origins of that, Peter!
Stan,
FreeGroup - "Just Say It!"
http://members.aol.com/WhtsAMetaU/freegroup.html
From mkwan at preston.net Tue May 12 16:42:35 1998
From: mkwan at preston.net (Matthew Kwan)
Date: Tue, 12 May 1998 16:42:35 -0700 (PDT)
Subject: Bitslice DES S-boxes
Message-ID: <199805122341.JAA18008@preston-gw.preston.net>
After 6 weeks of number crunching, I've finally produced a new set of
bitslice DES S-boxes using non-standard logic gates.
Numbers are as follows -
S1 S2 S3 S4 S5 S6 S7 S8 Avg
56 50 53 39 56 53 51 50 51
Details at http://www.cs.mu.oz.au/~mkwan/bitslice
There won't be any more improvements in the foreseeable future, since
I've run out of ideas.
Feel free to use this code in the RSA DES II challenge, but remember to
give credit where it's due.
mkwan
From mrosen at peganet.com Tue May 12 17:21:50 1998
From: mrosen at peganet.com (Mark Rosen)
Date: Tue, 12 May 1998 17:21:50 -0700 (PDT)
Subject: Chaffing and winnowing
Message-ID: <01bd7e04$5802a820$014ce9c7@markdsk.peganet.com>
I have just been notified that chaffing and winnowing does, indeed,
violate the export regulations. You can read them for yourself at
http://www.bxa.doc.gov/Encryption/encreg.htm, but here are a few parts
a. Designed or modified to use ``cryptography'' employing digital techniques
to ensure ``information security'';
b. Designed or modified to perform cryptanalytic functions;
c. Designed or modified to use ``cryptography'' employing analog techniques
to ensure ``information security'';
...
Note: 5A002 does not control the following:
b. Equipment containing ``fixed'' data compression or coding techniques;
...
g. Data authentication equipment that calculates a Message
Authentication Code (MAC) or similar result to ensure no alteration of
text has taken place, or to authenticate users, but does not allow for
encryption of data, text or other media other than that needed for the
authentication;
So it seems 5A002.a and 5A002.g cover such encryption technologies as
chaffing and winnowing. Interestingly enough, 5A002.b allows such functions
as the package transform (keyless coding), even though it uses encryption
algorithms.
- Mark Rosen
http://www.mach5.com/
From nobody at REPLAY.COM Tue May 12 18:37:11 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 12 May 1998 18:37:11 -0700 (PDT)
Subject: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805130137.DAA03874@basement.replay.com>
wmcclatc at primenet.com (William J. McClatchie)
> X-Comment: Aw, are you offended?
> X-no-archive: yes
> [anonymous makes illegal usage of information, as defined by the state he
> got the info from, and then whines]
And your legal basis for calling the posting of public information from a
public website to usenet "illegal usage" is ??? Presumably if the state
had wanted to keep the info secret, they wouldn't have made it public
available.
The only whining I've seen has been by Gary Burnore who complained that the
state of North Carolina failed to keep his conviction as a sex offender a
secret, and by various DataBasix sock puppets and groupies.
Burnore did the crime, he was convicted, he registered as a sex offender
with the state of NC, the information was made publicly available by the
state, and people found out as they were intended to. Deal with it!
Maybe you ought to learn a little about remailers before you make such
ridiculous claims, McClatchie. If I'm the person you say "whined", then
I'm *NOT* the same person who posted the information that Gary whined
about. Sorry to burst Gary's bubble that all posts which poor little Gary
Burnore doesn't like originate from his one mythical "Anon Asshole ".
In fact, the information is just as likely to have been posted anonymously
by YOU as by me.
> >It's people like you and Gary Burnore who threaten and harass people who
> >say things you don't like that make anonymous remailers necessary.
>
> >And it is assholes like you who ABUSE remailers that make them go away.
Let me get this straight... Someone threatens a remailer user with
physical violence, I comment on it, and now I'm "abusing a remailer" just
because you don't like what I have to say? Don't you think that's for the
remailer operator to decide? Do you operate a remailer, McClatchie?
From bill.stewart at pobox.com Tue May 12 19:08:50 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Tue, 12 May 1998 19:08:50 -0700 (PDT)
Subject: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <3.0.5.32.19980512180231.008ae790@popd.ix.netcom.com>
By the way, instead of transmitting the first bit for which
MAC(sequence,0) differs from MAC(sequence,1), as Jes�s suggests,
you can get the same effect by transmitting a 0 or 1 depending on
MAC(sequence,0) < MAC(sequence,1)
(This assumes a big-endian system and unsigned comparisons;
little-endians will have to calculate it the hard way.)
If you're willing to be wrong 1 time out of 2**33,
you can just use the top 32 bits.
Earlier in this discussion:
>> In the Rivest's paper you transmit, indeed, all the 2^n plaintexts for a
>> n bit length };-).
>Not so. In his paper (before the package tranform stuff), he had the following expansion.
>Assuming a 32 bit serial number and a 160 bit MAC, n bits would expand to 388n.
>>To make this clearer with an example, note that the adversary
>>will see triples of the form:
>> (1,0,351216)
>> (1,1,895634)
>> (2,0,452412)
>> (2,1,534981)
But that _does send the 2^n plaintexts, which are 0 and 1, and n=1.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From jim at smallworks.com Wed May 13 00:48:08 1998
From: jim at smallworks.com (Jim Thompson)
Date: Wed, 13 May 1998 00:48:08 -0700 (PDT)
Subject: [rivest@theory.lcs.mit.edu: Chaffing question]
Message-ID: <199805130747.CAA18984@hosaka.smallworks.com>
With all of the discussion of C&W, and potential expansion, along with
a sideband discussion of same, I decided to ask 'the man' himself.
The '10K email file' used in the example came from the sideband discussion.
Forwarded for your edification.
------- Start of forwarded message -------
Date: Tue, 12 May 1998 18:24:46 -0400
From: Ron Rivest
Subject: Chaffing question
Suppose you can start with a 10KB email file.
Running a package (all-or-nothing) transform on it adds only a small
amount to the length---say 128 bits total, or less (basically the length
of a key in your favorite algorithm).
You can break the result into 128 one-bit blocks and one 10KB block. MAC
each block.
Add 128 bits of chaff, intermingled with the first 128 blocks from above.
The final result has 128+128+1 packets, and total length 10KB (the
original email) + 257*64 bits (for the 257 64-bit MAC values) plus 128
bits (the chaff bits), and assuming that the sequence numbers are
implicit rather than explicit, you get a total of around 12.3 KB.
Cheers,
Ron
------- End of forwarded message -------
--
Jim Thompson / Smallworks, Inc. / jim at smallworks.com
512 338 0619 phone / 512 338 0625 fax
Real, cheap Hardware RNG: http://www.fringeware.com/nscd/
From eridani at databasix.com Wed May 13 01:18:03 1998
From: eridani at databasix.com (Belinda)
Date: Wed, 13 May 1998 01:18:03 -0700 (PDT)
Subject: Abusive crossposting by anonymous remailer user (Was: Gary L. Burnore blah blah blah)
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805130820.EAA18605@databasix.com>
In article <199805130137.DAA03874 at basement.replay.com>,
nobody at REPLAY.COM (Anonymous) wrote:
[who cares what he wrote]
Where's the idiot who was ranting about kooks who crosspost threads
everywhere and called -me- a Usenet abuser? Take a look at the
references in this one:
References: <199805101850.LAA00114 at sirius.infonex.com>
<3555FA78.7795 at pageplanet.com>
<199805121307.PAA21528 at basement.replay.com>
<6ja344$i2h at nntp02.primenet.com>
<199805101850.LAA00114 at sirius.infonex.com>
posted to triangle.general only
<3555FA78.7795 at pageplanet.com>
posted to triangle.general only
<199805121307.PAA21528 at basement.replay.com>
posted to: alt.fan.gburnore,triangle.general,alt.vigilantes,
alt.netcom.emeritus,alt.cypherpunks,news.admin.censorship,
alt.privacy,alt.privacy.anon-server,misc.kids
And there we have it, folks. The anonymous stalker who's spent the past
year following Gary Burnore around Usenet found a post in
triangle.general that mentioned him, added a propaganda-filled follow up
to it, and posted it to 9 newsgroups--many of whom have repeatedly
requested that this crap be kept out of said groups.
Oh and lookee what else: it was mailed to cypherpunks at toad.com,
presumably for archival on the cypherpunks mailing list, where it will
be picked up by WWW search engines. Since those folks don't seem to
mind having their archives used in personal grudge matches, I'll just
start cc'ing my responses there as well. I'm sure, as champions of free
speech, they can understand the necessity of making sure both sides of
the story get equal time.
--
Belinda
From nobody at REPLAY.COM Wed May 13 06:11:15 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 13 May 1998 06:11:15 -0700 (PDT)
Subject: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC)
In-Reply-To: <3555FA78.7795@pageplanet.com>
Message-ID: <199805131311.PAA05504@basement.replay.com>
eridani at databasix.com (Belinda Bryan) wrote:
> And there we have it, folks. The anonymous stalker who's spent the past
> year following Gary Burnore around Usenet found a post in
> triangle.general that mentioned him, added a propaganda-filled follow up
> to it, and posted it to 9 newsgroups--many of whom have repeatedly
> requested that this crap be kept out of said groups.
"Anonymous stalker"? For merely posting a reply to a public post on
Usenet? What state or country has a statute against that, and what makes
you think the poster falls under its jurisdiction if it does exist? As for
whether a certain post is "propaganda", that is for the reader to decide,
especially when of the content is independently verifiable. The
"propaganda" you refer to was apparently intended to refute the fallacious
assertion that since Gary Lee Burnore's entry in the North Carolina
official database of registered sex offenders had apparently been removed,
then the underlying crime for which he was convicted and required to
register somehow automagically never happened. To make such an assertion
is to invite rebuttal.
The thread you're whining about involved Steve Crisp
threatening an anonymous poster with "beating the living fuck out of you"
if his/her identity could be determined, a second anonymous poster
challenging the propriety of such a threat, and yet another DataBasix
groupie, William McClatchie , calling the second
anonymous poster a "remailer abuser" for daring to make such a challenge.
So rather than denouncing the threat itself, you choose to call the person
challenging it an "anonymous stalker"? If you feel no need to "hide"
anything, please feel free to post your street address and home phone
number. But I imagine that many people with small children would not want
their names, from which their street address can be derived by someone with
the resources available to you and Gary Burnore, to fall into the hands of
a convicted child molester with a history of abusive retaliation.
Being threatened with physical violence for making an unpopular post is
one of the best arguments available as to why anonymity is necessary when
people like Steve Crisp and convicted child molester Gary Lee Burnore are
running around loose making those threats.
> Oh and lookee what else: it was mailed to cypherpunks at toad.com,
> presumably for archival on the cypherpunks mailing list, where it will
> be picked up by WWW search engines. Since those folks don't seem to
> mind having their archives used in personal grudge matches, I'll just
> start cc'ing my responses there as well. I'm sure, as champions of free
> speech, they can understand the necessity of making sure both sides of
> the story get equal time.
This, of course, comes from the same Belinda Bryan who impersonated a
lawyer for DataBasix to demand the disclosure of (fortunately non-existant)
user logs from the Huge Cajones remailer in a failed Scientology-esque
attempt to embarass its users. And that attack, BTW, started because Gary
Burnore was pissed that an anonymous whistle blower used a remailer to tip
of his victim's mother to the molestation. As is typical of his style,
Burnore denounced that legitimate use of anonymity as "harassment" and
"abuse".
It was also Burnore who chose to make PUBLIC what had previously been a
private e-mail, thus inviting his critics to factually evaluate the claims.
One of them apparently did so and discovered Gary Burnore's name and mug
shot were published on an official PUBLIC website of registered sex
offenders maintained by the state of North Carolina where Burnore moved
after leaving San Francisco. Perhaps he should have learned a lesson from
Gary Hart and not have taunted the wrong people to find evidence of his
wrongdoing.
Will the continual harangue against privacy and anonymity by Gary Lee
Burnore, Belinda Bryan, Billy McClatchie, and other staffers and sock
puppets of the DataBasix wrecking crew never end?
BTW, Belinda, cross-posting your whining drivel in the fashion you're
threatening negates your lame attempts to achieve deniability by using the
infamous X-No-Archive header that has become the trademark of DataBasix'
denizens. IOW, you won't be able to retroactively claim that an
embarassing post from you was "forged" because it's not archived at an
unbiased, third party site. Can you say "oops"?
From rzz at rzz.sigov.si Wed May 13 08:25:06 1998
From: rzz at rzz.sigov.si (rzz at rzz.sigov.si)
Date: Wed, 13 May 1998 08:25:06 -0700 (PDT)
Subject: JUST RELEASED! 10 Million!!!
Message-ID: <011297055501222@g_fantasm.com>
IT WAS JUST RELEASED!!
INTRODUCING...MILLIONS VOL. 1A
We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those. When we
combined them all, we had in excess of 100+ million addresses
in one huge file.
We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
"generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for those
that use Stealth programs, clogs up servers quickly with trash, etc.
We then ran a program that contained 1800+ keywords to remove
addresses with vulgarity, profanity, sex-related names, postmaster,
webmaster, flamer, abuse, spam, etc., etc. Also eliminated all .edu,
.mil, .org, .gov, etc. After that list was run against the remaining list,
it reduced it down to near 10 million addresses!
So, you see, our list will save people hundreds of dollars buying all
others that are out there on CD and otherwise. Using ours will be like
using the 100+ million that we started with, but a lot less money and
alot less time!!
We also purchased Cyber-Promos ($995.00) CD. We received it just
prior to finishing production work on the new CD. We had our people
take a random sample of 300,000 addresses from the touted 2.9 that
they advertised. We used a program that allows us to take a random
sample of addresses from any list. We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom. We cleaned these, and came up with about
100,000 addresses. These are also mixed in.
We also included a 6+ million "Remove/Flamer" file broke into seperate
files for ease of extracting and adding to your own database of removes.
"You can buy from the REST or you can buy from the BEST. Your choice.
_____________________________
What others are saying:
"I received the CD on Friday evening. Like a kid with a new toy, I
immediately started bulking out using the new email addresses. Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!! I am totally satisfied
with my purchase!! Thanks Premier!!"
Dave Buckley
Houston, TX
"This list is worth it's weight in gold!! I sent out 100,000 emails for my
product and received over 55 orders!
Ann Colby
New Orleans, LA
****************************************
HERE'S THE BOTTOM LINE
Here is what you get when you order today!
>> 10 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 5,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
PLUS you receive a tremendous REMOVE list!
6 Million+
>>> NOW ONLY $150.00!
This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!
All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.
***ADDED BONUS***
All our customers will have access to our updates on the CD volume
they purchase. That's right, we continually work on our CD. Who
knows when those other CDs were made. We're constantly adding
and deleting addresses, removes. Etc. It all comes back to quality.
No one else offers that!
Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere...PERIOD!
If you have any further questions or to place an order by
phone, please do not hesitate to call us at:
908-245-1143
To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
We accept Visa, Mastercard, AMEX, Checks by Fax and Mail.
_________________
EZ Order Form
_____Yes! I would like to order MILLIONS Vol. 1A email addresses
for only $150.00.
*Please select one of the following for shipping..
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping. (outside US add an additional $25 for shipping)
DATE_____________________________________________________
NAME____________________________________________________
COMPANY NAME___________________________________________
ADDRESS_________________________________________________
CITY, STATE, ZIP___________________________________________
PHONE NUMBERS__________________________________________
FAX NUMBERS_____________________________________________
EMAIL ADDRESS___________________________________________
TYPE OF CREDIT CARD:
______VISA _____MASTERCARD
CREDIT CARD# __________________________________________
EXPIRATION DATE________________________________________
NAME ON CARD___________________________________________
AMOUNT $____________________
(Required) SIGNATURE:x________________________
DATE:x__________________
You may fax your order to us at: 1-908-245-3119
CHECK BY FAX SERVICES!
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-908-245-3119
******************************************************
***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
CHECK HERE AND FAX IT TO US AT 1-908-245-3119
*******************************************************
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.
If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
JKP Enterprises
700 Boulevard
Suite 102
Kenilworth, NJ 07033
From billp at nmol.com Wed May 13 08:27:52 1998
From: billp at nmol.com (bill payne)
Date: Wed, 13 May 1998 08:27:52 -0700 (PDT)
Subject: Hidden US government
Message-ID: <3559B706.F@nmol.com>
Guys
There is a segment in the US government who do whatever they want.
Like stinging Iran.
The segment thinks that they are unaccountable.
We want to change this.
And get our money too!
Wednesday 5/13/98 7:40 AM
Lawyers and netizens
Morales and my last Friday filing seen at
http://www.jya.com/whp050898.htm
is causing comments at http://www.jya.com/mf050998.htm and elsewhere.
One of my neighbors, Bill Moe, is a retired AF officer and now an APD
cop.
Moe commented that no lawyer would ever write a document like the one
we FILED.
Morales is ready to go to the Supreme Court on this case for the reasons
of
Campos dismissing DIR NSA Minihan.
Morales feels that this decision make no one in a federal agency
accountable..
We will also probably have to appeal the dismissal of Morales too. Bad
precedent.
Now that we have copies of the docket sheets seen at
http://www.jya.com/whp-10usca.htm
we must study them.
We will do this at noon today.
Then we will begin the process of filing criminal complaint affidavits
on Tenth
circuit judges and judge Joseph Weis, of the Third circuit.
Dolores K. Sloviter
Chief Judge, Third Circuit
18614 U.S. Courthouse
Philadelphia, PA 19106
215-597-1588
also EARNED a criminal complaint affidavit along with clerks Bradford
Baldus
and Toby Slawsky.
Slawsky earned another for sending US Marshals Lester and Lopez to
investigate me,
with no letter of authorization, for �inappropriate communications.�
The matter of Campos� in camera ex parte meeting with NSA is also
causing CONCERN.
http://www.jya.com/whp043098.htm
NM judge John Conway had an ex parte in camera meeting with Sandia/NSA
high tech
terrorist James Gosler in 1992 in my ADEA lawsuit.
Conway then sealed all of my lawsuit court records and halted discovery.
Then there was the matter in both my and Morales lawsuits of material
showing up in the
final district decisions which was not in pleadings.
A district federal court spy gave us information that Sandia wrote the
decision for, in
Morales case, judge Galvan and my case, John Conway.
These actions by judges and court clerks largely prompted Morales and my
genocide
and crypto incompetence lawsuit.
We know that the federal courts and the legal system are LARGELY
controlled by the
US federal government.
This is becoming more obvious to all by those who read
http://www.jya.com/whp043098.htm.
The US Hidden government is in reality a fascist government.
FASCISM - a political and economic movement, strongly nationalistic,
magnifying the rights
of the state as opposed to those of the individual, in which industry,
though remaining largely
under private ownership, and all administrative political units, are
controlled by a strong central government.
Since Morales and I have both lost money as a result of actions of a
fascist government, we struck at the heart of the US Hidden government
[aka The Great Satan] with our genocide and crypto incompetence lawsuit.
Representative Cynthia McKinney [CYMCK at mail.house.gov ] and Senator
Grassley [chuck_grassley at grassley.senate.gov] are in possession of the
Swiss Radio International audio tape telling the saga of Hans Buehler�s
arrest in Teheran in 1992 for espionage.
Hopefully those who are concerned can share their concerns about
possible consequences of NOT releasing our requested documents on
Internet. And, too, encourage settlement of this NSA-caused American
tragedy. http://caq.com/cryptogate
http://www.aci.net/kalliste/speccoll.htm
Morales and I continue to feel that we should settled this unfortunate
matter before it gets WORSE.
Later
bill
From vpuser at u041.oh.vp.com Wed May 13 09:23:37 1998
From: vpuser at u041.oh.vp.com (ADMIN-Standard VP login)
Date: Wed, 13 May 1998 09:23:37 -0700 (PDT)
Subject: Question reports on Y2K report
Message-ID:
Hello,
Has anyone read "The McAlvany Intelligence Advisor" of Febuary 1998?
Title:
The millenium Bug: Global cyber-meltdown in the year 2000 PART 1
Mr McAlvany has a very domesday perspective. Does his report have
alot of Truth or alot of Hype?
Please don't flame me to hard for my ignorance, I'm just attempting
to seperate the CHAF from the WHEAT.
Thank you for any guidance
Brian
--
From gibreel at pobox.com Wed May 13 09:43:42 1998
From: gibreel at pobox.com (Stephen Zander)
Date: Wed, 13 May 1998 09:43:42 -0700 (PDT)
Subject: Chaffing and winnowing
In-Reply-To: <01bd7e04$5802a820$014ce9c7@markdsk.peganet.com>
Message-ID: <874syut9ld.fsf@wsuse5.mckesson.com>
>>>>> "Mark" == Mark Rosen writes:
Mark> Note: 5A002 does not control the following: b. Equipment
Mark> containing ``fixed'' data compression or coding techniques;
Mark> ... g. Data authentication equipment that calculates a
Mark> Message Authentication Code (MAC) or similar result to
Mark> ensure no alteration of text has taken place, or to
Mark> authenticate users, but does not allow for encryption of
Mark> data, text or other media other than that needed for the
Mark> authentication;
But wasn't that the gist of Rivest's paper: he's not encrypting the
message, he's just obscuring it really, really well.
All this needs someone with the cash & the time to push it to court...
--
Stephen
---
all coders are created equal; that they are endowed with certain
unalienable rights, of these are beer, net connectivity, and the
pursuit of bugfixes... - Gregory R Block
From whitelaw at ndirect.co.uk Wed May 13 10:20:42 1998
From: whitelaw at ndirect.co.uk (whitelaw at ndirect.co.uk)
Date: Wed, 13 May 1998 10:20:42 -0700 (PDT)
Subject: Encryption trends and legal issues
Message-ID: <3559D6C3.DF4EBD3@ndirect.co.uk>
I am looking for information on the legal and export issues on
encryption around the world and the current use of different encryption
algorithms today.
If anyone can send me some information or point me to the appropriate
sites I would be most grateful.
Thanks,
Gavin.
From rah at shipwright.com Wed May 13 11:00:00 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 13 May 1998 11:00:00 -0700 (PDT)
Subject: Philodox Symposium: Digital Bearer Transaction Settlement
Message-ID:
--- begin forwarded text
X-Sender: rah at pop.sneaker.net
Mime-Version: 1.0
Date: Wed, 13 May 1998 12:54:33 -0400
To: Digital Bearer Settlement List
From: Robert Hettinga
Subject: Philodox Symposium: Digital Bearer Transaction Settlement
Sender:
Precedence: Bulk
List-Subscribe:
X-Web-Archive: http://www.philodox.com/dbs-archive/
-----BEGIN PGP SIGNED MESSAGE-----
Announcement Date: May 13, 1998
The Philodox Symposium on Digital Bearer Transaction Settlement
The Downtown Harvard Club
Boston, Massachusetts
July 23-24, 1998
Philodox Financial Technology Evangelism, of Boston, Massachusetts, in
association with the Digital Commerce Society of Boston, announces the
first in a series of symposia, conferences and workshops on the subject of
digital bearer transaction settlement.
The first of these gatherings, a symposium examining the technology,
economics, markets and law of digital bearer settlement, will be held at
the Harvard Club of Boston, Thursday and Friday, July 23 and 24, 1998.
What is Digital Bearer Settlement?
A digital bearer transaction is one where a cryptographically secure
value-object, issued and underwritten by a third party, is exchanged
between the two parties in a trade, typically over a public internetwork.
The object, when passed in trade for something else of value, executes,
clears, and settles the transaction instantaneously, securely, and,
usually, anonymously. And, at considerable savings in transaction cost
compared to "book-entry" transactions, such as credit and debit cards,
checks, and modern securities clearing methods.
It is estimated that $100 billion in transactions are being executed on the
internet annually. 40% of all retail stock trades are now executed from
the net, for instance. If it's possible to properly call a credit card
transaction transmitted under Secure Socket Layer to be settled and cleared
on the net itself, then an estimated maximum of $10 billion of those
transactions, 10%, are actually cleared and settled on the net, with
marginal market share to other transaction protocols. By comparison, $3
trillion in foreign exchange transactions are executed, cleared and settled
every day, using standard book-entry processes.
There are electronic check and debit protocols in experimental development,
but, as transaction settlement time tends towards the instantaneous, the
more cost, security, and non-repudiation advantages there are for digital
bearer settlement.
It is not unreasonable to see how transaction costs can be reduced
enormously by digital bearer settlement, possibly by several orders of
magnitude over any analogous book-entry method. It is completely
conceivable that digital bearer transactions, of all kinds and sizes, from
macrobonds to micropayments, will be executed, cleared, and settled on
ubiquitous global internetworks, and will become the dominant transaction
mechanism over time on those networks, and, by extension, in the global
economy in general.
It may happen sooner than we can imagine. Electronic book-entry settlement
itself is only 40 years old at best, and internet financial cryptography
and digital bearer settlement are much more a phenomenon of collapsing
microprocessor prices than electronic book-entry settlement ever was.
The Philodox Digital Bearer Transaction Settlement Events
Towards that end, Philodox has taken it upon itself to focus the attention
of the information technology, financial and legal communities onto the
technology of digital bearer settlement though the following series of
events. First, this initial Symposium of professionals interested in
digital bearer settlement, to be held in Boston. Then, contingent on
interest, a peer-reviewed Financial Research Conference to be held
during the winter of 1998-99 in Manhattan or Washington, followed by a
small Developer's Conference in the spring of 1999, held in more casual
surroundings, and, finally, a teaching Workshop for Financial Professionals
held in the summer of 1999 at a resort location, probably Bretton Woods, New
Hampshire. It is hoped by Philodox that some, or perhaps, all, of these
events will be recurring ones, and of course, that they will increase in
attendance over time.
The Symposium
Each section of the Symposium agenda will consist of a short presentation
on the topic by the most expert symposium participant on the subject
present, followed by discussions led by a moderator. While it is not
expected that everyone will even be conversant on each topic, it is
expected that participants will bring their own particular expertise to
bear on specific elements of the symposium program, and, of course, not
everyone will have to present something.
We have a lot to teach each other, but, fortunately, most of the people who
are interested enough in this topic to come to this first symposium will
know more than enough to have at least some opinions on the topics under
discussion, and will certainly want to share those opinions with everyone
else. Finally, there are lots of differing opinions this subject, so
expect some animated discussion.
Because of the expected demand and the size of the Harvard Club space we're
using, participation in the symposium will be limited, and advance
registration will be required. See below for details.
The Symposium Agenda
Agenda
The Philodox Symposium on Digital Bearer Transaction Settlement
The Downtown Harvard Club of Boston
July 23-24, 1998
Thursday, July 23, 1998
(Club Dress Code: jacket and tie, no jeans or sneakers)
0730-0830: Check-in, Breakfast
0830-0845: Welcome
0845-1015: History of Bearer Transaction Settlement
How old is bearer settlement?
Why should we think about physical bearer settlement?
What were the market models for underwriting digital bearer
instruments?
What sanctions prevented non-repudiation?
What happened to physical bearer settlement?
What is digital bearer settlement?
How was it invented?
What is the status of digital bearer settlement now?
1015-1030: Break
1030-1200: Digital Bearer Settlement Technology Survey and Forecasts
What are the different digital bearer settlement protocols?
How do they work?
Which ones are on the market today?
What are some of the technical limits of these protocols?
Can they be overcome and do they need to be?
What kinds of technology is in the labs?
1200-1300: Lunch
1300-1500: Bearer Settlement Legal/Regulatory Survey and Forecasts
How did we get transaction regulation in the first place?
What are the legal restrictions on bearer transactions
in general?
What are the laws on strong cryptography?
How do the above laws and regulations effect the prospects
for digital bearer settlement?
What effect will cash-settled, and possibly anonymous,
digital auction markets have on intellectual property rights?
1500-1515: Break
1515-1715: Possible Legal/Regulatory Solutions
What can be done about bearer settlement law and regulation?
Are there ways that internet digital bearer settlement can
coexist with book-entry settlement laws?
Will the potential cost savings overcome the need to regulate?
What about intellectual property laws?
Should there be a legislative/regulatory strategy?
If so, what would it look like?
1730-1930: Reception, Cocktails and Hors d'Oeurves
Friday, July 23, 1998
(Dress Code: "business casual", no jeans or sneakers)
0800-0830: Breakfast
0830-0845: Announcements
0845-1015: Internet Transaction Settlement Economic/Financial Survey
and Forecasts
What is the annual dollar volume of all transactions worldwide?
How are they broken up by payment mechanism?
What is the actual and forecasted dollar volume of internet
transaction execution?
How will those transactions clear and settle?
What are the current clearing and settlement costs?
What are the expected costs of internet digital bearer
settlement?
What is the micro- and macroeconomic impact of a digital bearer
settled economy?
1015-1030: Break
1030-1200: Capital Market Applications for Digital Bearer Settlement
What kinds of securities can you create digital bearer
instruments for?
How do they work?
How do you vote stock, collect dividends, etc.?
Can you really do limited liability in software, without law?
What size transactions can be cleared and settled like this?
How much transaction volume can a digital bearer market handle?
1200-1300: Lunch
1300-1430: Other Market Applications for Digital Bearer Settlement
Just how ubiquitous can the internet be?
Can you create cash settled pay-per-use utilities? Even roads?
Digital bearer gambling tokens? "Digital Collectibles"??
Lions, and tigers, and bears: "Perfect kidnappings",
"crypto-anarchy", auction markets for force, geodesic warfare,
the end of civilization as we know it, and other monsters
under the bed.
1430-1445: Break
1445-1630: New Product/Market Ideas for Digital Bearer Settlement
Who are the entrepreneurs?
What else can we do with digital bearer instruments?
When is the transition to digital bearer settlement
going to happen?
Where's the most bang for the buck, right now?
How are we going to make money on this?
1630-1645: Closing
Symposium Cost and Registration
The cost for the Philodox Symposium on Digital Bearer Transaction
Settlement is $447, payable by company check or personal money order to
"Philodox", and sent to Robert Hettinga, Philodox Financial Technology
Evangelism, 44 Farquhar Street, Boston, MA, 02131, USA. Massachusetts
residents should add 6% sales tax. Please contact Robert Hettinga
, or for wire
instructions if it is necessary to make your payment by bank wire.
Include the participant(s) name, shirt size, email address, and company
affliation, if applicable, with your check or money order. Confirmation of
your check and your Symposium seat will be sent by email. If you pay by
wire, please notify Mr. Hettinga by email that you intend to do so, and
include in your email the other requested information.
In order to organize the Symposium properly, payment must be received by
Philodox no later than noon, Thursday, July 9th, 1998. Again, attendance to
the Symposium is limited, so please register as soon as possible to assure
your seat.
The Symposium fee goes towards conference room rental, breakfasts,
lunches, a cocktail reception on Thursday night, snacks, audio-visual
rental, internet access on-site, various mementoes of the occasion, and, of
course, Philodox's event management fee.
Scholarships
A small number of scholarship fee-waivers will be available, contingent
upon direct sponsorship and the size of the Symposium, to be selected by
Philodox and based upon the applicant's financial need and ability to
contribute to the symposium. Please contact Robert Hettinga, , or , if you want to request
a fee-waiver.
Sponsorship
In addition to direct event and website sponsorship opportunities,
including the possiblity of exhibition space, there are several in-kind
sponsorship opportunites available, particularly in the areas of
audio-video services and internet services, including internet access,
web-casting and web-page development. Please contact Robert Hettinga,
, or , if you're
interested in in-kind or direct sponsorship of the Symposium.
The Digital Bearer Settlement Email List: dbs at philodox.com
As part of Philodox's ongoing support of the technology of digital bearer
settlement, an email list has been established to discuss the technology
and it's ramifications in an unmoderated, informal setting. Please see
to see the archives of the Digital Bearer
Settlement discussion list, and its subscription information. If there is
enough demand, an additional announcement list for the Symposium itself
will be created, but it is hoped that the Symposium's participants will use
dbs at philodox.com as a "watering hole" for their discussions.
Who is Philodox?
Philodox is a new financial technology evangelism company founded by Robert
Hettinga, founder of the Digital Commerce Society of Boston, and founding
moderator and editor of several internet discussion lists and newsletters
on digital commerce and financial cryptography. Mr Hettinga is also the
founder of both the International Conference on Financial Cryptography, and
the International Financial Cryptography Association.
For more information on Philodox, please see . For
more information on Robert Hettinga, please see .
For more information on the Digital Commerce Society see . For more information on the
International Conference on Financial Cryptography, see
.
See You in Boston!
Cordially,
Robert Hettinga
Founder,
Philodox Financial Technology Evangelism
Boston, Massachusetts
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQEVAwUBNVnPvMUCGwxmWcHhAQGEDwf6AzFX53KDFRwNieTsU7M19nLf7F88BNWM
bu+ii9aJsrAFlvkllyFuruVMjEWiYpNTfj5xPEJaaIxeHFRR6vNJet7XekAMjg1O
ZeYzs86I9DovtSIpSuSt3uHcPuwPgE9ZvO0parHwUl64uZ1cTldExYPCaquqU1K0
YzOVI+01MNKs/T5Zo68nRhkm1DfzYCE3DjKs4YA2mgA8nmgpqjhbnncOYATgv3Up
H+RRLLVSHD3nKh2RdK49RtGpRg6YvDRI3FP0vPaPTAMNy6A0KREhcnixZp8CZhBC
X510YO4ctlUkcS6esfSL9NyDZNlvLPZ4DdFveFgCurqvrUF5dyHMvQ==
=6min
-----END PGP SIGNATURE-----
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
--- end forwarded text
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
From jim at mentat.com Wed May 13 11:18:31 1998
From: jim at mentat.com (Jim Gillogly)
Date: Wed, 13 May 1998 11:18:31 -0700 (PDT)
Subject: Encryption trends and legal issues
Message-ID: <9805131814.AA00340@mentat.com>
Gavin skribis:
> I am looking for information on the legal and export issues on
> encryption around the world and the current use of different encryption
> algorithms today.
For legal/export issues:
http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm
He keeps it up-to-date, and it covers the world. For current use of
different encryption algorithms, I think TIS has a continuing project
monitoring availability of packages worldwide using different systems.
Jim Gillogly
From vpuser at u041.oh.vp.com Wed May 13 12:12:05 1998
From: vpuser at u041.oh.vp.com (ADMIN-Standard VP login)
Date: Wed, 13 May 1998 12:12:05 -0700 (PDT)
Subject: Question reports on Y2K report
Message-ID:
Declan,
Unfortunately it does not have a URL it is a printed report ( Febuary
1998), & I was given a copy of it. One paragraph in the report ( that
I have read so far) does reference http://www.garynorth.com
==========
NOTE:
Have not had the time to look at the Home Page for the report, but
could possibly be at http://www.mcalvany.com
===========
However, the report it self discusses all areas that the Y2K bug could
affect. The Only location, that I have found so far, is at the
subscription office ( subscription is to high for me )
MIA
P.O. Box 84904
Phoenix, AZ 85071
Brian
>
> Want to give me a URL?
>
> -Declan
>
>
>
--
From nobody at REPLAY.COM Wed May 13 12:43:04 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 13 May 1998 12:43:04 -0700 (PDT)
Subject: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC)
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805131942.VAA17993@basement.replay.com>
Steve Crisp > The thread you're whining about involved Steve Crisp
> > threatening an anonymous poster with "beating the living fuck out of you"
> > if his/her identity could be determined...
>
> And it still stands. Come out of hiding and see if you survive the
> night.
>
> Steve Crisp
Does anyone question the need for the ability to post anonymously with
censorious bullies like him running loose? Him and Belinda Bryan
threatening to "make life a living hell" for anyone
who dares to criticize her anonymously, that is.
Someone posts something he didn't like and he threatened that person with
bodily harm. I criticize him anonymously for making that threat, and now
he threatens me, too. That sure makes PagePlanet sound like a company I'd
like to do business with:
PagePlanet (PAGEPLANET-DOM)
3252 Octavia Street
Raleigh, NC 27606
US
Domain Name: PAGEPLANET.COM
Administrative Contact:
Crisp, Steve (SC2795) crisp at PAGEPLANET.COM
919-852-5262 (FAX) 919-233-0816
Technical Contact, Zone Contact:
Sullivan, Mikey (MS5652) mikey at PAGEPLANET.COM
919-852-5262 (FAX) 919-852-5261
Billing Contact:
Crisp, Valerie (VC370) valerie at PAGEPLANET.COM
919-233-6602 (FAX) 919-852-5261
Record last updated on 10-Feb-98.
Record created on 25-Nov-96.
Database last updated on 13-May-98 03:50:14 EDT.
Domain servers in listed order:
DNS.PAGEPLANET.COM 205.152.36.2
DNS2.PAGEPLANET.COM 205.152.36.3
DNS3.PAGEPLANET.COM 208.194.157.172
From billp at nmol.com Wed May 13 12:54:02 1998
From: billp at nmol.com (bill payne)
Date: Wed, 13 May 1998 12:54:02 -0700 (PDT)
Subject: Pottery, Stalingrad , Fascists, Sandinistas, and settlement, of course
Message-ID: <3559F93A.1828@nmol.com>
Wednesday 5/13/98 1:17 PM
John Young
J Orlin Grabbe
Tuesday evening Patty and I journeyed to Placitas, NM.
Patty was going to have some kindergarten student pottery
projects kiln fired.
Karl and Mary Hofmann are fine artists. Pottery.
Both are graduate school graduates in fine arts.
Karl is German-born.
Karl told me his brother helped build the Russian pipeline system.
And it isn�t buried deep enough.
Karl told me his brother was captured at Stalingrad.
I think that I read that only about 10% who were captured at Stalingrad
lived to return. http://www.semionoff.com/cellular/hacking/phreaking/
Patty and I bought you both identical gifts from Hofmann�s.
I am on the way to mail them.
Thank you both for so much for what you both have done. Visibility.
http://jya.com/whpfiles.htm
http://www.aci.net/kalliste/
The Hidden US Government was trying to bury us in their invisible grave
yard.
But NOW the WORLD is on to the composition of the US Hidden Government.
FASCISM - a political and economic movement, strongly nationalistic,
magnifying the rights
of the state as opposed to those of the individual, in which industry,
though remaining largely
under private ownership, and all administrative political units, are
controlled by a strong central government.
Especially, after all of this, aggrieved Shiite Muslims.
http://www.wpiran.org/
And now, perhaps, even Sandinistas too.
Carlos brought Swiss Radio International audio tape to Nicaragua this
spring from Moscow ... Idaho,
that is. http://caq.com/cryptogate
Let�s all hope for prompt PEACEFUL settlement of this HORRIBLE chapter
in US history.
Later
bill
From cons0005 at algnet.algonquinc.on.ca Wed May 13 14:06:26 1998
From: cons0005 at algnet.algonquinc.on.ca (cons0005 at algnet.algonquinc.on.ca)
Date: Wed, 13 May 1998 14:06:26 -0700 (PDT)
Subject: Email Bot
Message-ID: <199805132105.RAA10590@algnet.algonquinc.on.ca>
I was wondering if anyone knows of such a creature that I could send
email to with an URL, and I would get a reply of that HTML file?
example I email bot at somewhere.com with the
Subject:http://www.hotmail.com
and I will get an email of the HTML file at www.hotmail.com
This would be handy because I don't have a broswer (2 meg RAM (I
know)) and also for anonymity, cookies etc I couldn't be traced.
When you send mail, do you use a postcard or an envelope?
Get PGP (tm) my pgpID@ 0xD0186E85
http://wabakimi.carleton.ca/~nmarion/pgp.html -yashy-
From jya at pipeline.com Wed May 13 14:55:40 1998
From: jya at pipeline.com (John Young)
Date: Wed, 13 May 1998 14:55:40 -0700 (PDT)
Subject: International Crime Control Strategy
Message-ID: <199805132155.RAA03248@dewdrop2.mindspring.com>
THE WHITE HOUSE
Office of the Press Secretary
________________________________________________________________________
For Immediate Release May 12, 1998
INTERNATIONAL CRIME CONTROL STRATEGY
BACKGROUND
International crime is a serious and potent threat to the American
people at home and abroad. Drug and firearms trafficking, terrorism,
money laundering, counterfeiting, illegal alien smuggling, trafficking
in women and children, advanced fee scams, credit card fraud, auto
theft, economic espionage, intellectual property theft, computer
hacking, and public corruption are all linked to international criminal
activity and all have a direct impact on the security and prosperity of
the American people.
Americans spend billions of dollars annually on cocaine and heroin, all
of which originates abroad; in 1997, there were 123 terrorist attacks
against U.S. targets worldwide, including 108 bombings and eight
kidnappings; each year, approximately one billion dollars worth of
stolen cars are smuggled out of this country; annually, U.S. companies
lose up to $23 billion from the illegal duplication and piracy of films,
compact discs, computer software, pharmaceutical and textile products,
while U.S. credit card companies suffer losses of hundreds of millions
of dollars from international fraud; and several hundred U.S. companies
and other organizations have already suffered computer attacks in 1998,
resulting in millions of dollars of losses and significant threats to
our safety and security.
PURPOSE
The International Crime Control Strategy (ICCS) addresses this
increasing threat by providing a framework for integrating all facets of
the federal government response to international crime. This first-ever
strategy reflects the high priority accorded international crime by this
Administration and builds on such existing strategies as the National
Drug Control Strategy and the Presidential Directives on alien
smuggling, counter-terrorism and nuclear materials safety and security.
The ICCS is also an important initiative in terms of enhancing the
ability of U.S. law enforcement officials to cooperate effectively with
their overseas counterparts in investigating and prosecuting
international crime cases. At the upcoming Birmingham Summit, G-8
leaders will discuss international crime as one of the most pressing
issues related to increasing globalization and rapid technological and
economic change. President Clinton will highlight the new ICCS in
underscoring the U.S. commitment to close cooperation with all nations
who are mobilizing to confront this increasing threat.
OVERVIEW
The ICCS is a plan of action containing eight broad goals with thirty
implementing objectives. The ICCS expresses President Clinton's resolve
to combat international crime aggressively and substantially reduce its
impact on the daily lives of the American people.
The Strategy's eight goals and related objectives are:
1. Extend the First Line of Defense Beyond U.S. Borders by
(a) preventing acts of international crime planned abroad before
they occur, (b) using all available laws to prosecute select
criminal acts committed abroad, and (c) intensifying activities
of law enforcement, diplomatic and consular personnel abroad.
2. Protect U.S. Borders by (a) enhancing our land border inspection,
detection and monitoring capabilities, (b) improving the
effectiveness of maritime and air smuggling interdiction efforts,
(c) seeking new, stiffer criminal penalties for smuggling
activities, and (d) targeting enforcement and prosecutorial
resources more effectively against smuggling crimes and
organizations.
3. Deny Safe Haven to International Criminals by (a) negotiating new
international agreements to create a seamless web for the prompt
location, arrest and extradition of international fugitives,
(b) implementing strengthened immigration laws that prevent
international criminals from entering the United States and
provide for their prompt expulsion when appropriate, and
(c) promoting increased cooperation with foreign law enforcement
authorities.
4. Counter International Financial Crime by (a) combating money
laundering and strengthening enforcement efforts to reduce inbound
and outbound movement of criminal proceeds, (b) seizing the assets
of international criminals, (c) enhancing bilateral and
multilateral cooperation against all financial crime, and
(d) targeting offshore centers of international fraud,
counterfeiting, electronic access device schemes and other
financial crimes.
5. Prevent Criminal Exploitation of International Trade by (a)
interdicting illegal technology exports, (b) preventing unfair and
predatory trade practices in violation of U.S. criminal law, (c)
protecting intellectual property rights, (d) countering industrial
theft and economic espionage of U.S. trade secrets, and (e)
enforcing import restrictions on certain harmful substances,
dangerous organisms and protected species.
6. Respond to Emerging International Crime Threats by (a) disrupting
new activities of international organized crime groups,
(b) enhancing intelligence efforts against criminal enterprises,
(c) reducing trafficking in human beings and crimes against
children, (d) increasing enforcement efforts against high tech
and computer-related crime, and (e) continuing to identify and
counter the vulnerabilities of critical infrastructures and new
technologies in high tech areas.
7. Foster International Cooperation and the Rule of Law by
(a) establishing international standards, goals and objectives to
combat international crime and by actively encouraging compliance,
(b) improving bilateral cooperation with foreign governments and
law enforcement authorities, and (c) strengthening the rule of law
as the foundation for democratic government and free markets in
order to reduce societies' vulnerability to criminal exploitation.
8. Optimize the Full Range of U.S. Efforts by (a) enhancing executive
branch policy and operational coordination mechanisms to assess
the risks of criminal threats and to integrate strategies, goals
and objectives to combat those threats, (b) mobilizing and
incorporating the private sector into U.S. government efforts, and
(c) developing measures of effectiveness to assess progress over
time.
ICCS INITIATIVES
Highlighted below are ten Administration initiatives to further our
efforts to fight international crime.
1. International Crime Control Act of 1998: Proposed legislation
containing significant new law enforcement tools for the fight against
international crime.
2. Comprehensive Threat Assessment: A comprehensive assessment of the
threat to the American people posed by international crime, to be
completed within six months.
3. International Conference on Upholding Integrity Among Justice and
Security Officials: An international conference to address upholding
integrity among key justice and security officials worldwide, to be
organized by the Vice President within the next six months.
4. High Tech Crime: An action plan, building on the work of the G-8
justice and interior ministers and the creation of the U.S. National
Infrastructure Protection Center, to protect interconnected U.S.
communications and information systems from attack by international
criminals.
5. Border Law Enforcement: A program to enhance border law enforcement
through deployment of advanced detection technology and investment of
new resources.
6. Financial Crimes: A commitment to employ aggressively new tools to
deny criminals access to U.S. financial institutions and to enhance
enforcement efforts against financial crimes.
7. International Asset Forfeiture and Sharing: A U.S. call for new
criminal asset forfeiture regimes worldwide and new asset forfeiture
sharing agreements with our international partners.
8. OAS Treaty Against Illicit Trafficking in Firearms: A program to
work with our OAS partners to implement fully a hemispheric convention
to combat the illicit manufacturing of and trafficking in firearms,
ammunition and explosives.
9. Economic Espionage and Theft of Industrial Property: A commitment
to use the Economic Espionage Act to increase U.S. investigations and
prosecutions of individuals and companies who attempt to steal U.S.
proprietary information.
10. Strategic Communications Plan: A plan to engage the private
sector in assessing the impact of international crime on that sector
and in determining its appropriate role in countering this threat.
From jya at pipeline.com Wed May 13 15:10:42 1998
From: jya at pipeline.com (John Young)
Date: Wed, 13 May 1998 15:10:42 -0700 (PDT)
Subject: Senate Intel Committee on Crypto
Message-ID: <199805132210.SAA30435@dewdrop2.mindspring.com>
>From Senate Intelligence Committee Report 105-185, on intelligence
funding for FY1999, May 7, 1998:
Encryption
The Committee remains concerned about efforts to
inappropriately ease or remove export restrictions on hardware
and software encryption products. Export controls on encryption
and other products serve a clearly defined purpose--to protect
our nation's security. Therefore, the Committee believes that
the effects on U.S. national security must be the paramount
concern when considering any proposed change to encryption
export policy, and will seek referral of any legislation
regarding encryption export policy under its jurisdiction
established under Senate Resolution 400.
Export restrictions on encryption products assist the
Intelligence Community in its signals intelligence mission. By
collecting and analyzing signals intelligence, U.S.
intelligence agencies seek to understand the policies,
intentions, and plans of foreign state and nonstate actors.
Signals intelligence plays an important role in the formation
of American foreign and defense policy. It is also a
significant factor in U.S. efforts to protect its citizens and
soldiers against terrorism, the proliferation of weapons of
mass destruction, narcotics trafficking, international crime
and other threats to our nation's security.
While the Committee recognizes the commercial interest in
easing or removing export restrictions, it believes the safety
of our citizens and soldiers should be the predominant concern
when considering U.S. policy towards the export of any product.
The Committee supports the continued control of encryption
products, and believes that a comprehensive strategy on
encryption export policy can and must be developed that
addresses national security concerns as well as the promotion
of American commercial interests abroad. The Committee looks
forward to working with senior Administration officials in
developing such a strategy.
-----
Full report:
http://jya.com/sr105-185.txt (94K)
From mgraffam at mhv.net Wed May 13 15:20:41 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Wed, 13 May 1998 15:20:41 -0700 (PDT)
Subject: Email Bot
In-Reply-To: <199805132105.RAA10590@algnet.algonquinc.on.ca>
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
On Wed, 13 May 1998 cons0005 at algnet.algonquinc.on.ca wrote:
> I was wondering if anyone knows of such a creature that I could send
> email to with an URL, and I would get a reply of that HTML file?
> example I email bot at somewhere.com with the
> Subject:http://www.hotmail.com
>
> and I will get an email of the HTML file at www.hotmail.com
> This would be handy because I don't have a broswer (2 meg RAM (I
> know)) and also for anonymity, cookies etc I couldn't be traced.
Uhm.. this service used to exist.. I dont know what the email addy
was though :(
Another solution is to find a school that has a publicly usable lynx
account. Lynx is a text-based browser for Unix, and is fully usable
from a telnet session. Lynx is a nice browser. I use it all the time
on my local machine in an xterm. Yeah, I could fire up netscape ..
but lynx is better. :)
Try telneting to:
sailor.lib.md.us login: guest
trfn.clpgh.org login: trfn
bob.bob.bofh.org login: supply your email address
public.sunsite.unc.edu login: lynx
lynx.cc.ukans.edu login: lynx
Be nice to these machines.
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"..the isle is full of noises, sounds and sweet airs that give delight and
hurt not. Sometimes a thousand twangling instruments will hum about mine
ears, and sometimes voices.." Caliban, Shakespeare's "The Tempest"
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv
iQCVAwUBNVoavgKEiLNUxnAfAQEbDgQAlLpdQL5GgLROhRb03T9P+YNAmhgPHzdX
JIpKx5ZDMn4IfEatfX1VWfNRdVjxAjn0cf1A0bx7ybB0XBjwP6DYR97Vy916ZVzj
LhFzNa0PLDkCbQUZBdicduoPA4LPRiRXFS0+AgFalCcCVpxx/l7bNdi8yAwv+1xp
dOQ2zjAJLvo=
=8E9+
-----END PGP SIGNATURE-----
From mrosen at peganet.com Wed May 13 15:46:22 1998
From: mrosen at peganet.com (Mark Rosen)
Date: Wed, 13 May 1998 15:46:22 -0700 (PDT)
Subject: Chaffing and winnowing
Message-ID: <01bd7ebe$f2941940$014ce9c7@markdsk.peganet.com>
> Mark> ... g. Data authentication equipment that calculates a
> Mark> Message Authentication Code (MAC) or similar result to
> Mark> ensure no alteration of text has taken place, or to
> Mark> authenticate users, but does not allow for encryption of
> Mark> data, text or other media other than that needed for the
> Mark> authentication;
>
>But wasn't that the gist of Rivest's paper: he's not encrypting the
>message, he's just obscuring it really, really well.
>
>All this needs someone with the cash & the time to push it to court...
>
Actually, the first parts I quoted applied to chaffing and winnowing
too:
a. Designed or modified to use ``cryptography'' employing digital techniques
to ensure ``information security'';
b. Designed or modified to perform cryptanalytic functions;
c. Designed or modified to use ``cryptography'' employing analog techniques
to ensure ``information security'';
Part a. basically prevents any sort of "encryption" technique, whether
that technique uses a normal encryption algorithm, a hash function, or
quantum cryptography -- anything that can be used for "information security"
I think that the NSA knew about chaffing and winnowing, and they talked
with the people who wrote the EAR and helped them make the legislation cover
chaffing and winnowing.
Please know that I, in no way, like the EAR; it just seems that
everyone's hopes that chaffing and winnowing gets around the export controls
are invalid. The EAR doesn't care *how* you do the encryption, it only cares
that some sort of "encryption" was performed.
Are there any legal-types out there that can give a more definitive
answer?
- Mark Rosen
http://www.mach5.com/
From gburnore at netcom.com Wed May 13 17:02:16 1998
From: gburnore at netcom.com (Gary L. Burnore)
Date: Wed, 13 May 1998 17:02:16 -0700 (PDT)
Subject: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC)
In-Reply-To: <3555FA78.7795@pageplanet.com>
Message-ID: <35613238.439321674@206.214.99.10>
On Wed, 13 May 1998 15:11:11 +0200 (MET DST), in article
<199805131311.PAA05504 at basement.replay.com>, nobody at REPLAY.COM (Anonymous)
wrote:
:eridani at databasix.com (Belinda Bryan) wrote:
:
:> And there we have it, folks. The anonymous stalker who's spent the past
:> year following Gary Burnore around Usenet found a post in
:> triangle.general that mentioned him, added a propaganda-filled follow up
:> to it, and posted it to 9 newsgroups--many of whom have repeatedly
:> requested that this crap be kept out of said groups.
:
:"Anonymous stalker"? For merely posting a reply to a public post on
:Usenet? What state or country has a statute against that, and what makes
:you think the poster falls under its jurisdiction if it does exist? As for
:whether a certain post is "propaganda", that is for the reader to decide,
:especially when of the content is independently verifiable. The
:"propaganda" you refer to was apparently intended to refute the fallacious
:assertion that since Gary Lee Burnore's entry in the North Carolina
:official database of registered sex offenders had apparently been removed,
:then the underlying crime for which he was convicted and required to
:register somehow automagically never happened. To make such an assertion
:is to invite rebuttal.
Only for someone as obsessed in this as you. Everyone else I've seen post
except those who have a grudge directly against me has said something similar
to "who gives a fuck?" Your obsession continues.
:
:The thread you're whining about involved Steve Crisp
:threatening an anonymous poster with "beating the living fuck out of you"
:if his/her identity could be determined, a second anonymous poster
:challenging the propriety of such a threat, and yet another DataBasix
:groupie, William McClatchie , calling the second
:anonymous poster a "remailer abuser" for daring to make such a challenge.
:So rather than denouncing the threat itself, you choose to call the person
:challenging it an "anonymous stalker"? If you feel no need to "hide"
:anything, please feel free to post your street address and home phone
:number. But I imagine that many people with small children would not want
:their names, from which their street address can be derived by someone with
:the resources available to you and Gary Burnore, to fall into the hands of
:a convicted child molester with a history of abusive retaliation.
Geesh you ignorant fuck. It's been posted more times than I can count. You
don't remember posting it right? Oh wait, that was someone else who's obsessed
with me right? Uh huh. The same way you posted Steve's info you posted mine.
:
:Being threatened with physical violence for making an unpopular post is
:one of the best arguments available as to why anonymity is necessary when
:people like Steve Crisp and convicted child molester Gary Lee Burnore are
:running around loose making those threats.
If people like you weren't allowed to abuse remailers, people like chris
wouldn't make comments that he knows are not threats to draw you out. You buy
it hook line and sinker. You must certianly know that he's not threatning
anyone since you're posting anonymously and he couldn't possibly know who you
are. But obsessed as you are you can't take it.
:
:> Oh and lookee what else: it was mailed to cypherpunks at toad.com,
:> presumably for archival on the cypherpunks mailing list, where it will
:> be picked up by WWW search engines. Since those folks don't seem to
:> mind having their archives used in personal grudge matches, I'll just
:> start cc'ing my responses there as well. I'm sure, as champions of free
:> speech, they can understand the necessity of making sure both sides of
:> the story get equal time.
:
:This, of course, comes from the same Belinda Bryan who impersonated a
:lawyer for DataBasix to demand the disclosure of (fortunately non-existant)
:user logs from the Huge Cajones remailer in a failed Scientology-esque
:attempt to embarass its users.
More lies from the obsessed one as Belinda NEVER impersonated a lawyer for
anyone. Beating dead horses is your specialty isn't it?
: And that attack, BTW, started because Gary
:Burnore was pissed that an anonymous whistle blower used a remailer to tip
:of his victim's mother to the molestation. As is typical of his style,
:Burnore denounced that legitimate use of anonymity as "harassment" and
:"abuse".
More unproven lies. If you, the anonymous asshole were really interested in
the truth (rather than your obsession with me) you'd get the court documents
and see that the dates do not support your libelous statements. Libelous
statements are the best argument for remailers. If you need to make a
libelous statement, do it from a remailer. Nothing will happen to you. (Other
than folks will begin to ignore the remailer)
:
:It was also Burnore who chose to make PUBLIC what had previously been a
:private e-mail, thus inviting his critics to factually evaluate the claims.
:One of them apparently did so and discovered Gary Burnore's name and mug
:shot were published on an official PUBLIC website of registered sex
:offenders maintained by the state of North Carolina where Burnore moved
:after leaving San Francisco.
More lies from the anonymous asshole. It's not been that long since this
started that people don't remember how and why it was posted to USENet. It
had nothing to do with an email.
: Perhaps he should have learned a lesson from
:Gary Hart and not have taunted the wrong people to find evidence of his
:wrongdoing.
Perhaps I should continue to improve my tracing skills and find you one day.
:
:Will the continual harangue against privacy and anonymity by Gary Lee
:Burnore, Belinda Bryan, Billy McClatchie, and other staffers and sock
:puppets of the DataBasix wrecking crew never end?
Translation: If Gary Burnore and Belinda Bryan and Bill McClatchie leave the
internet, the anonymous asshole will stop lying.
:
:BTW, Belinda, cross-posting your whining drivel in the fashion you're
:threatening negates your lame attempts to achieve deniability by using the
:infamous X-No-Archive header that has become the trademark of DataBasix'
:denizens.
You've never given a valid reason why someone should or should not use an
X-No-Archive header. You hide behind a remailer and libel and then complain
when someone X-No-Archives. Typical hypocritical thinking.
: IOW, you won't be able to retroactively claim that an
:embarassing post from you was "forged" because it's not archived at an
:unbiased, third party site. Can you say "oops"?
Well we'll see about unbiased sites now won't we?
--
for i in databasix netcom primenet ; do ; gburnore@$i ; done
---------------------------------------------------------------------------
How you look depends on where you go.
---------------------------------------------------------------------------
Gary L. Burnore | �۳�ݳ޳�ݳ��ۺݳ޳�ݳݳ޳�ݳ��۳
| �۳�ݳ޳�ݳ��ۺݳ޳�ݳݳ޳�ݳ��۳
DOH! | �۳�ݳ޳�ݳ��ۺݳ޳�ݳݳ޳�ݳ��۳
| �۳ 3 4 1 4 2 ݳ޳ 6 9 0 6 9 �۳
spamgard(tm): zamboni | Official Proof of Purchase
===========================================================================
PGPprint: C63B CF4E 1B71 4D7E C6F8 AF4E 338D 5CB4
KeyID: 0x0F7EDBD9 (RSA) finger gburnore at netcom.com for public key
---------------------------------------------------------------------------
From nobody at base.xs4all.nl Wed May 13 17:34:46 1998
From: nobody at base.xs4all.nl (Anonymous)
Date: Wed, 13 May 1998 17:34:46 -0700 (PDT)
Subject: No Subject
Message-ID: <9083523aabe2496a001be5b119c0dd35@base.xs4all.nl>
I was looking at my RAM when I noticed several passwords I have
frequently used were still there, and as I never turn off my comp, I
was wondering if there is a way you can "clean" your RAM?
I also got errors when installing LILO on my DOS partition, so now I
*CAN'T* boot without a bootdisk, and I think LILO sticks itself on
the master boot record, is there an MBR editor?
Where can I get a list of Candian Remailers?
Is there a DOS and/or Winbloze 3.* Email program that I can "forge"
headers? (ex: Like in Linux fastmail adding: -f billc at whitehouse.gov)
thnx.
From 105263.2354 at compuserve.com Wed May 13 17:51:36 1998
From: 105263.2354 at compuserve.com (105263.2354 at compuserve.com)
Date: Wed, 13 May 1998 17:51:36 -0700 (PDT)
Subject: Complete Internet Marketing
Message-ID: <199805140051.RAA16848@toad.com>
Complete Internet Marketing
The E-mail Resource Center
toll free.....800-942-7913....toll free
fax 732-367-2229
Targeted E-mail Marketing......
No matter what your target is, we can compile a great list for you of people or
businesses that may have an interest in what you have to offer.
We can do all of the email for you and have the replies come directly to your email
address or we can accept the replies for you here and forward the replies to you. Our
addresses are compiled fresh for you as per your order. These email addresses can
even be pulled geographically for you as well.
Address Lists start at $50 per thousand and we can offer you a better price on higher
quantities. Our clients are getting great results, so can you.
Bulk Email Programs.....
MAIL PUSHER
Want Your Mail to get in? We Have �Mail Pusher� -
100% Delivery..State of the art penetration software. A Stealth Type Program on
Steroids. Fast too, with 12 ports 100,000 per hour, 20 ports 160,000 per hour.
Functional Demo Available. Price only $295.00
RAPID FIRE MAIL SERVER
This is the next generation of mass mail software. This allows you to turn your own
computer into a bona fide mail server using a dial-up account or a dedicated ISDN or
T-1. This program has several unique features. It delivers the mail directly from your
computer which is now the mail server to the recipients mail server and let's you watch
each piece of mail get delivered to the recipients mail box. No more guessing and
seeding It sends at about 50,000 to 80,000 per hour from a 28.8 modem. If that isn't
enough the program send in color with simple point and click controls to set font
colors, background colors and make fonts bold, italics as well as align left, right or
center the message.
Demo Available..Price only $395.00
STEALTH MASS MAILER
Stealth Sending Software - Transmits at 250,000 to 350,000 from a 33 modem with a
modest Pentium with 20 connections. THE INDUSTRY WORKHORSE. We are an
authorized dealer offering full support 7 days a week. For a limited time Email pro
(non supported) is included with Stealth at no extra cost, along
with CDS Check by Fax Software for free, plus 9 million addresses.
Demo Available..Price only $295.00
HURRICANE
Extremely fast. This extractor goes to major search engines (you can pick from a list of
10 of the most popular search engines) and conducts a search by keyword or
keywords. It then spiders the web pages that come up as search results extracting the
email addresses and saving them in a plain text format. You can define how deep the
search is to be. You can filter out addresses such as those with webmaster or admin.
You can use additional filters to have the software only include url's containing certain
keywords. It can also eliminate certain url's with specified keywords. This makes for
some very tight targeting. The cost of Hurricane is $295 but scroll down to see the
package deal.
GEO SNAKE
This is a targeted list builder that could also be used to collect general addresses. You
input a city and state and hit the start button, kick back and watch it collect. Quite fast.
Easy to use. The cost of geo Snake is $295.
NEWS SLEUTH
This software extracts email addresses from newsgroup postings by keyword. It
targets. Very fast and easy to use. This software has a number of useful options to help
you get the exact results you want so reading the help file is recommended. The demo
will allow you to see how fast and easy it is to use but will not allow you to save or use
the addresses collected. Cost of News Sleuth is $295.
*Special Deal*
Hurricane, Geo Snake & News Sleuth - all for $595.00
CHERRY PICKER
With this super easy to use software you can target addresses based on search engine
keywords. Examples would be shoe manufacturers, chemical adhesives, retail clothing
stores, airlines, import/export just to use a few examples. Want to know what the
potential yield would be go to a major search engine and enter in a keyword(s) and
see how many hits come up. This multi-threaded software searches seven search
engines simultaneously, visiting the web sites and extracting the email addresses,
removing the duplicates and putting them in plain text files, one address to a line. A
child could learn to use this software in 15 minutes or less. Super easy. It runs in the
background allowing you to perform other tasks with your computer. The yield will
vary according to the search keywords, your system, your Internet connectivity, net
traffic, etc. but the range tends to run from 1000 to 2000 addresses per hour but
remember these are highly targeted lists that others charge big money for. Cherry
Picker costs $295.00
BULK MATE
This is the greatest list manager program we know of. Does everything and then some.
Cost is $199.00 Check out the demo, you'll be glad you did.
We accept Visa/Mastercard/American Express and Check by Fax.
Please call our toll free number for more information on all of our services. You can
instantly download demos of all of our software.
CALL NOW...800-942-7913 OR FAX US AT 732-367-2229
To be removed from our database, please call us toll free and state your email address
(please speak slowly and clearly) so that we can be sure to get your address clearly
and we will honor your request to be removed immediately. We are responsible
Internet Marketers.
Thank you!
From StanSqncrs at aol.com Wed May 13 18:06:39 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Wed, 13 May 1998 18:06:39 -0700 (PDT)
Subject: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is
Message-ID: <4b0c119a.355a436e@aol.com>
In a message dated 5/13/98 7:46:13 PM Central Daylight Time,
gburnore at netcom.com writes:
<< and he couldn't possibly know who you are. >>
It is my humble opinion, that nobody's cover has been blown, he fucked up. He
cross-posted the same exact piece of spam (as some would say) to both me
anonomosly, and to the list roughly at the same time.
Stan Rosenthal
From mixmaster at remail.obscura.com Wed May 13 18:45:01 1998
From: mixmaster at remail.obscura.com (Mixmaster)
Date: Wed, 13 May 1998 18:45:01 -0700 (PDT)
Subject: No Subject
Message-ID: <199805140121.SAA02562@sirius.infonex.com>
[cons0005 at algnet.algonquinc.on.ca wrote:]
I was wondering if anyone knows of such a creature that I could send
email to with an URL, and I would get a reply of that HTML file?
example I email�� bot at somewhere.com with the
Subject:http://www.hotmail.com
and I will get an email of the HTML file at www.hotmail.com
This would be handy because I don't have a broswer (2 meg RAM (I
know)) and also for anonymity, cookies etc I couldn't be traced.
-----
Actually you can do that really very easily. If you are interested in
such Bot's. I really recommend you get O'Reilly's book: Web Client
Programming, with Perl. It discusses to a large degree what your wanting
to do. It has full source code as well, so you can take that and just
fiddle with a bit until it suits your needs. Provided you or someone you
know can program in Perl.
I think one method you could do is to just use a majordomo server and
tinker with it to suit the reception needs. Or you could on your own
box, or a friends box. Make an account to the name you want, set up a
resident program, with nohup or a simple cron job. Or do some script,
that would serve equally as well. That could handle the reception
facilities well enough. Then just use the modified bot to handle the
HTML queries and sending and there you go.
Although sending things back to the HTTP server in question might...
interesting. If that place GET and POST methods for CGI scripts and
dynamic pages, that raises some questions. Particularly, if the bot
sends you the HTML doc that it requested, you view the page, yadda yadda
yadda. It depends on how you want to work it and do it, you have to ask
yourself. Do I want to send my request (whatever that maybe)from my
machine? The request would go through. But it would be through your
machine, and that would invalidate your anonymity. So thats a Bad
Thing(tm) and out of the question. Or in cases like yours, the user
might not have a browser. So that leaves it to us sending our request
back to our automated little daemon and it does it for us. It would
require just a little bit of handling and work to do the GET and POST
methods for the CGI program your interacting with, but that would be
minimal I think. I could be wrong however. In effect your using the bot
as a kind of proxy for HTTP requests.
If your really, REALLY desperate I might be able to quickly just put
something together for you and post it here for you(or if another
cypherpunk thats into Perl wants to do it, or if anyone else has any
ideas). But you should be able to modify the code to suit whatever you
want it to do. I've been experimenting with something similar, only on a
slightly different note. If your patient, you can just subscribe to a
majordomo "admin-help" list. Where the details of running such a thing
are discussed by people that do. I'm sure one quite possibly exists
somewhere. Then log on to a Bot mailing list and after hanging out on
both for a while, asking a few questions perhaps you should be able to
put something together I expect.
Or as mgraffam at mhv.net suggests you could log into those machines and do
it that way. Which gives me another idea, you could have the bot run
lynx remotely and then pipe the output from that to the letter it would
send you and visa versa. But that makes things more complicated as well
too. I question the value of doing that as well, I think the overhead
would be a bit much, as well as being a slight hassle. I think over all,
the easiest thing to do would be to possibly follow mgraffam's
suggestion and just do that. Those are my thoughts on things at least. I
hope they help.
I think the security possibilities of such a bot could be useful and
could make a interesting discussion perhaps. There was one thread
earlier that was discussing one such robot. From a government location,
that was keeping tabs on crypto related sources. Crawling from link to
link, from behind a firewall etc, etc, etc. If theres any more news
relating to that thread, thats been uncovered I'd be interested in
hearing more on it.
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
From 144tt4 at msn.com Wed May 13 18:48:47 1998
From: 144tt4 at msn.com (144tt4)
Date: Wed, 13 May 1998 18:48:47 -0700 (PDT)
Subject: No Subject
Message-ID: <19943672.886214@relay.comanche.denmark.eu>
Authenticated sender is <144tt4 at msn.com>
Subject: 1 44 t
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
EMAIL MARKETING WORKS!!
Bull's Eye Gold is the PREMIER email address collection tool.
This program allows you to develop TARGETED lists of email
addresses. Doctors, florists, MLM, biz opp,...you can collect
anything...you are only limited by your imagination! You can
even collect email addresses for specific states, cities, and
even countries! All you need is your web browser and this program.
Our software utilizes the latest in search technology called
"spidering". By simply feeding the spider program a starting
website it will collect for hours. The spider will go from website
to targeted website providing you with thousands upon thousands of
fresh TARGETED email addresses. When you are done collecting, the
spider removes duplicates and saves the email list in a ready to
send format. No longer is it necessary to send millions of ads to
get a handful of responses...SEND LESS...EARN MORE!!!
A terrific aspect of the Bull's Eye software is that there is
no difficult set up involved and no special technical mumbo-jumbo
to learn. All you need to know is how to search for your targeted
market in one of the many search engines and let the spider do the
rest! Not familiar with the search engines? No problem, we provide
you with a list of all the top search engines. Just surf to the
location of a search engine on your browser then search for the
market you wish to reach...it's that easy!
For instance if you were looking for email addresses of Doctors
in New York all you would do is:
1) Do a search using your favorite search engine by typing in
the words doctor(s) and New York
2) Copy the URL (one or more)...that's the stuff after the
http://... for instance it might look like
http://www.yahoo.com/?doctor(s)/?New+York
3) Press the START button
THAT's IT!!! The Bull's Eye spider will go to all the websites
that are linked, automatically extracting the email addresses
you want.
The spider is passive too! That means you can let it run all
day or all night while you are working on important things or
just having fun on your computer. There is no need to keep a
constant watch on it, just feed it your target market and give
it praise when it delivers thousands of email addresses at
the end of the day!
Features of the Bull's Eye Software:
* Does TARGETED searches of websites collecting the email
addresses you want!
* Collects Email addresses by City, State, even specific
Countries
* Runs Automatically...simply enter the Starting information,
press The Start Button, and it does the rest
* Filters out duplicates
* Keeps track of URLs already visited
* Can run 24 hours per day, 7 days per week
* Fast and Easy List Management
* Also has built in filtering options...you can put in words
that it "Must" have while searching,...you can even put in
criteria that it "Must NOT Have"...giving you added flexibility
* Also imports email addresses from any kind of files (text
files, binary files, database files)
* List editor handles Multiple files to work on many lists
simultaneously
* Has a Black-Book feature... avoid sending emails to people
who do not want to receive it
* Built-in Mail program...send email directly on the internet
with just a click of your mouse
* Personalized Emails...if the email address has the user's
name when it is collected,..you can send Personalized emails!!!
* Sort by Location, Server, User Name, Contact Name
* Advanced Operations:
� Email address lists export in many different formats
(HTML, Comma delimited, text file)
� Advanced editing...Transfer, Copy, Addition, Delete, Crop,
Move to Top/Bottom
� Operations between lists...Union, Subtraction, Comparison
* Program is Passive,...meaning you can run other programs at
the same time
CALL FOR MORE INFORMATION 213-980-7850
CALL FOR MORE INFORMATION 213-980-7850
ORDERING INFORMATION
Customer Name
Company Name
Address
City
State Zip
Phone Fax
Email Address
______ BULL'S EYE SOFTWARE $259.00
Includes Software, Instructions, Technical Support
______ Shipping & Handling (2-3 Day Fedex) $10.00
(Fedex Overnite) $20.00
______ TOTAL
(CA Residents add applicable sales tax)
*All orders are for Win 95 and Win NT
*****CREDIT CARDS ACCEPTED*****
MASTERCARD VISA AMEX
PLEASE CALL 213-980-7850 to process your order
9am-5pm Pacific Time
Checks or Money Orders send to:
WorldTouch Network Inc.
5670 Wilshire Blvd. Suite 2170 Los Angeles, CA 90036
Please note: Allow 5 business days for all checks to
clear before order is shipped.
From R2wjEAy94 at msn.com Wed May 13 22:28:17 1998
From: R2wjEAy94 at msn.com (R2wjEAy94 at msn.com)
Date: Wed, 13 May 1998 22:28:17 -0700 (PDT)
Subject: Are you curious about WHERE your family roots originate?
Message-ID: <199805140527.OAA04410@ns.joy.or.jp>
Discover Your Family History - Rated "Cool Site of the Week"
Come visit our website at,
http://207.93.198.221/culture2.htm
(if the above link is busy please use...)
http://209.67.53.232/culture2.htm
Do you know WHO your ancestors are and WHAT they did?
Do you know WHEN your surname first appeared?
Are you curious about WHERE your family roots originate?
Now you can fill in the missing pieces of this puzzle. Join the satisfied multitudes who have discovered their complete Family Surname History.
All Nationalities. It's easy. Just key your last name into our online index, and in seconds we will tell you it's origin and much MORE. See if we've researched your complete family name history during our 25 years of professional research.
Read a sample history, plus - FREE Coat of Arms keychain with your family's most ancient coat of arms & crest. All in full color. Your family name history parchment is 11 x 17", approximately 1700 words. It is beautifully ILLUMINATED by your most ancient Coat of Arms in full authentic Heraldic Colors. Over 500 URLs on family and heraldic history.
Please come visit our website at,
http://207.93.198.221/culture2.htm
(if the above link is busy please use...)
http://209.67.53.232/culture2.htm
Hall of Names International Inc.
1-888-My-Roots (1-888-697-6687)
For questions regarding our service, use the contact information in this letter. The return email address does not respond to incoming email. If you are not interested in this offer, you can be removed from our mailing list by sending an email to: p-jerry at usa.net Simply send it and your email address will be automatically removed from our mailing list.
From toto at sk.sympatico.ca Wed May 13 23:27:57 1998
From: toto at sk.sympatico.ca (Toto)
Date: Wed, 13 May 1998 23:27:57 -0700 (PDT)
Subject: [On Topic]
In-Reply-To: <199805122218.SAA26006@josh1.weboneinc.com>
Message-ID: <355A6D62.29C4@sk.sympatico.ca>
Josh Schoof wrote:
>
> FROM: aj at gaymen.com
> SUBJECT: Gay Site
>
> I just wanted to let you know that GayTV And GayMen.Com have
> webmaster referral programs that pay you for every person
> that signs-up for either site.
Dimitri? Is that you, Dimitri...?
From tcmay at got.net Wed May 13 23:28:05 1998
From: tcmay at got.net (Tim C. May)
Date: Wed, 13 May 1998 23:28:05 -0700 (PDT)
Subject: "... would cause us to look at this person as a threat"
In-Reply-To: <23d07d72.3558d3d9@aol.com>
Message-ID: <355A796B.5741@got.net>
StanSqncrs wrote:
> > > Subject: Cults and Government?
> > >
> > > "Just ran across this quote from AG Janet Reno. From a person of such
> > > high power, these are scary words. --------- "
>
>
>
> > > "-Attorney General Janet Reno, Interview on 60 Minutes, June 26,
> > > 1994"
> Bad beginning, Sir Will. The willingness to pass along material of dubious
> authenticity is not a good sign in my book. As Mr. Natural would say, "Check
> your source." So, what *IS* your source?
This qualifies as an Official News Story Quote under the guidelines
released by 'True Lies On The InterNet Coommiittee' which was formed
on Oct. 3, 1954.
To meet these guidelines, a quote must:
1. Be attributed to a species with the capacity for speech.
2. Be consistent with something 'everyone knows' the one quoted 'could
have said'.
3. Be an attempt at misinformation which does not exceed the magnitude
of the average MainStream Press 'lean' on the Truth (TM).
4. Provide a means for those reading the quote to check the veracity
of the source and/or the accurateness of the quote, regardless of
whether or not the message headers are forged.
5. Not be from a 'cocksucker'.
If you check the CypherPunks archives, you will find that a Great
American and True CypherPunk with a humungous schlong once sent a
post to the list, titled, "Forgeries are your Friend."
Think about it...
"The tree of tyranny must be watered periodically with the piss of citizens...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Licensed Proctologist | black markets, collapse of governments.
From nobody at REPLAY.COM Wed May 13 23:31:59 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 13 May 1998 23:31:59 -0700 (PDT)
Subject: NoT
Message-ID: <199805140631.IAA04681@basement.replay.com>
Fly Windows NT:
All the passengers carry their seats out onto the tarmac, placing the
chairs
in the outline of a plane. They all sit down, flap their arms and make
jet
swooshing sounds as if they are flying.
From alt1 at snowhill.com Thu May 14 00:41:31 1998
From: alt1 at snowhill.com (Al Thompson)
Date: Thu, 14 May 1998 00:41:31 -0700 (PDT)
Subject:
Message-ID: <199805140741.CAA16138@frost.snowhill.com>
At 02:35 AM 5/14/98 +0200, Anonymous wrote:
>I was looking at my RAM when I noticed several passwords I have
>frequently used were still there, and as I never turn off my comp, I
>was wondering if there is a way you can "clean" your RAM?
>I also got errors when installing LILO on my DOS partition, so now I
>*CAN'T* boot without a bootdisk, and I think LILO sticks itself on
Use LOADLIN instead. It's much nicer, and a LOT faster than LILO, and
doesn't require a boot floppy.
I would have replied only to you, except for the fact that you posted
anonymously.
From postmaster at xxxmail.net Thu May 14 01:10:43 1998
From: postmaster at xxxmail.net (XXX Mail Service)
Date: Thu, 14 May 1998 01:10:43 -0700 (PDT)
Subject: Are you getting traffic for free?
Message-ID: <3.0.3.32.19980513172010.00a0b168@208.15.12.231>
If you are not getting traffic for FREE, the check out Sex Button;
http://www.sexbutton.com
The #1 way to generate fresh traffic to your site at no cost to yourself
when you use EXIT mode. Unlike other programs Sex Button does not send all
*your* traffic to sponsors and click thru programs, it goes back to you.
- Fresh traffic
- More uniques
- No sponsors
- No banners
- Traffic increase for free
- Three different modes
Thanks for your time.
----------------------------------
Looking for content?
Then check out the #1 content on the 'net;
http://www.scarlett.net/starter
From StanSqncrs at aol.com Thu May 14 01:14:09 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Thu, 14 May 1998 01:14:09 -0700 (PDT)
Subject: A 'Nobody' Out From 'Obscura'
Message-ID: <1cbf5f47.355aa786@aol.com>
In a message dated 5/14/98 1:28:03 AM Central Daylight Time, tcmay at got.net
writes:
<< > Bad beginning, Sir Will. The willingness to pass along material of
dubious
> authenticity is not a good sign in my book. As Mr. Natural would say,
"Check
> your source." So, what *IS* your source?
This qualifies as an Official News Story Quote under the guidelines
released by 'True Lies On The InterNet Coommiittee' which was formed
on Oct. 3, 1954. >>
Maybe so, but does something 4 years old qualify as "news"? Only to a
victim(/perpertrator) of a anti-reality campaign.
Stan
From nobody at REPLAY.COM Thu May 14 04:33:30 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 14 May 1998 04:33:30 -0700 (PDT)
Subject: Anymous twit dealing in hypocracy
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805141133.NAA13097@basement.replay.com>
wmcclatc at primenet.com (William J. McClatchie) wrote:
> X-Comment: Aw, are you offended?
[...]
> > Do you operate a remailer, McClatchie?
>
> Do you? Which one?
>
> Personally, too many people use them for abusive purposes these days to
> feel like making the effort. Just look in triangle.general for posts from
> nobody at replay.com for an example of someone using a remailer to harrass
> someone else.
Perhaps you ought to reread your own header line, if you don't like what is
being posted: "Aw, are you offended>". Many remailer users utilize them
to avoid retaliation for hypersensitive netcops like you, Gary Burnore, and
Steve Crisp.
If everyone posted strictly politically correct content that wouldn't offend
anyone, there would be little need for anonymity. But threatening to
"beat the living fuck out of" someone because he disagreed with what someone
posted is ample reason to withhold one's name and e-mail address.
If you don't like to read anonymous posts, please feel free to learn the
proper use of a killfile, McClatchie. BTW, only one of us is using a
proper, RFC-compliant e-mail address in the From: line.
From markt at harlequin.co.uk Thu May 14 05:08:33 1998
From: markt at harlequin.co.uk (Mark Tillotson)
Date: Thu, 14 May 1998 05:08:33 -0700 (PDT)
Subject: Chaffing and winnowing
In-Reply-To: <874syut9ld.fsf@wsuse5.mckesson.com>
Message-ID: <199805141207.NAA00226@spike.long.harlequin.co.uk>
Stephen Zander wrote:
|
| But wasn't that the gist of Rivest's paper: he's not encrypting the
| message, he's just obscuring it really, really well.
His point is that the message packets start out readable, and then by
adding other packets (not altering the originals) you gain security,
whether intentional or not - apparently encryption is performed by
accident and without a key.
So he argues that since this technique transforms a cleartext stream
to a secure one without use of any cryptographic technique or
algorithm, no act of encryption has happened.
However it is not that simple - for a start to gain real security you have
to be careful to mingle streams in very precise ways, to lose the
temporal statistics that give away the origins of each packet - you
have to match wheat to chaff on a packet by packet basis to get good
security. Furthermore you have to use a CSRNG or true random source
to generate fake MACs, or have another MAC key for the complementary
stream(s) - It is not so easy to say that these precautions could be an
accidental act, or that they are entirely non-cryptographic.
However I view the process rather differently. There are two channels
- the message is carried in the MAC and in the plaintext bits.
Chaffing simply serves to obliterate the plaintext channel. The
recipient doesn't need to get the plaintext bits at all - they can
simply try the MAC against both 0 and 1, and choose the correct one.
(although this doubles the workload)
Furthermore an "attacker" can't tell, without breaking the MAC scheme,
whether the plaintext is genuine or a blind, and so this makes
chaffing/winnowing an ideal carrier of steganography. It's like
sending a plaintext file and a ciphertext file together, with an
assertion that they correspond - unless you can prove this assertion
how can an outsider be convinced you are not hiding information in the
ciphertext file? How can you prove this assertion without giving away
your MAC key? How can you demonstrate you are using a MAC and not
simply triple-DES?
__Mark
[ markt at harlequin.co.uk | http://www.harlequin.co.uk/ | +44(0)1954 785433 ]
From banisar at epic.org Thu May 14 05:17:36 1998
From: banisar at epic.org (Dave Banisar)
Date: Thu, 14 May 1998 05:17:36 -0700 (PDT)
Subject: 1998 EPIC Crypto Conference - Last week for Reduced Registration
Message-ID:
Top Government Officials, Industry Leaders, Cryptography Experts
and Public Interest Advocates to Discuss Encryption Policy
*** Last week for Early Registration ***
*** CLE Credit Application Filed ***
Washington, DC
Monday, June 8, 1998
http://www.epic.org/events/crypto98/
Top government officials -- including Senator John Ashcroft (R-MO),
William Reinsch (Undersecretary of Commerce for Export Administration)
and Robert Litt (Principal Associate Attorney General) -- will discuss
current U.S. encryption policy at the largest policy conference on
cryptography ever held in Washington, D.C. Other leading experts from
government, industry, the public interest community and academia will
also debate important legal, political and technical issues. If you are
interested in cryptography policy, this is the one meeting you must
attend!
The 1998 EPIC Cryptography and Privacy Conference is organized by the
Electronic Privacy Information Center, in cooperation with the Harvard
University Information Infrastructure Project and the Technology
Policy Research Group of the London School of Economics.
- THE 1998 EPIC CRYPTOGRAPHY AND PRIVACY CONFERENCE -
HIGHLIGHTS
o Meet the technical experts, industry leaders, litigators, and
policy makers who are shaping the global debate over encryption
and privacy.
o Get the latest news, reports, legislative information, and
technical results.
o Receive the 1998 edition of the highly-acclaimed EPIC Cryptography
and Privacy Sourcebook.
o Receive Continuing Legal Education Credits (CLE).
THE PANELS
o Top U.S. government officials will debate top industry
representatives on current U.S. policy on domestic restrictions,
export controls, and pending legislation.
o A panel of senior government officials from France, England,
Canada, Germany and the European Union will describe encryption
policies in their countries and future trends.
o Leading cryptographers and technical experts will discuss the
dangers and benefits of key escrow and key recovery systems and
other important technical issues.
o Attorneys representing the plaintiffs and the U.S. Government in
the pending legal challenges to the constitutionality of export
controls will discuss and debate the cases and their outcomes.
FEES:
Register before May 15 for reduced fee.
Standard
o $300.00 (before May 15) / $400.00 (after May 15)
Academic/Govt/501(c)(3)
o $150.00 (before May 15) / $200.00 (after May 15)
MORE INFORMATION, FULL AGENDA AND ONLINE REGISTRATION:
http://www.epic.org/events/crypto98/
-------
David Banisar (Banisar at epic.org) * 202-544-9240 (tel)
Electronic Privacy Information Center * 202-547-5482 (fax)
666 Pennsylvania Ave, SE, Suite 301 * HTTP://www.epic.org
Washington, DC 20003 * PGP Key http://www.epic.org/staff/banisar/key.html
From tcmay at got.net Thu May 14 09:07:25 1998
From: tcmay at got.net (Tim May)
Date: Thu, 14 May 1998 09:07:25 -0700 (PDT)
Subject: A 'Nobody' Out From 'Obscura'
In-Reply-To: <1cbf5f47.355aa786@aol.com>
Message-ID:
At 1:12 AM -0700 5/14/98, StanSqncrs wrote:
>In a message dated 5/14/98 1:28:03 AM Central Daylight Time, tcmay at got.net
>writes:
>
><< > Bad beginning, Sir Will. The willingness to pass along material of
>dubious
> > authenticity is not a good sign in my book. As Mr. Natural would say,
>"Check
> > your source." So, what *IS* your source?
>
> This qualifies as an Official News Story Quote under the guidelines
> released by 'True Lies On The InterNet Coommiittee' which was formed
> on Oct. 3, 1954. >>
Stan ("and the Sequencers") quotes me as saying things I never said.
--Tim May
"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Licensed Ontologist | black markets, collapse of governments.
From jya at pipeline.com Thu May 14 09:12:57 1998
From: jya at pipeline.com (John Young)
Date: Thu, 14 May 1998 09:12:57 -0700 (PDT)
Subject: Public Key Royalties
Message-ID: <199805141609.MAA22580@camel8.mindspring.com>
In a recent GAO report on governmental funding of university research
there is this note:
In fiscal year 1996, the commercialization of the public key encryption
method, which was developed under grants from the Navy and NSF,
resulted in $271,875 in royalties to MIT.
Does this refer to RSA or PGP? Did the Navy underwrite RSA's PK work?
If so does the USG have a secret stake in PGP, Network Associates
and RSA?
More: did the Navy guide PK researchers based on the secret UK PK work
before Diffie-Hellman?
The full report:
http://jya.com/rced-98-126.txt (184K)
From bill.stewart at pobox.com Thu May 14 10:08:21 1998
From: bill.stewart at pobox.com (bill.stewart at pobox.com)
Date: Thu, 14 May 1998 10:08:21 -0700 (PDT)
Subject: Chaffing and winnowing
In-Reply-To: <874syut9ld.fsf@wsuse5.mckesson.com>
Message-ID: <3.0.5.32.19980514092316.008c21f0@popd.ix.netcom.com>
[Is this still appropriate for coderpunks?]
At 01:07 PM 5/14/98 +0100, Mark Tillotson wrote:
>However I view the process rather differently. There are two channels
>- the message is carried in the MAC and in the plaintext bits.
>Chaffing simply serves to obliterate the plaintext channel. The
But it _doesn't_ obliterate the plaintext channel;
it just obfuscates it a lot.
>recipient doesn't need to get the plaintext bits at all - they can
>simply try the MAC against both 0 and 1, and choose the correct one.
>(although this doubles the workload)
Depending on how sequence numbers are managed, it doesn't
need to double it - if you try the MAC for 0, it either
succeeds or fails, and in either case you don't need to
check the MAC for 1. If you're using a shorter MAC which
might have collisions (e.g. 8 bits of a real MAC), you need to
check both, since both 0 and 1 could pass, trashing the bit,
and if you're using the "First different bit in MAC(0) and MAC(1)"
technique you obviously need to calculate both.
>Furthermore an "attacker" can't tell, without breaking the MAC scheme,
>whether the plaintext is genuine or a blind, and so this makes
>chaffing/winnowing an ideal carrier of steganography. It's like
>sending a plaintext file and a ciphertext file together, with an
>assertion that they correspond - unless you can prove this assertion
>how can an outsider be convinced you are not hiding information in the
>ciphertext file? How can you prove this assertion without giving away
>your MAC key? How can you demonstrate you are using a MAC and not
>simply triple-DES?
It's easy to demonstrate that the wheat channel is using real MACs -
if you're hauled into court for some violation or lawsuit,
you can probably be ordered to deliver the key (if you kept it),
since it's "not" being used to keep the message secret,
"only" to authenticate it.
For the chaffing techniques that can use random chaff, though,
you really can't prove that the "random" numbers are random
as opposed to stegotext without giving up the stegotext
unless they're generated by a pseudo-random algorithm
which uses a key you can reproduce (as opposed to a
session key from /dev/random.)
Will the real use of chaffing/winnowing be to send
uninteresting cover traffic and carry stegotext as chaff?
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From StanSqncrs at aol.com Thu May 14 10:26:19 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Thu, 14 May 1998 10:26:19 -0700 (PDT)
Subject: A 'Nobody' Out From 'Obscura'
Message-ID: <41a646f.355b28e4@aol.com>
In a message dated 5/14/98 11:07:23 AM Central Daylight Time, tcmay at got.net
writes:
<< At 1:12 AM -0700 5/14/98, StanSqncrs wrote:
>In a message dated 5/14/98 1:28:03 AM Central Daylight Time, tcmay at got.net
>writes:
>
><< > Bad beginning, Sir Will. The willingness to pass along material of
>dubious
> > authenticity is not a good sign in my book. As Mr. Natural would say,
>"Check
> > your source." So, what *IS* your source?
>
> This qualifies as an Official News Story Quote under the guidelines
> released by 'True Lies On The InterNet Coommiittee' which was formed
> on Oct. 3, 1954. >>
Stan ("and the Sequencers") quotes me as saying things I never said. >>
Look, nobody (IMHO), I quoted another FreeGroupie. Then I quoted YOU involved
in a 'red-herring' (unless someone forged your address) - "This qualifies as
an Official News Story Quote under the guidelines released by 'True Lies On
The InterNet Coommiittee' which was formed on Oct. 3, 1954."
Keep it up, Tim.
Stan
From StanSqncrs at aol.com Thu May 14 11:50:12 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Thu, 14 May 1998 11:50:12 -0700 (PDT)
Subject: A 'Nobody' Out From 'Obscura'
In-Reply-To: <41a646f.355b28e4@aol.com>
Message-ID: <355B3D07.605D@aol.com>
StanSqncrs wrote:
> In a message dated 5/14/98 11:07:23 AM Central Daylight Time, tcmay at got.net
> writes:
>> Stan ("and the Sequencers") quotes me as saying things I never said. >>
> Look, nobody (IMHO), I quoted another FreeGroupie. Then I quoted YOU involved
> in a 'red-herring' (unless someone forged your address) - "This qualifies as
> an Official News Story Quote under the guidelines released by 'True Lies On
> The InterNet Coommiittee' which was formed on Oct. 3, 1954."
>
> Keep it up, Tim.
Boy, do I feel like an idiot!!!
I got my head out of my ass and checked out the headers on some
of the messages coming from the list and discovered that many
of them, including the one I am referring to above, are forgeries
by Ulf Moller (who has those two 'eyes' over the 'o' in his name,
just like the eye in the pyramid on the US dollar-bill, which
means he must be a Bavarian Illuminati shill).
Received: (from cpunks at localhost) by einstein.ssz.com (8.6.12/8.6.9) id UAA02347 for
cypherpunks at algebra.com; Wed, 13 May 1998 20:33:59 -0500
Received: from public.uni-hamburg.de (public.uni-hamburg.de [134.100.41.1]) by
einstein.ssz.com (8.6.12/8.6.9) with ESMTP id UAA02311 for
; Wed, 13 May 1998 20:33:32 -0500
Received: from paris.public.uni-hamburg.de (max2-145.public.uni-hamburg.de
[134.100.45.145])
Received: by ulf.mali.sub.org (Smail3.1.28.1 #1)
Message-Id:
Date: Thu, 14 May 98 03:15 +0200
From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
To: cypherpunks at einstein.ssz.com, mix-l at jpunix.com
Subject: Re: "... would cause us to look at this person as a threat"
I would like to apologize to Tim, and to all of the other
cypherpunks that I have offended by my stupid, ignorant posts
and attitude on the list.
I'm not really a CypherPunk. I don't even suck cock!
(OK, I sucked my brother's cock a little, when I was younger,
but that was just 'experimentation', OK? By the time I was
nine, I had started fucking my little sister, so that *proves*
I'm straight, eh?)
Anyway, I don't think we should put up with this shit from Ulf
(DoubleEye Illuminati) Moller. Let's all spam him.
Stan Guildenstern
http://A(h)OL(e).commie/Boy_Am_I_Stupid!!!.html
From StanSqncrs at aol.com Thu May 14 12:33:24 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Thu, 14 May 1998 12:33:24 -0700 (PDT)
Subject: A 'Nobody' Out From 'Obscura'
Message-ID:
Obviously, this is a forgery, it isn't me, my guess is, it's our 'nobody' -
<< Boy, do I feel like an idiot!!!
I got my head out of my ass and checked out the headers on some
of the messages coming from the list and discovered that many
of them, including the one I am referring to above, are forgeries
by Ulf Moller (who has those two 'eyes' over the 'o' in his name,
just like the eye in the pyramid on the US dollar-bill, which
means he must be a Bavarian Illuminati shill).
Received: (from cpunks at localhost) by einstein.ssz.com (8.6.12/8.6.9) id
UAA02347 for
cypherpunks at algebra.com; Wed, 13 May 1998 20:33:59 -0500
Received: from public.uni-hamburg.de (public.uni-hamburg.de [134.100.41.1])
by
einstein.ssz.com (8.6.12/8.6.9) with ESMTP id UAA02311 for
; Wed, 13 May 1998 20:33:32 -0500
Received: from paris.public.uni-hamburg.de (max2-145.public.uni-hamburg.de
[134.100.45.145])
Received: by ulf.mali.sub.org (Smail3.1.28.1 #1)
Message-Id:
Date: Thu, 14 May 98 03:15 +0200
From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
To: cypherpunks at einstein.ssz.com, mix-l at jpunix.com
Subject: Re: "... would cause us to look at this person as a threat"
I would like to apologize to Tim, and to all of the other
cypherpunks that I have offended by my stupid, ignorant posts
and attitude on the list.
I'm not really a CypherPunk. I don't even suck cock!
(OK, I sucked my brother's cock a little, when I was younger,
but that was just 'experimentation', OK? By the time I was
nine, I had started fucking my little sister, so that *proves*
I'm straight, eh?)
Anyway, I don't think we should put up with this shit from Ulf
(DoubleEye Illuminati) Moller. Let's all spam him.
Stan Guildenstern
http://A(h)OL(e).commie/Boy_Am_I_Stupid!!!.html >>
From protozoa at gwyn.tux.org Thu May 14 13:50:48 1998
From: protozoa at gwyn.tux.org (K. M. Ellis)
Date: Thu, 14 May 1998 13:50:48 -0700 (PDT)
Subject: EPIC Crypto Conference - last week for reduced registration (fwd)
Message-ID:
Top Government Officials, Industry Leaders, Cryptography Experts
and Public Interest Advocates to Discuss Encryption Policy
*** Last week for Early Registration ***
*** CLE Credit Application Filed ***
Washington, DC
Monday, June 8, 1998
http://www.epic.org/events/crypto98/
Top government officials -- including Senator John Ashcroft (R-MO),
William Reinsch (Undersecretary of Commerce for Export Administration)
and Robert Litt (Principal Associate Attorney General) -- will discuss
current U.S. encryption policy at the largest policy conference on
cryptography ever held in Washington, D.C. Other leading experts from
government, industry, the public interest community and academia will
also debate important legal, political and technical issues. If you are
interested in cryptography policy, this is the one meeting you must
attend!
The 1998 EPIC Cryptography and Privacy Conference is organized by the
Electronic Privacy Information Center, in cooperation with the Harvard
University Information Infrastructure Project and the Technology
Policy Research Group of the London School of Economics.
- THE 1998 EPIC CRYPTOGRAPHY AND PRIVACY CONFERENCE -
HIGHLIGHTS
o Meet the technical experts, industry leaders, litigators, and
policy makers who are shaping the global debate over encryption
and privacy.
o Get the latest news, reports, legislative information, and
technical results.
o Receive the 1998 edition of the highly-acclaimed EPIC Cryptography
and Privacy Sourcebook.
o Receive Continuing Legal Education Credits (CLE).
THE PANELS
o Top U.S. government officials will debate top industry
representatives on current U.S. policy on domestic restrictions,
export controls, and pending legislation.
o A panel of senior government officials from France, England,
Canada, Germany and the European Union will describe encryption
policies in their countries and future trends.
o Leading cryptographers and technical experts will discuss the
dangers and benefits of key escrow and key recovery systems and
other important technical issues.
o Attorneys representing the plaintiffs and the U.S. Government in
the pending legal challenges to the constitutionality of export
controls will discuss and debate the cases and their outcomes.
FEES:
Register before May 15 for reduced fee.
Standard
o $300.00 (before May 15) / $400.00 (after May 15)
Academic/Govt/501(c)(3)
o $150.00 (before May 15) / $200.00 (after May 15)
MORE INFORMATION, FULL AGENDA AND ONLINE REGISTRATION:
http://www.epic.org/events/crypto98/
-------
David Banisar (Banisar at epic.org) * 202-544-9240 (tel)
Electronic Privacy Information Center * 202-547-5482 (fax)
666 Pennsylvania Ave, SE, Suite 301 * HTTP://www.epic.org
Washington, DC 20003 * PGP Key http://www.epic.org/staff/banisar/key.html
From jackson at usenix.ORG Thu May 14 14:11:03 1998
From: jackson at usenix.ORG (Jackson Dodd)
Date: Thu, 14 May 1998 14:11:03 -0700 (PDT)
Subject: Announcing the Call for Papers - USENIX 1999 Annual Conference
Message-ID: <199805142113.OAA00295@usenix.ORG>
The Program Chair, Avi Rubin of AT&T Labs - Research, and the Program
Committee announce the availability of the Call for Papers for:
1999 USENIX ANNUAL TECHNICAL CONFERENCE
June 7-11, 1999
Monterey Conference Center, Monterey, California
Sponsored by USENIX, the Advanced Computing Systems Association
================================================
Call for Papers at
http://www.usenix.org/events/usenix99/cfp.html
Paper submissions due: December 2, 1998
================================================
The Program Committee seeks original and innovative papers on the
applications, architecture, implementation, and performance of modern
computing systems. Papers that analyze problem areas and draw important
conclusions from practical experience are especially welcome. Some
particularly interesting application topics are:
Availability
Distributed caching and replication
Embedded systems
Extensible operating systems
File systems and storage systems
Interoperability of heterogeneous systems
Mobile code
Mobile computing
Multimedia
New algorithms and applications
Personal digital assistants
Quality of service
Reliability
Security and privacy
Ubiquitous computing and messaging
Web technologies
Invited Talk and tutorial suggestions and proposals are also very
welcome.
====================================================================
USENIX is the Advanced Computing Systems Association. Its members
are the computer technologists responsible for many of the innovations
in computing we enjoy today. To find out more about USENIX, visit its
web site: http://www.usenix.org.
From hugh at road.toad.com Thu May 14 14:57:25 1998
From: hugh at road.toad.com (Hugh Daniel)
Date: Thu, 14 May 1998 14:57:25 -0700 (PDT)
Subject: ANNOUNCE: FreeS/WAN IPSEC & IKE version 0.8 released & useful!
Message-ID: <199805142156.OAA24052@road.toad.com>
I would like to announce for the FreeS/WAN software team that they
now have a freeswan-0.8 release available for download from the
FreeS/WAN home page at:
http://www.xs4all.nl/~freeswan
The 0.8 (and target 1.0 in June) runs only in a VPN (tunnel) mode,
protecting and encrypting net traffic for a subnet behind the SG.
This setup is called a SG for Security Gateway. We plan on
implementing the rest of the IPSEC and IKE draft standards in our 2.0
release later this summer for the 2.1.xxx and 2.2.xx series Linux
kernels.
There is some useful documentation for the current FreeS/WAN done by
Kai Martius at:
http://www.imib.med.tu-dresden.de/imib/Internet/index.html
The 0.8 release has been tested extensively in the hand keyed
ESP-3DES-HMAC-MD5-96 tunnel mode and is quite robust. On a 150Mhz 586
Clone PC TCP throughput is over 320 Kbytes/second sustained as
measured by netperf.
The IKE daemon pluto has been tested only a very little and
sometimes works and sometimes does not. It will work for the simple
VPN case before 1.0.
Feedback, new features, documentation, scripts and bug fixes &
reports are especially useful in the next few weeks before we start in
on the 0.9x series of release working up to a stable 1.0 release in
June. Don't wait for the last minute to submit that neat feature or
bug fix, as we might not have time to include it!
If you have questions about the project please see our home page
where you will find a mail list, list archives, FTP directory's etc.
Thanks to everyone who made this release possible, but mostly the
people who coded it up!
Please post all bugs, fixes, code etc. to the public email list at
.
||ugh Daniel
hugh at toad.com
Systems Testing & Project mis-Management
The Linux FreeS/WAN Project
http://www.xs4all.nl/~freeswan
From jya at pipeline.com Thu May 14 15:03:40 1998
From: jya at pipeline.com (John Young)
Date: Thu, 14 May 1998 15:03:40 -0700 (PDT)
Subject: SecureOffice Challenge
Message-ID: <199805142203.SAA11962@camel8.mindspring.com>
Kathleen Ellis has announced on Cryptography that
she has put a copy of SecureOffice on her Web site
in support of Charles Boother and against the BXA
subponea of his records concerning export of his
168-bit encryption program:
http://www.filesafety.com/
We are pleased to join Kathleen by putting SecureOffice
on our site, with the thread on civil disobedience at:
http://jya.com/bxa-syncsys.htm
From gburnore at netcom.com Thu May 14 16:22:56 1998
From: gburnore at netcom.com (Gary L. Burnore)
Date: Thu, 14 May 1998 16:22:56 -0700 (PDT)
Subject: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC)
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <355c7cd1.523967461@206.214.99.10>
On 14 May 1998 12:03:51 GMT, in article <6jemj7$6km at news1.cheetah.net>,
mefisto at ns1.cheetah.net () wrote:
:9AD67.6649 at pageplanet.com> <199805131942.VAA17993 at basement.replay.com>
:Distribution:
:
:Anonymous (nobody at REPLAY.COM) wrote:
:: Steve Crisp And it still stands. Come out of hiding and see if you survive the
:: > night.
:: >
:: > Steve Crisp
:
:: Does anyone question the need for the ability to post anonymously with
:[--]
:: PagePlanet (PAGEPLANET-DOM)
:
:What's the big deal. Anyone doing a whois can find this and any other
:address. They ARE published openly and UN-ANONYMOUSLY. You think you
:invented something?
My guess is that PagePlanet is his next target. He did the same thing to
DataBasix (and me).
--
for i in databasix netcom primenet ; do ; gburnore@$i ; done
---------------------------------------------------------------------------
How you look depends on where you go.
---------------------------------------------------------------------------
Gary L. Burnore | �۳�ݳ޳�ݳ��ۺݳ޳�ݳݳ޳�ݳ��۳
| �۳�ݳ޳�ݳ��ۺݳ޳�ݳݳ޳�ݳ��۳
DOH! | �۳�ݳ޳�ݳ��ۺݳ޳�ݳݳ޳�ݳ��۳
| �۳ 3 4 1 4 2 ݳ޳ 6 9 0 6 9 �۳
spamgard(tm): zamboni | Official Proof of Purchase
===========================================================================
PGPprint: C63B CF4E 1B71 4D7E C6F8 AF4E 338D 5CB4
KeyID: 0x0F7EDBD9 (RSA) finger gburnore at netcom.com for public key
---------------------------------------------------------------------------
From wcoile at home.atlantech.net Thu May 14 17:44:34 1998
From: wcoile at home.atlantech.net (wcoile at home.atlantech.net)
Date: Thu, 14 May 1998 17:44:34 -0700 (PDT)
Subject: ignore
Message-ID: <199805150044.UAA27560@home.atlantech.net>
only a test..
From goodnews4u at mailexcite.com Thu May 14 19:04:27 1998
From: goodnews4u at mailexcite.com (goodnews4u at mailexcite.com)
Date: Thu, 14 May 1998 19:04:27 -0700 (PDT)
Subject: El Nino !!!
Message-ID: <199805150204.TAA14141@cygint.cygnus.com>
El Nino
Learn how to be an informed investor and how a $1.00 realized
gain in your
grain option value could return as much as $25,000 on a minimum
investment
of $5,000.
Why Invest Now?
The 1982-1983 El Nino was the strongest of the century spreading
drought,
floods and extreme weather across the vast stretches of the
globe. Total
combined losses to property and agriculture from weather related
catastrophes are estimated to have exceeded $10 billion. The
current El
Nino has already surpassed the 1982-1983 event in magnitude and
is expected
to have major impacts on world weather through the summer of
1998.
How realistic is it that the grain option prices will move one
dollar?
1982-1983 El NINO IMPACT ON AGRICULTURAL PRODUCTS FUTURES PRICES
corn: Nov. 1982-$2.165/bushel (low) Aug. 1983-
3.76/bushel
(high) $1.59 increase
soybeans: Oct. 1982 $5.18/ bushel (low) Sep. 1983-
$9.60/ bushel
(high) $4.42 increase
That's the past. What does the future hold?
It remains to be seen if the 1997-1998 El Nino will duplicate the
severe
weather conditions that affected agriculture production around
the globe in
1982-1983. However, given the historically tight supplies and
record demand
for corn and sobeans repectively, combined with the strength of
the current
El Nino event along with grain prices starting out from
multi-year lows, it
is our opinion that there is the potential for dramatic price
increases in
the futures and options prices of agricultural products.
How do I receive my free information on the corn and soybean
markets?
Call Us at 1-800-526-4922, 24 Hrs. a day, seven days a week ,
Please include: (no packages can be
sent without the following)
*NAME
*ADDRESS
*PHONE#
*BEST TIME TO CALL
An American Research & Trading, Inc., Series 3 registered
commodity broker
will call to confirm the request for information. All American
Research &
Trading, Inc. brokers are registered with the National Futures
Association
(NFA) and the Commodity Futures Trading Commission (CFTC).
Please only serious inquiries.
Past performance is not necessarily indicative of future results.
You could
lose part or all of your investment. However, when purchasing
options, your
risk is predetermined to the amount you invest. Commission and
fees will
impact the total amount Returned to the client. Options do not
move dollar
for dollar with the underlying futures contract until expiration
date. No
implication is being made that any American Research & Trading,
Inc. client
has or will obtain such a profit.
To remove your name from our mailing list, please send an e-mail
to:
jcooley245 at aol.com
put the word "remove" along with your e-mail address. We will
immediately
remove your name.
ns
BD
p-g-d
58-n+t
9-1
c#d
d
From nobody at REPLAY.COM Thu May 14 19:15:40 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 14 May 1998 19:15:40 -0700 (PDT)
Subject: Non-anonymous remailers
Message-ID: <199805150215.EAA08803@basement.replay.com>
Recently a new technology has been proposed: non-anonymous remailers.
A non-anonymous remailer separates the two traditional functions of the
remailer network: anonymity and avoiding traffic analysis. Because the
network provides both of these features, some people may not be aware
that they are distinct.
Anonymity means that no one can tell who sent a message. Neither the
recipient, the remailers, or an eavesdropper can know the source of
a message.
Avoiding traffic analysis means making it impossible for the path a
message takes through the network to be traced, either by the remailers
or by third parties.
A non-anonymous remailer avoids traffic analysis but does not provide
anonymity. The recipient can tell who the sender of a message is,
but no one else can, neither the remailers nor eavesdroppers.
There are several ways to achieve this cryptographically. The general
idea is that the sender of the message must sign it with a valid public
key (one signed by a CA trusted by the remailer network). This signature
is hidden from everyone but the recipient because the message is encrypted
for the recipient. However the sender can use variants of zero knowledge
proofs to demonstrate that inside the encryption there is a signature
which satisfies the requirements.
The remailer net will only deliver a message to an end user if it is able
to verify that the message, when decrypted, will be properly signed.
This assures that the end user will be able to determine who sent the
message, while no one else will.
Non-anonymous remailers would be suitable for cases where people do
not want eavesdroppers to know with whom they are communicating, but
where they don't need to be anonymous to their communication partners.
A financial house's merger and acquisitions department, for example,
would not want third parties to know with whom they are exchanging
email. A surveillance target will want to hide the identities of his
co-conspirators. An employee who is considering changing jobs will
not want his employer to know that he is sending email to a competitor.
Many similar examples exist.
Non-anonymous remailers would also have the advantage that they would be
much less prone to abuse than anonymous remailers. Sending a harrassing
message or commercial spam through a non-anonymous remailer would be
pointless. It might as well have been sent directly, since the remailer
does not hide the sender's identity from the recipient.
In summary, non-anonymous remailers prevent traffic analysis without
providing anonymity. This more limited functionality renders the remailer
less vulnerable to abuse and misuse, while providing protection which
will be adequate for many situations, and which may be especially
appropriate for the business environment.
25BA1A9F5B9010DD8C752EDE887E9AF3 [Cantsin Protocol No. 2]
092AA1EC9926D468F8964B8EF537DDC1782A1281
5838A82465D8E6D05769B3A837D8C43CBF2C5500
-AE8 AE8
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
2CD5E0D37250DE32D9A1A7229DB8D9DC5F3CA35BFD7E3F7F09612F4444ABE4FAB47097F9BF4D82DDD2FD5FF7770B1F80369EEBC9703265DE03B24ABEA9E584839569156638A5D21005CF06550392B45076B3026E25104F91B59FB994E89B4F15A168790CAC3ADD030EBC06E5C96086FBF7B17369E4D102725FA779784BACD67812B39E71003FE4741B57ECF814A1053F290F46FD07F48E5DA586FECCA62D3ABC54C15D8652F1FFDCE8D7C312486BC643F9AFE70518084644293643DF638172545B08D93CF6E2664211330A4555E8774B665C9CA344ABB698B6C709E767F9ECB8F78DB4B12F2271D15DC8D5A9E355A9C0F6CC413906E188A52B1AEB6009BAC5EA
From sendoff6 at hotmail.com Thu May 14 20:21:51 1998
From: sendoff6 at hotmail.com (sendoff6 at hotmail.com)
Date: Thu, 14 May 1998 20:21:51 -0700 (PDT)
Subject: Find out what "They" don't want you to know!
Message-ID: <031297055501222@g_fantism.com>
Dear Friend:
If you have already responded to the following announcement a few
days ago, that means your package is already on its way and it
should be arriving soon! If you have not responded to this before,
please pay attention to it now. This is very important!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!
IMPORTANT ANNOUNCEMENT
IMPORTANT ACCOUNCEMENT
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
'''''''''''''''''''''''''''
Your future May Depend on it !
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Before you know about this 'Important Announcement', you must
first read the following 'Editorial Excerpts' from some important
publications in the United States:
NEW YORK TIMES: "In concluding our review of Financial
organizations to effect change in the 90's, special attention
should be called to a California based organization, 'WORLD
CURRENCY CARTEL'. Members of this organization are amassing
hundred of millions of dollars in the currency market using a very
LEGAL method which has NEVER been divulged to the general public.
While their purpose is not yet known, their presence has most
certainly been felt".
NBC NIGHTLY NEWS: "Members of 'World Currency Cartel', who always
keep a low profile, are considered to be some of the most
wealthiest people in North America".
More excerpts later, but first let us give you this very
'IMPORTANT ANNOUNCEMENT":
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
'''''''''
We are glad to announce that for the first time and for a very
short period of time, WORLD CURRENCY CARTEL will instruct a
LIMITED number of people worldwide on 'HOW TO CONVERT $25 INTO ONE
HUNDRED OF LEGAL CURRENCY'. We will transact the first conversion
for you, after that you can easily and quickly do this on your own
hundreds or even thousands of times every month.
TAKE ADVANTAGE OF THIS "SECRET FLAW" !
******************************************************************
******************************************************************
***
It is even more explosive than we have yet disclosed. While
currency does fluctuate daily, we can show you 'HOW TO CONVERT $99
INTO $588 AS MANY TIMES AS YOU WANT'. That means, you will be able
to EXCHANGE $99, AMERICAN LEGAL CURRENCY DOLLARS, FOR $580 OF THE
SAME. You can do this as many times as you wish, every day, every
week, every month. All very LEGAL and effortlessly!
It takes only 5 to 10 minutes each time you do this. You can do
this from home, office or even while traveling. All you need is
an access to a phone line and an address. Best of all, you can do
this from ANY CITY ON THIS EARTH!!!
Again, we must reiterate, anyone can do this and the source is
NEVER-ENDING. For as long as the global financial community
continues to use different currencies with varying exchange rates,
the "SECRET FLAW" will exist.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
As we said earlier , we will do the first transaction for you and
will show you exactly how to do this on your own, over and over
again!
The amount of exchange you would do each time is entirely up to
you. Working just 2 to 10 hours a week, you can soon join the list
of Millionaires who do this on a daily basis many times a day. The
transaction is so simple that even a high school kid can do it!
We at the World Currency Cartel would like to see a uniform global
currency backed by Gold. But, until then, we will allow a LIMITED
number of individuals worldwide to share in the UNLIMITED PROFITS
provided for by the world currency differentials.
We will espouse no more political views nor will we ask you to do
so. We can say however, that our parent organization, NDML,
benefits greatly by the knowledge being shared, as we
ourselves, along with YOU, benefit likewise. Your main concern
surely will be, how you will benefit.
As soon as you become a member, you will make transactions from
your home, office, by telephone or through the mail. You can
conduct these transactions even while traveling.
Don't believe us? Experience it for yourself!
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
Unlike anyone else, we will assure you great financial freedom and
you will add to our quickly growing base of supporters and join
the list of MILLIONAIRES being created using this very "SECRET
FLAW" in the world currency market.
******************************************************************
******************************************************************
***
DON'T ENVY US, JOIN US TODAY!!!
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
'''''''''
There is a one time membership fee of only $195. BUT, if you join
us by June 9, 1998 date, you can join us for only $25 administrative
cost. Your important documents, instructions, contact name/address,
phone number and all other pertinent information will be mailed to
you immediately. So take advantage of our Anniversary date and join
us today.
(If you are replying after June 9, you must pay $195.00 for
the membership fee. NO EXCEPTIONS, and no more E-mail inquiries
please).
Upon becoming a member, you promise to keep all infos
CONFIDENTIAL!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~
Should you choose to cancel your membership for any reason, you
must return all papers/documents for a refund within 60 days.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~
IMPORTANT:
****************
1...Please write your name & mailing address VERY CLEARLY on a
paper
2...Below your mailing address, please write your E-mail address
(optional)
3...At the top left hand corner, please write the words "NEW
MEMBER"
4...Attach a CHECK or MONEY ORDER for $25 + $3 for the shipping of
documents (TOTAL = $28.00) PAYABLE TO
"NDML" and mail to:
NDML
PO BOX 311
MILFORD, NJ 08848
*If outside US add an additional $10 (TOTAL + $38.00)
}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
Here are some more 'Editorial Excerpts':
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
WALL STREET: "A discreet group of Americans, operating under the
guise of World Currency Cartel have recently begun making rumbles in
world finance market. While at this time, their game is not completely
known, they certainly will be watched by those making major moves in the
currency contracts".
FINANCIAL WEEK: "Watch them, monitor them, extract their knowledge
and try to become one of them. That is the soundest financial
advice we could give to anyone".
NATIONAL BUSINESS WEEKLY: "While this reporter has been left in
the cold as to its method of operation, we have been able to
confirm that 'World Currency Cartel' and its members are literally
amassing great fortunes overnight".
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$END$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
We thankfully credit DIAMOND INT. for the content of this
IMPORTANT ANNOUNCEMENT.
>>
From mixmaster at remail.obscura.com Thu May 14 20:52:27 1998
From: mixmaster at remail.obscura.com (Mixmaster)
Date: Thu, 14 May 1998 20:52:27 -0700 (PDT)
Subject: test
Message-ID: <199805150331.UAA29933@sirius.infonex.com>
don't answer this.
From WEBMASTER at successads.com Thu May 14 21:05:53 1998
From: WEBMASTER at successads.com (WEBMASTER at successads.com)
Date: Thu, 14 May 1998 21:05:53 -0700 (PDT)
Subject: MASTER MARKETER RESOURCE CD....
Message-ID: <199805150305.FAA04154@netsurf-pe.peine.netsurf.de>
Hello Fellow Marketer,
We have everything you need to promote your online
business and target your advertising!!
The "Master Marketers Resource CD."
This CD has over 20 Million categorized, targeted and
general email addresses! Targeted email addresses are
by far the most expensive... but for a limited time, we
are including them on the Master Marketers Resource CD.
Do not be mistaken... this offer is not like any other
you have ever received. We have seen randomly gathered
email address CD's selling for as much as $249.00
Just one I received today was offering 15 million AOL
addresses for $189.95!! They were not targeted, categorized,
or nothing! Just 15 million AOL addresses of who knows what.
We also have AOL addresses on the Master Marketers
Resource CD; 4,000,000... We also have addresses of
Business Opportunity Seekers; 1,000,000... Adult Web Site
Subscribers; 135,000 (we sell this list alone for $250.00 -
but it is included on this Resource CD).
Investor oriented addresses; 300,000... E-Mail addresses
sorted by city; 200,000... General consumer lists; 290,000
Email addresses of those interested in Health; 230,000...
and over 150,000 Food Enthusiasts!! Make no mistake!!...
this is by far the best collection of email addresses available
anywhere.
In all... there are 11 categories (over 2,500,000 of targeted
email addresses) and over 20,000,000 addresses from the top
three internet/online providers. We have also included a
remove/undeliverable list that's over 100 meg in size!! We
have already cleaned the addresses on the Master Marketer
Resource CD using this massive remove file... they are ready to
mail right now.
As A Special Bonus...
In addition to the email addresses... we have also included
on the CD over 30 CGI Scripts (one will hide where your
mail is being sent to on your order forms - must have for
taking orders). There are forum scripts, chat scripts and
just about any other cgi script you will ever need.
We have also included over 50 java scripts! Many are
scripts for adding rotating banners to your site, adding
scrolling ticker and marque messages and scripts that password
protect a page on your web site.
We have also included demos of over 15 of the top bulk
email programs on the Internet. Stealth, Rapid Fire, NetContact
and many more! We have also included demo's of email address
harvesters like Hurricane, Grabber and Atomic Harvestor that
let you extract fresh email addresses out of forums and
right out of web pages.
There is much more on the CD than we can go into on a short
letter like this one (there is over 10 html editors, over
200 marketing reports and more). In all... in addition to
the bulk email and html editors... there is over 20 of the
top software programs on the Internet. From programs that
keep you connected to the Internet... to programs that let
you accept checks online (this one is a registered version)!
You will save hours (if not weeks) in download time as we have
included the top shareware and freeware programs available
anywhere.
If you are serious about making money on the Internet... you
must have the Master Marketers Resource Cd! There is nothing
like it currently available!
If you are ready to target your advertising... you can order
the Master Marketers Resource CD by completing the form
below. Don't miss out... we are only selling a limited number
of the Master Marketer Resource CD's. In order to preserve the
responsiveness of the addresses, this offer may be withdrawn
at anytime.
------------------------------------------------------------
Please note: Most of the software on the CD is shareware. If
you like it... buy it. We have included the programs because
we feel most are pertinent to Internet marketing.
-----------------------------------------------------------
"You can buy from the REST or you can buy from the BEST." Your choice.
>>> NOW ONLY $199.00!
This price is effective for the next seven days, thereafter the price will be $249.00 so ORDER NOW!
To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
We accept Visa, Mastercard, Discover, Amex and Checks by Fax and Mail.
_________________
EZ Order Form
_____Yes! I would like to order the Master Marketers Resource CD
Email addresses and much, much more for only $199.00.
*Please select one of the following for shipping..
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping. (outside US add an additional $25 for shipping)
DATE_____________________________________________________
NAME____________________________________________________
COMPANY NAME___________________________________________
ADDRESS_________________________________________________
CITY, STATE, ZIP___________________________________________
PHONE NUMBERS__________________________________________
FAX NUMBERS_____________________________________________
EMAIL ADDRESS___________________________________________
TYPE OF CREDIT CARD:
______VISA _____MASTERCARD ______AMEX______DISC
CREDIT CARD# __________________________________________
EXPIRATION DATE________________________________________
NAME ON CARD___________________________________________
AMOUNT $____________________
(Required) SIGNATURE:x________________________
DATE:x__________________
You may fax your order to us at: 1-704-784-5595
CHECK BY FAX SERVICES!
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-704-784-5595
******************************************************
***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
CHECK HERE AND FAX IT TO US AT 1-704-784-5595
*******************************************************
If You fax a check, there is no need for you to send the original check. We will draft up a new check, with the exact information from your original check. All checks will be held for bank clearance.
If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
CONSUMER CONNECTIONS
10223-B UNIV. CITY BLVD. #197
CHARLOTTE, NC 28213
From bill.stewart at pobox.com Thu May 14 21:57:04 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Thu, 14 May 1998 21:57:04 -0700 (PDT)
Subject: Non-anonymous remailers
In-Reply-To: <199805150215.EAA08803@basement.replay.com>
Message-ID: <3.0.5.32.19980514215643.007dfcc0@popd.ix.netcom.com>
At 04:15 AM 5/15/98 +0200, some allegedly anonymous person wrote:
>Recently a new technology has been proposed: non-anonymous remailers.
Feh - anybody who wants non-anonymous remailers should include his name :-)
On the other hand, perhaps the allegedly anonymous author didn't
believe the purported name of the alleged proposer, or chose to
phrase the proposal in the exculpatory passive voice.
>A non-anonymous remailer separates the two traditional functions of the
>remailer network: anonymity and avoiding traffic analysis. Because the
>network provides both of these features, some people may not be aware
>that they are distinct.
Good point.
>A non-anonymous remailer avoids traffic analysis but does not provide
>anonymity. The recipient can tell who the sender of a message is,
>but no one else can, neither the remailers nor eavesdroppers.
>
>There are several ways to achieve this cryptographically. The general
>idea is that the sender of the message must sign it with a valid public
>key (one signed by a CA trusted by the remailer network). This signature
>is hidden from everyone but the recipient because the message is encrypted
>for the recipient. However the sender can use variants of zero knowledge
>proofs to demonstrate that inside the encryption there is a signature
>which satisfies the requirements.
Overkill, and inadequate. Let's start with overkill:
- If you require all outgoing email to be encrypted,
you don't have constructive knowledge that your system
is being abused. Legally, that should be significant protection;
rules about not being liable for things you don't know you did
are much harder to change than rules about things you know.
- Posting a big sign requiring conformance with policies,
backed up by occasional action against violators,
helps establish your presumption of good character.
- Requiring all outgoing mail to be encrypted makes spamming
much more difficult (today), though in the Great Cryptographic Future,
when everybody has at least one easily-located public key,
that's less effective - but even then it significantly increases
the workload for the spammer (though Moore's Law makes that less
relevant, and good Crypto APIs make development of spamware easy.)
It doesn't stop harassers, but it does reduce spam.
- A few Supreme Court cases, such as Talley and McIntyre,
protect the right to anonymous speech, including commercial,
so the proposed law has a high bogosity index.
For inadequacy, there are a variety of problems:
- Zero-knowledge proofs can at most verify that there's an identifier
in some defined format or from some accessible list of keys.
They can't verify that the message really came from
the homeless person who allegedly sent the mail, nor that the
address, phone number, or email named can locate a real body.
They also tend to need special forms for the data, which may not
work for CA-format key signatures.
- ZKPs aren't very useful for identifying the insides of
multiply-encrypted data - so they only give you one hop at a time,
and only for cooperative remailers in cooperative jurisdictions.
- Protocols that provide information about the insides of
an encrypted message are notoriously hard to make both
secure and useful.
>Non-anonymous remailers would be suitable for cases where people do
>not want eavesdroppers to know with whom they are communicating, but
>where they don't need to be anonymous to their communication partners.
Distinctly true, though the easiest way to achieve that is to
separate the two problems, providing solid privacy protection
outside and letting the users sign the inside message if they want.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From SeeInfoBelow at yahoo.com Thu May 14 22:25:19 1998
From: SeeInfoBelow at yahoo.com (SeeInfoBelow at yahoo.com)
Date: Thu, 14 May 1998 22:25:19 -0700 (PDT)
Subject: 2 x 2 = $1,100 (S1)
Message-ID: <199805150523.XAA15935@sparky.i-link.net>
===============================================================
The New ABC Math: 2 x 2 = $1,100 Per Cycle!
===============================================================
Fast-Cycling 2 X 2 Company Matrix Means Great Commissions!
How many $1,100 checks would you like to receive... DAILY?
For the Serious Entrepreneur or Business Person:
Tools to Help Your Business
By a 9-year old Company
* Business Opportunity Seeker Leads
* 7.9 cents/min Long Distance
* Virtual Office
2 Minute Overview: (415) 273-6063
Ask yourself these questions:
Are you willing to invest in your own success?
How many times would you like to cycle in a day?
IT'S THAT SIMPLE!
http://www.fontaineonline.com/cyberedge
===============================================================
To be REMOVED from our list, type REMOVE is the subject area
of a new email and send to: B2998 at yahoo.com
===============================================================
From billp at nmol.com Fri May 15 06:58:08 1998
From: billp at nmol.com (bill payne)
Date: Fri, 15 May 1998 06:58:08 -0700 (PDT)
Subject: Ruby Ridge and jury trial
Message-ID: <355C479A.28DD@nmol.com>
Friday 5/15/98 7:17 AM
J Orlin Grabbe
John Young
ABQ J 5/15/98
Charges Dismissed in Ruby Ridge Case
BOISE, Idaho - A federal judge on Thursday dismissed an involuntary
manslaughter
charge against an FBI sharpshooter for the death of white separatist
Randy Weaver�s
wife during the siege at Ruby Ridge.
U.S. District Judge Edward Lodge ruled that Lon Horiuchi was acting
within the
scope of his authority and was honestly discharging his duties when he
fired the shot
that killed Vicki Weaver on Aug. 22, 1992.
The U.S. Justice Department decided in 1994 against prosecuting
Horiuchi, or any of
his FBI superiors and reaffirmed the decision last year.
1 It was NOT a jury which made the determination Horiuchi was acting
within the scope
of his authority, but a FEDERAL JUDGE.
2 The Justice Department did not prosecute FBI agents
FASCISM - a political and economic movement, strongly nationalistic,
magnifying the rights
of the state as opposed to those of the individual, in which industry,
though remaining largely
under private ownership, and all administrative political units, are
controlled by a strong central
government.
Morales and I were unable to meet on Thursday. Today we will study the
docket sheets view at
http://www.jya.com/whp-10usca.htm today. And open the letter I received
from EEOC Inspector
General Office.
The above Ruby Ridge article emphasizes the importance of a jury trial
in matters of federal
government misconduct. http://www.jya.com/whp043098.htm
This matter should get settled before it gets WORSE.
Later
bill
From brjones at ucsd.edu Fri May 15 07:47:24 1998
From: brjones at ucsd.edu (Brian)
Date: Fri, 15 May 1998 07:47:24 -0700 (PDT)
Subject: (no subject)
Message-ID: <355C576B.184D@ucsd.edu>
From vanessa_107 at mailexcite.com Fri May 15 12:54:05 1998
From: vanessa_107 at mailexcite.com (vanessa_107 at mailexcite.com)
Date: Fri, 15 May 1998 12:54:05 -0700 (PDT)
Subject: Free Access to the Best Adult Site!!!
Message-ID: <199805154002DAA51087@post.finmin.lt>
Come to a site that you'll never get tired of with:
FREE...Over THOUSANDS of Live Hardcore Sex Channels from Hustler!!!!
FREE...LIVE 1-on-1 Video Sex with AUDIO!!! Just tell her what you want to see and she'll do it!!!!
FREE...THOUSANDS of Pictures in our Galleries from American Blondes to Asian Beautys!!!! You name it we got it!!!
FREE...XXX Games, & so much more!!!
What are you waiting for its free!!!!
http://209.203.84.3
click here!
From billp at nmol.com Fri May 15 14:53:29 1998
From: billp at nmol.com (bill payne)
Date: Fri, 15 May 1998 14:53:29 -0700 (PDT)
Subject: FOIA appeal, again
Message-ID: <355CB7C1.25A@nmol.com>
Friday 5/15/98 2:55 PM
E-mail Federico.F.Pena at hq.doe.gov and mail
Federico F. Pena
The Secretary of Energy
United States Department of Energy
Washington, D.C. 20585
Dear Secretary Pena:
Purposes of this letter are to
1 protest an improper Freedom of Information Act dismissal by
Thomas O. Mann , Deputy Director, Office of Hearings and Appeals
Thomas.Mann at hq.doe.gov
2 appeal a denial of a Freedom of Information Act (FOIA) Request.
I attach a copy of my 3/10/98 appeal letter to you.
DOE/ALOO failed to respond with time allotted by law to my FOIA request,
as you can read in my appeal letter.
On March 30, 1998 Barfield finally did respond. But late.
APR 28 Mann writes me,
We learned that AOO issued a determination concerning your request on
March
30, 1998. Because your appeal was based on the Department�s failure
to respond,
and because the Department has responded you appeal is now moot.
I follow the law.
If Mann feels that there is law or federal regulation to support is
claim that the
time-out clause in the FOIA no longer applies because of a late agency
response,
then he should report this to you.
Mann adds in the final paragraph of his APR 28 letter
Accordingly, the appeal dated march 10, 1998, that you filed under the
Freedom of
Information Act, is hereby dismissed.
My appeal is not, as Mann concluded, moot. My appeal is active.
Mann, however, writes
You may, however, file an appeal with the Office based on the March 30
determination.
Man also writes
Please note that, as stated in the determination letter, appeals under
the Freedom of
Information Act should be addressed to the Director of the Office of
Hearings and Appeals.
And Barfield writes
Such an appeal must be made in writing within 30 calendar days after
receipt of this letter,
addressed to the Director, Office of Hearing and Appeals, ...
Secretary Pena, your employees are apparently trying to invent their own
FOIA rules instead
of complying with federal law.
Whenever a FOIA request is denied, the agency must inform
the requester of the reasons for the denial and the requester's
right to appeal the denial to the head of the agency.
I am appealing to you, not
http://www.hr.doe.gov/htbin/callup?name=breznay&SYNONYM=YES,
George.Breznay at hq.doe.gov
I ask that your office takes WRITTEN corrective action to educate or
perhaps reprimand
both Mann and Barfield for not following the law.
Barfield writes in her Mar 30 letter
The Kirtland Area Office (KAO), oversight for the Sandia National
Laboratories (SNL),
conducted a search but could not locate any responsive documents. The
KAO also made
the determination that the documents you are seeking are contained in
procurement files
in possession and control of SNL and are, therefore, not �agency
records� subject to
provision of the FOIA.
Secretary Pena, Barfield�s statement appears to be an attempt for
bureaucrats to hide,
perhaps in the case of RSA and VP Al Gore, possibly incriminating
records from the public.
Therefore, I assert that the requested documents are or should be part
of DOE agency documents,
if DOE is doing a proper job of managing its contractors.
Therefore, I add this clause to my previous appeal. And ask that your
respond within the
time limit allowed you by law.
Of course, I continue to feel that we should settle this unfortunate
matter seen on Internet
at
http://www.jya.com/whp050898.htm
http://www.jya.com/whp-10usca.htm
http://www.jya.com/whp043098.htm
http://www.jya.com/mf050998.htm
http://jya.com/whpfiles.htm
http://www.jya.com/crack-a5.htm
http://caq.com/cryptogate
http://www.aci.net/kalliste/speccoll.htm
http://www.aci.net/kalliste/nukearse.htm
before it gets even more serious and eventually costly to the taxpayer.
Sincerely,
William H. Payne
13015 Calle de Sandias
Albuquerque, NM 87111
Tuesesday 3/10/98 8:10 PM
E-mail Federico.F.Pena at hq.doe.gov and mail
Federico F. Pena
The Secretary of Energy
United States Department of Energy
Washington, D.C. 20585
Dear Secretary Pena:
Purpose of this letter is to appeal a denial of a Freedom of
Information Act (FOIA) Request.
I wrote on Tuesday February 17, 1999 15:11
e-mail and mail
Ms. Elva Barfield
Freedom of Information Office
U. S. Department of Energy
Albuquerque Operations Office/OIEA
POB 5400
Albuquerque, NM 87185-5400
EBARFIELD at DOEAL.GOV
Dear Ms. Barfield:
VP Al Gore is in the crypto business.
Information SuperSpyWay
Al Gore Approved
Encryption for China
in Return for
Campaign Donations
by Charles R. Smith
Portions of the above document posted on Internet at
http://www.us.net/softwar/ and http://www.aci.net/kalliste/
states
1. Gore charged with encryption policy according to PDD-5 and
PRD-27 on April 16, 1993.
2. Government officials represent themselves on Al Gore's behalf for
RSA patent purchase negotiations in Feb. 1994.
3. RSA chairman Bidzos meets with Chinese officials at the same
time as Ron Brown in Oct. 1995.
4. RSA Chairman Bidzos enters into merger negotiations with Security
Dynamics, a company backed by Sanford Robertson, in Nov. 1995.
5. VP Gore calls Sanford Robertson from the White House for a
donation in Nov. 1995.
6. Robertson delivers $100,000 donation ($80,000 soft - $20,000
directly into the Clinton/Gore campaign) in Jan. 1996.
7. RSA signs deal with China in Feb. 1996. The administration
previously prosecuted similar deals but this time does nothing.
8. Justice Dept. approves RSA merger with Security Dynamics in
April 1996 for $280 million dollars, netting Sanford Robertson's
company a cool $2 million just to write the deal.
In 1991 I was in involved with Sandia National Laboratories
Comprehensive Test Ban Treaty seismic data authenticator.
At that time Sandia director Tommy A Sellers had assumed
responsibility for directorship from Robert Clem.
Sandia supervisor Tom Wright replaced my supervisor, John Holovka,
who was the supervisor for the CTBT seismic data authenticator.
Wright brought in Ph.D. Steven Goldsmith to supervise me.
Sellars, Wright, and Goldsmith were new to crypto-type projects.
Much of this is documented at http://www.jya.com/whp021598.htm.
This is evidenced by Sellar's attached SEP 24 1991 memorandum,
which Goldsmith help author, addressed to Dr James J Hearn at
the National Security Agency.
The SEP 24 memorandum contained a number of technical errors.
I corrected these errors in my attached December 20, 1991 memorandum.
Department of Energy and it predecessors have a well-documented
history of not requiring technical expertise for pursuit of interests.
Stewart Udall, The Myths of August, writes,
Any cover-up must be implemented and enforced by designated
agents, and one man emerged in 1953 as the quarterback of the
AEC's damage-control effort. His name was Gordon Dunning.
Although the personnel charts of the 1950s list him as a low-level
"rad-safe" official in the Division of Biology and Medicine,
documents demonstrate that he was clothed with authority to
manage and suppress information about the radiation released
by the testing of nuclear weapons. ...
About the time Sellers and Sandia Ombudsman gave me a directed
transfer to break electronic locks for the FBI/ERF [engineering
research facility], Goldsmith and Wright, certainly with the approval
of Sellers, placed a contract with RSA Inc [http://www.rsa.com/],
I was told.
Ms Barfield, we think the American public needs to know more about
RSA's work with Sandia National Laboratories.
Therefore, Under the provision of the Freedom of Information Act,
5 USC 552, I am requesting access to:
1 ALL purchase requisitions, including any attached statement of
work, issued by Sandia National Laboratories, Los Alamos
National Laboratories, or DOE/ALOO between January 1, 1991
and February 17, 1998 to RSA Inc.
2 Copies of all invoices from RSA Inc received by Sandia National
Laboratories, Los Alamos National Laboratories, or DOE/ALOO
between January 1, 1991 and February 17, 1998
If there are any fees for searching for, or copying, the records
I have requested, please inform me before you fill the request.
As you know, the Act permits you to reduce or waive the fees
when the release of the information is considered as "primarily
benefiting the public." I believe that this requests fits that
category and I therefore ask that you waive any fees.
Your office agreed to waive fees before. This request is surely
of "public interest."
December 13, 1994 DOE/AL FOIA officer Gwen Schreiner waived fees
for the reason,
"We have considered your request and have determined that
release of the requested records is in the public interest,
that disclosure of this information is likely to contribute
significantly to public understanding of the operations or
activities of the government, that you or the organization
you represent have little or no commercial interest in the
material contained in the records, that you or the
organization you represent have the qualifications and
ability to use and disseminate the information, and that the
records are not currently in the public domain. A waiver of
fees is therefore granted."
This waiver of fees was, undoubtedly, issued as a result of former
Energy Secretary Hazel O'Leary's Openness initiative.
Heart of America paid my way to hear Secretary O'Leary's celebrated
whistleblower speech.
If all or any part of this request is denied, please cite the
specific exemption(s) which you think justifies your refusal to
release the information and inform me of your agency's
administrative appeal procedures available to me under the law.
I would appreciate your handling this request as quickly as
possible, and I look forward to hearing from you within 20
working days, as the law stipulates.
I received no response to the above FOIA.
Therefore I appeal as a result of non-response.
As you may be aware
(6)(A) Each agency, upon any request for records made under
paragraph (1), (2), or (3) of this subsection, shall--
(i) determine within ten days \1\ (excepting
Saturdays, Sundays, and legal public holidays) after
the receipt of any such request whether to comply with
such request and shall immediately notify the person
making such request of such determination and the
reasons therefor, and of the right of such person to
appeal to the head of the agency any adverse
determination; and
And you may also be aware
-------------------------------------------------------------------------
\1\ Under section 12(b) of the Electronic Freedom of Information
Act Amendments of 1996 (Pub. L. 104-231; 110 Stat. 3054), the amendment
made by section 8(b) of such Act striking ``ten days'' and inserting
``20 days'' shall take effect on October 3, 1997.
-------------------------------------------------------------------------
(ii) make a determination with respect to any
appeal within twenty days (excepting Saturdays,
Sundays, and legal public holidays) after the receipt
of such appeal. If on appeal the denial of the request
for records is in whole or in part upheld, the agency
shall notify the person making such request of the
provisions for judicial review of that determination
under paragraph (4) of this subsection
So I expect a response to this appeal within the time allotted to you
by law.
Much of this unfortunate matter is appearing on Internet.
http://www.jya.com/whp021598.htm
http://www.jya.com/cylinked.htm
Letter from Bill Payne Regarding Cryptography at Sandia
http://www.aci.net/kalliste/
Crypto AG: The NSA's Trojan Whore?
http://caq.com/CAQ/caq63/caq63madsen.html
NSA, Crypto AG, and the Iraq-Iran War
http://www.aci.net/kalliste/speccoll.htm
How Secure is America's Nuclear Arsenal?
http://www.aci.net/kalliste/nukearse.htm
And, of course, we continue to seek settlement.
Sincerely,
William H. Payne
13015 Calle de Sandias
Albuquerque, NM 87111
From billp at nmol.com Fri May 15 15:40:26 1998
From: billp at nmol.com (bill payne)
Date: Fri, 15 May 1998 15:40:26 -0700 (PDT)
Subject: foia fee denial appeal and settlement letter
Message-ID: <355CC320.2CC1@nmol.com>
Friday 5/15/98 3:48 PM
By e-mail and US mail
Lieutenant General Kenneth A Minihan, USAF
Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000
Dear General Minihan:
Purposes of the letter are to
1 appeal a FOIA fee waiver denial.
2 continue to explore settlement possibilities of our current
lawsuit.
30 March Joann H. Grube, Deputy Director of Policy, NSA, wrote
in response to my Friday February 27, 1998 attached letter to you
There are 706 cases ahead of your in our processing queue. ..
Please be advised that your request for a waiver of fees has been
denied.
Public knowledge of how much taxpayer NSA has likely squandered
ATTEMPTING to build public key crypto chips certainly in
the public interest.
Therefore, I appeal Grube�s denial.
Grube wrote
Any person notified on an adverse determination may, within 60
days after notification of the determination, file an appeal to the
NSA/CSS Freedom of Information Act Appeal Authority. The
appeal shall be in writing and addressed to the NSA/CSS FOIA
Appeal Authority, ...
General Minihan, Grube apparently is attempting to invent her
own FOIA appeal rules instead of follow federal law.
Whenever a FOIA request is denied, the agency must inform
the requester of the reasons for the denial and the requester's
right to appeal the denial to the head of the agency.
I ask that you educate and possibly reprimand Grube for her failure
to properly state law.
As you may be aware
(6)(A) Each agency, upon any request for records made under
paragraph (1), (2), or (3) of this subsection, shall--
(i) determine within ten days \1\ (excepting
Saturdays, Sundays, and legal public holidays) after
the receipt of any such request whether to comply with
such request and shall immediately notify the person
making such request of such determination and the
reasons therefor, and of the right of such person to
appeal to the head of the agency any adverse
determination; and
And you may also be aware
-------------------------------------------------------------------------
\1\ Under section 12(b) of the Electronic Freedom of Information
Act Amendments of 1996 (Pub. L. 104-231; 110 Stat. 3054), the
amendment
made by section 8(b) of such Act striking ``ten days'' and inserting
``20 days'' shall take effect on October 3, 1997.
-------------------------------------------------------------------------
(ii) make a determination with respect to any
appeal within twenty days (excepting Saturdays,
Sundays, and legal public holidays) after the receipt
of such appeal. If on appeal the denial of the request
for records is in whole or in part upheld, the agency
shall notify the person making such request of the
provisions for judicial review of that determination
under paragraph (4) of this subsection
So I expect a response to this appeal within the time allotted to you
by law.
Our lawsuit has attracted international attention on Internet.
http://www.jya.com/whp050898.htm
http://www.jya.com/whp-10usca.htm
http://www.jya.com/whp043098.htm
http://www.jya.com/mf050998.htm
http://jya.com/whpfiles.htm
http://www.jya.com/crack-a5.htm
http://caq.com/cryptogate
http://www.aci.net/kalliste/speccoll.htm
http://www.aci.net/kalliste/nukearse.htm
Partially, perhaps, as the result of the about .5 million dead Iranian
Shiite Muslims.
Or maybe judicial misconduct?
Morales and I plan to appeal to the Tenth in event that Morales�
dismissal is upheld.
Further, we feel that YOU must be held accountable. Therefore we will
appeal your
removal from our lawsuit.
But this is sure to cost the taxpayer much more money.
And failure to fairly settle these unfortunate matters raises the
possibility of a understandable, or opportunistic, retaliatory attack
for NSA�s bungled spy sting on Iran
by the aggrieved or their enemies.
Innocent people may be harmed.
Both alternatives are unpleasant to think about.
Therefore, Morales and I continue to offer to engage in settlement talks
with YOU.
I cannot find your e-mail address
Therefore I will forward the e-mail copy of this FOIA appeal /settlement
letter to
Ray Kammer of NIST [http://www.nist.gov so that Kammer can possibly
forward an e-mail to you.
I am not reading e-mail.
Sincerely,
William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037
Friday February 27, 1998 3:15 PM
By e-mail and US mail
Lieutenant General Kenneth A Minihan, USAF
Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000
Dear General Minihan:
Purposes of the letter are to
1 request information under the Freedom of Information Act
2 explore settlement possibilities of our current lawsuit.
In about 1986 Sandia National Laboratories assigned me the
task of design and construction of a Comprehensive Test Ban
Treaty seismic data authenticator.
In the initial stages of the project, Sandia cryptographer
Gustavus Simmons attempted to convince both Sandia
management and NSA employees Tom White, Mark Unkenholtz,
and Ed Georgio that a form of public key authentication should
replace NSA employee Ronald Benincasa's National Seismic
Station/Unmaned Seismic Observatory 11-bit data authentication
algorithm.
My Sandia supervisor John Holovka and project leader H B [Jim]
Durham ordered me to write a paper explaining public key
cryptography.
This paper, RSA ENCRYPTION, along with my SAND report
describing my implementation of Benincasa's algorithm and
filings in our lawsuit, now appear on Internet at
http://www.jya.com/index.htm, click CRYPTOME, then OpEd,
then http://www.jya.com/whprsa.htm.
Sandia explored the merits of switching from Benincasa's
algorithm to a public key-based authentication method suggested
by Simmons.
For Sandia's evaluation of the merits of public key, electronic tagging,
and Bureau of Engraving and Printing projects , I bought for Sandia
samples both the Cylink CY1024 and AT&T A & B two chip sets for
modulo m arithmetic computations.
NSA employee Tom White sent me a copy of the SECRET classified
NSA report on IBM's hardware public key chip FIREFLY.
I wrote in my tutorial paper
RSA hardware computations
The slow speed of software RSA computations plus the potential
wide use prompted several companies to build chips which compute
modular arithmetic to at least several hundred bits. Most of
these chips "cascade" to compute with a larger number of bits.
Corporations involved in building these chips are
1 IBM Firefly
2 AT&T
3 Motorola (apparently a three chip set)
4 Cylink Pittway-First alert
5 Sandia Labs (Algorithm M and predecessor chip)
Details of the IBM chip is classified. AT&T as of July 1987 has
not released details of their chip. Little information is
available on the Motorola chip set.
The Cylink chip is commercially available. Its price dropped
from $1,500 to $600 each in June 1987. Data is transferred to
and from the chip with serial shift register communication.
The early Sandia chip was limited in speed. The replacement
chip is cascadeable, communicates with 8 or 16 bits parallel,
matches the speed of the Cylink chip, but is not out of
fabrication.
Rumors circulate that there is about an order of magnitude
performance difference between some of these chips.
These hardware chips improve exponentiation speed about 3 orders
of magnitude over software implementation benchmarked on an Intel
8086 family microcomputer.
Whitfield Diffie writes about both the Cylink and Sandia chips. And
is quoted at http://www.aci.net/kalliste/nukearse.htm.
Sandia had terrible luck with its public key chips.
I reported SOME of the troubles to Electronic Engineering Times editor
Loring Wirbel [http://techweb.cmp.com/eet/823/] on March 23, 1994.
Dr. John Wisniewski was a supervisor at Sandia's Center for
Radiation-hardened Microelectronics. Wisniewski was a graduate
student at Washington State University in about 1975. I was a
professor at WSU.
Wisniewski knows all about the failing Sandia chips in the nuclear
arsenal. I took notes on February 13, 1993. Wisniewski reviewed
the problems again for me.
1 No quality initiative. Each chip lot had a different
process.
2 Overall yield - 40-50%. Down to 10% after packaging.
3 Metalization problems. No planarization. No flow of
glass. Couldn't use high temperature. Step coverage
problems. Layed down over tension. 100% field returns
over several years.
4 Sandia would store lots of parts for replacements.
Sandia management made the decision to place low yield parts in
the nuclear arsenal. Sandia must meet DOD schedules management
reasoned. Hundreds of millions spent on CRM. Sandia must show
productivity.
Wisniewski told me that low yield chip test survivors are those
whichthe tests failed to detect failures. Wisniewski will talk.
503-625-6408. Wisniewski now works for Intel in Oregon. Have
Wisniewski tell you about the fire in the CRM clean room!
Sandia supervisor Jerry Allen later told me it cost $300,000 each to remove
Sandia's failing chips at Pantex from a nuclear bomb.
NSA apparently is biased toward hardware implementations of cryptographic
and authentication algorithms. As opposed to software implementation.
NSA representatives and Sandia management decided not to use a public
key authentication scheme for its CTBT seismic data authenticator because
of all of the problems with implementing public key algorithms.
But NSA surely has spent MUCH MONEY on public key chip implementations.
NSA is promoting its Clipper crypto chips as described at
http://cpsr.org/dox/clipper.html.
And we get some information about technical specifications of NSA's Clipper
chip at http://www.us.net/softwar/http://www.us.net/softwar/clip.html
Clipper Chip Information
MYK-78 CLIPPER CHIP ENCRYPTION/DECRYPTION ON A CHIP
1 micron double level metal CMOS technology
0.35 watts power
28 pin plastic leaded chip carrier (PLCC) package
Transistor to transistor logic (TTL) interface
Chip ID, family key and device unique key are installed at
programming.
Chip ID, family key and device unique key are installed at programming
facility and are completely transparent to the user.
Therefore, Under the provision of the Freedom of Information Act,
5 USC 552, I am requesting access to:
1 Copies of all invoices from
A AT&T
B Motorola
C IBM
D Sandia National Laboratories
to NSA for payments for developing ANY public key-related chips between
January 1, 1980 and February 27, 1998.
2 Copies of all invoices to NSA from ANY corporation involved in
development
of ANY Clipper chip-related hardware between January 1, 1980 and
February 27, 1998.
The public has a right to know how much NSA spent on TRYING monoploize the
crypto business.
If there are any fees for searching for, or copying, the records I have
requested, please inform me before you fill the request.
As you know, the Act permits you to reduce or waive the fees when the
release of the information is considered as "primarily benefiting the
public."
I believe that this requests fits that category and I therefore ask that
you waive any fees.
If all or any part of this request is denied, please cite the specific
exemption(s) which you think justifies your refusal to release the information and inform me of your agency's administrative appeal procedures available to me under the law.
I would appreciate your handling this request as quickly as possible, and I
look forward to hearing from you within 20 working days, as the law stipulates.
With respect to our current FOIA lawsuit, I feel that we should settle this
unfortunate matter.
I see from your biography at http://www.nsa.gov:8080/ and
http://www.nsa.gov:8080/dirnsa/dirnsa.html that you are
1979 Distinguished Graduate
Master of Arts degree in National Security Affairs
Naval Postgraduate School
Monterey, California
One of my former M.S. and Ph.D students in Computer Science,
Ted Lewis, is currently the chairman of Computer Science at
Naval Postgraduate School [http://www.friction-free-economy.com/].
Small world.
But I think that this emphasizes that WE SHOULD all be on the same side.
Not engaged in a conflict in US federal court. Or on Internet.
NSA attempts to withhold requested information are possibly unwise.
In our wired world the aggrieved know what happened to them.
[http://www.aci.net/kalliste/speccoll.htm]. http://www.wpiran.org/,
http://www.netlink.co.uk/users/impact/namir/namirm.html
And moderates in Iran, [http://persia.org/khatami/biography.html], appear
want settlement too.
My family and I have been damaged by these crypto wars.
I ask you that consider fair settlement of damages caused by the National
Security Agency.
I cannot find your e-mail address on Internet.
Therefore I will forward the e-mail copy of this FOIA/settlement letter to
Ray Kammer of NIST [http://www.nist.gov/], who along with the FBI
[http://www.fbi.gov/, http://www.fbi.gov/fo/nyfo/nytwa.htmand], and NSA
are trying to control the crypto business so that Kammer can possibly
forward an e-mail copy of the FOIA/Settlement letter to you.
Sincerely,
bill
William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037 [I am not reading e-mail]
From billp at nmol.com Fri May 15 16:48:39 1998
From: billp at nmol.com (bill payne)
Date: Fri, 15 May 1998 16:48:39 -0700 (PDT)
Subject: Government misconduct
Message-ID: <355CD34C.75E8@nmol.com>
Friday 5/15/98 5:36 PM
Senator Grassley
I sent you a copy of the criminal complaint affidavit I sent to judge
Hug.
Our NSA lawsuit was mostly done as practice for an upcoming Privacy Act
violation/defamation lawsuit.
John Young kindly posted
greene.htm National Security Abuse: Greene v. McElroy
April 8, 1998
I was NEVER interviewed by Sandia's Disciplinary Review Committee.
The charges made against me are FALSE.
I did nothing wrong. http://jya.com/whpfiles.htm
Please help get this matter should be settled before it gets worse.
bill payne
Tuesday April 28, 1998 4:05 PM
Tom Spellman
Criminal Investigator
Inspector General
U.S. Equal Employment Opportunity Commission
POB 18858
Washington, D.C. 20036-8858
202-663-4375
800-849-4230
Dear Mr. Spellman:
March 18, 1998 I phoned the Inspector General's hotline.
I filed a verbal criminal Privacy Act violation complaint with Wanda.
Wanda told me you were going to be the investigator.
Monday March 23 you phoned me to leave your office number.
You phoned several days later.
I told you about the false and defaming documents both Sandia National Laboratories and EEOC Phoenix employees Burtner and Larry Trujillo released without my written permission.
You asked that I send you a copy of these documents.
I mailed them to you the same day.
You told me that you had been reading about this case on Internet at jya.com and aci.net/kalliste.
On April 3 I phoned to inform your office that a criminal complaint affidavit was filed with judge Hug on Monday April 1 naming those involve in the release of the documents and those who did not properly prosecute those involved..
I mailed a copy of the criminal complaint affidavit to you.
I have not heard from you either in writing or by phone since our initial contact.
Therefore, I ask that you write me and tell me about the status of your investigation.
And, of course, I feel that this unfortunate matter should be promptly settled. I invite settlement negotiations of the civil aspects of this criminal release of documents.
Sincerely,
William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
From StanSqncrs at aol.com Fri May 15 17:50:56 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Fri, 15 May 1998 17:50:56 -0700 (PDT)
Subject: A 'Nobody' Out From 'Obscura'
Message-ID:
In a message dated 5/15/98 7:33:42 PM Central Daylight Time,
mixmaster at remail.obscura.com writes:
<< > Obviously, this is a forgery, it isn't me, my guess is, it's our 'nobody'
-
You're really out of your league here - lost and clueless.
Get a clue ... and get lost >>
You'd really like that wouldn't you! Come on, admit it, I'm fun to have
around! ;-)
Oh, and BTW: You're failure to deny the (tacit) charge sure looks like a
(tacit) admission that it's true. I nailed your ass (IMHO.)
Stan
From 33606886 at compuserve.com Fri May 15 22:16:31 1998
From: 33606886 at compuserve.com (33606886 at compuserve.com)
Date: Fri, 15 May 1998 22:16:31 -0700 (PDT)
Subject: No Subject
Message-ID: <458734865234.GBB21218@compuserve.com>
LET'S ALL CELEBRATE SEINFELD!
Friends, every so often that rare show comes along that captures
the essence and feeling of the decade. The 70's had 'All In The
Family'. The 80's had 'Cheers'. And the 90's gave us... 'Seinfeld'!
Well, we're certainly going to miss Jerry, George, Kramer and
Elaine, but we can *still* hang on to a little bit of them: To
celebrate this classic show, we are proud to offer a very rare
and very funny collection of never-before-seen outtakes and
footage of Jerry and the gang!
Some of these clips will definitely surprise you!
This video comes in VHS format and is a full 81 minutes in length.
Why not visit our site at:
http://www.seinfeld-salute.com/thatsashame.htm
http://www.seinfeld-salute.com/thatsashame.htm
..or
http://205.152.190.230/thatsashame.htm
(*** These are NOT the same outtakes that were shown just before the
final episode! ***)
Please note: This is a one-time mailing. You have already been placed on
our remove list.
From 92640856 at bellsouth.net Sat May 16 07:22:55 1998
From: 92640856 at bellsouth.net (92640856 at bellsouth.net)
Date: Sat, 16 May 1998 07:22:55 -0700 (PDT)
Subject: Ball Caps for Father's Day
Message-ID: <199234233019.GAA08423@qqeioweisssiiie.com>
You procrastinated over Mothers Day so don't wait for Father's Day to get here
and not have anything for him.
Father's Day Hat's with worlds greatest father on them. 100% cotton, white,
super adjustable, fit's large sizes. Great for all summer in the hot sun, on
the golf course or any outside activity. Visit our Web page and see the hat at
WePrintAny's Home Page
Another spot is here http://members.aol.com/WePrintAny/index.html
Visit the web page then return here, this is your order Page. Order now
before we're over booked. Orders are already comming in.
1 hat is $10.00
2 hats for $18.00
This includes postage and handling (USA only).
Send cash, check or Money Order (sorry no credit cards) to:
GDH
P.O. Box 2092
Orange Park, Fl. 32067-2092
No checks after 1 June 1998. Not enough time for check to clear and hat to be
mailed and received by Fathers Day.
Print this page, this is your order form.
Include your e-mail address________________________________
In case we need to contact you.
This is your mailing Label.
From
WePrint Any
P.O. Box 2092
Orange Park, Fl 32067
Name_______________________________________
Add._______________________________________
City__________________State_____ Zip_______
Don't wait, order now. Cash and Money Orders mailed the same day.
Order:
1 Hat $10.00 $10.00
__ add. Hat's $8.00 _____
Fl. residents add 7% tax _____
TOTAL $_____
Check back after Fathers Day for full Product line.
From ichudov at algebra.com Sat May 16 11:04:13 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Sat, 16 May 1998 11:04:13 -0700 (PDT)
Subject: Gunpowder taggant solution
Message-ID: <199805161802.NAA21718@manifold.algebra.com>
I think that the gunpowder taggants are not as bad as it seems at first
sight. EVen if all gunpowders are sold with taggants, and if there is
enough people wishing to defeat them, they can simply organize gunpowder
mixing parties at gun shows. After several such parties, the taggants
might become completely useless.
- Igor.
From jim at mentat.com Sat May 16 11:48:30 1998
From: jim at mentat.com (Jim Gillogly)
Date: Sat, 16 May 1998 11:48:30 -0700 (PDT)
Subject: Gunpowder taggant solution
Message-ID: <9805161844.AA05715@mentat.com>
Igor said:
> I think that the gunpowder taggants are not as bad as it seems at first
> sight. EVen if all gunpowders are sold with taggants, and if there is
> enough people wishing to defeat them, they can simply organize gunpowder
> mixing parties at gun shows. After several such parties, the taggants
> might become completely useless.
I'm woefully ignorant about reloading, but would this really work?
Would you mix your high-quality smokeless with Tim's homebrew black
powder, Toto's pebble-ground Canada Red Doobie Mix, and Bell's
stinkbomb components and take away the average? Or are different types
of powder visually distinct enough or similar enough in effect to mix
and match effectively?
Jim Gillogly
From ichudov at algebra.com Sat May 16 12:56:19 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Sat, 16 May 1998 12:56:19 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: <9805161844.AA05715@mentat.com>
Message-ID: <199805161952.OAA22508@manifold.algebra.com>
Jim Gillogly wrote:
> Igor said:
> > I think that the gunpowder taggants are not as bad as it seems at first
> > sight. EVen if all gunpowders are sold with taggants, and if there is
> > enough people wishing to defeat them, they can simply organize gunpowder
> > mixing parties at gun shows. After several such parties, the taggants
> > might become completely useless.
>
> I'm woefully ignorant about reloading, but would this really work?
> Would you mix your high-quality smokeless with Tim's homebrew black
> powder, Toto's pebble-ground Canada Red Doobie Mix, and Bell's
> stinkbomb components and take away the average? Or are different types
> of powder visually distinct enough or similar enough in effect to mix
> and match effectively?
I am perhaps even more ignorant, but I think that if you mix the same
kind of gunpowder (XYZ's BLAH # 123 gunpowder for example), then there
is no problem. But of course mixing different kinds may be asking for
trouble -- I have no clue about that.
Also, a gun owner could simply buy gnu powder in various places and
mix the batches.
- Igor.
From jya at pipeline.com Sat May 16 13:20:52 1998
From: jya at pipeline.com (John Young)
Date: Sat, 16 May 1998 13:20:52 -0700 (PDT)
Subject: Idaho v. Horiuchi
Message-ID: <199805162020.QAA26245@dewdrop2.mindspring.com>
We offer the U.S. District Court's decision in Idaho v. Horiuchi
to dismiss state charges against the FBI sniper/killer of Vicki
Weaver.
http://jya.com/id-lth.htm
Grim reading of succinct description of the killing and gun
battle, and how the feds carefully protect their own from
harm for punishing those foolish to challenge national might.
The judge wisely notes his decision does not preclude
the possibility that other, federal, charges may be brought
against Horiuchi and his supervisors. Some chance.
These are HTML conversions of scanned images from the
Idaho District Court's impressive Web page at:
http://www.id.uscourts.gov
All the documents filed in the case are online.
From jya at pipeline.com Sat May 16 14:16:34 1998
From: jya at pipeline.com (John Young)
Date: Sat, 16 May 1998 14:16:34 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: <9805161844.AA05715@mentat.com>
Message-ID: <199805162116.RAA14343@dewdrop2.mindspring.com>
ATF published on May 1 its annual "1998 List of Explosive
Materials" subject to regulation under 18 U.S.C. Chapter 40,
Importation, Manufacture, Distribution and Storage of Explosive
Materials:
http://jya.com/atf050i98.txt
This list of ingredients might be used to mis-tag home
mixes -- or ID the mixers' traces on implements.
From jya at pipeline.com Sat May 16 14:35:03 1998
From: jya at pipeline.com (John Young)
Date: Sat, 16 May 1998 14:35:03 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: <199805161952.OAA22508@manifold.algebra.com>
Message-ID: <199805162134.RAA13996@dewdrop2.mindspring.com>
Correct URL for the ATF list of explosive materials is:
http://jya.com/atf050198.txt
From tcmay at got.net Sat May 16 20:57:55 1998
From: tcmay at got.net (Tim May)
Date: Sat, 16 May 1998 20:57:55 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: <9805161844.AA05715@mentat.com>
Message-ID:
At 12:52 PM -0700 5/16/98, Igor Chudov @ home wrote:
>Jim Gillogly wrote:
>> Igor said:
>> > I think that the gunpowder taggants are not as bad as it seems at first
>> > sight. EVen if all gunpowders are sold with taggants, and if there is
>> > enough people wishing to defeat them, they can simply organize gunpowder
>> > mixing parties at gun shows. After several such parties, the taggants
>> > might become completely useless.
>>
>> I'm woefully ignorant about reloading, but would this really work?
>> Would you mix your high-quality smokeless with Tim's homebrew black
>> powder, Toto's pebble-ground Canada Red Doobie Mix, and Bell's
>> stinkbomb components and take away the average? Or are different types
>> of powder visually distinct enough or similar enough in effect to mix
>> and match effectively?
>
>I am perhaps even more ignorant, but I think that if you mix the same
>kind of gunpowder (XYZ's BLAH # 123 gunpowder for example), then there
>is no problem. But of course mixing different kinds may be asking for
>trouble -- I have no clue about that.
>
>Also, a gun owner could simply buy gnu powder in various places and
>mix the batches.
I don't know the particular details of the "taggant" proposal (in terms of
which problem it's trying to solve). But here are some generally true
comments:
* For smokeless powders, i.e., _not_ black powder, the powders are
semi-visually recognizable. So Bullseye is noticeably different from Unique
and 2400, for example.
* However, smokeless powders are worthless for bombs. (Black powder is
almost worthless, by modern standards. Much easier to make your own
plastique.)
* If the goal is to trace shootings, as oppose to bombings, then the focus
would be on smokeless powders. However, very few Bad Guys are into
reloading, so....
* The only way such a law can be useful is to crack down strongly on
ammunition resales, loans, gifts, etc. And a monstrous nightmare of
traceability, identity checks, etc.
(And what to do with those of us who have several cases (1000 rounds/case)
of various kinds of ammo? (I surmise dimbulbs like Diane Feinstein, Sarah
Brady, and Barbara Boxer think they can "outlaw" this old ammo, or cause a
gang banger in LA to shoot only freshly-purchased ammo.)
And so it goes.
--Tim May
"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Licensed Ontologist | black markets, collapse of governments.
From ichudov at algebra.com Sat May 16 21:32:15 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Sat, 16 May 1998 21:32:15 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To:
Message-ID: <199805170431.XAA01850@manifold.algebra.com>
Tim May wrote:
> * For smokeless powders, i.e., _not_ black powder, the powders are
> semi-visually recognizable. So Bullseye is noticeably different from Unique
> and 2400, for example.
Is mixing them dangerous?
> * However, smokeless powders are worthless for bombs. (Black powder is
> almost worthless, by modern standards. Much easier to make your own
> plastique.)
I thought that plastic explosives were hard to make. Is that wrong?
- Igor.
From bill.stewart at pobox.com Sun May 17 01:06:15 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sun, 17 May 1998 01:06:15 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: <9805161844.AA05715@mentat.com>
Message-ID: <3.0.5.32.19980516224219.008b7510@popd.ix.netcom.com>
At 02:52 PM 5/16/98 -0500, Igor Chudov @ home wrote:
>> I'm woefully ignorant about reloading, but would this really work?
>> Would you mix your high-quality smokeless with Tim's homebrew black
>> powder, Toto's pebble-ground Canada Red Doobie Mix,
... and Bill's Delaware Punch black powder.
...
>Also, a gun owner could simply buy gnu powder in various places and
>mix the batches.
Is "gnu powder" available from the Free Explosives Foundation?
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From jya at pipeline.com Sun May 17 07:22:36 1998
From: jya at pipeline.com (John Young)
Date: Sun, 17 May 1998 07:22:36 -0700 (PDT)
Subject: More Tools for ILEA
Message-ID: <199805171422.KAA23491@dewdrop2.mindspring.com>
NYT, May 17, 1998, on the Birmingham Summit:
G8 leaders spent considerable time discussing arrangements
for international cooperation in fighting cross-border crimes
like money-laundering, computer fraud and arms smuggling.
In a communique, the leaders endrosed efforts to negotiate
a United Nations agreement to provide law enforcement
officials with more tools to fight international organized
crime.
They called for talks with the business community on an
international legal framework for obtaining computer data
as evidence in criminal cases, while preserving privacy
protections.
-----
A pointer to the communique or other G8 reports from this
session would be welcomed.
From eureka-help at eureka.abc-web.com Sun May 17 13:52:24 1998
From: eureka-help at eureka.abc-web.com (eureka-help at eureka.abc-web.com)
Date: Sun, 17 May 1998 13:52:24 -0700 (PDT)
Subject: Now we need your reply!
Message-ID: <895438334.21977.ezmlm@eureka.abc-web.com>
We have received a subscription request for the Eureka!
Adult Newsletter to be sent to your email address. To
confirm this request, please use the Reply function on your
email program to send this email back to us.
If you do not reply to this email we will assume you have
changed your mind, or may have been the victim of a 'prank'.
If you did not enter your email address at one of our web-
sites then somebody else has done so for you. If you do not
wish to receive the newsletters just ignore this email. Or
you can click below to have your email address permanently
blocked from ever receiving any of our future mailings.
Block me -----> http://eureka.abc-web.com/eureka/blockme.htm
- The Eureka! Adult Newsletter Team.
The following lines identify the source of this subscription
request, including date/time, IP number and browser used.
HEADER1=13:52 Pacific Time Sunday May 17 1998
HEADER2=199.203.203.194 Mozilla/3.0Gold (Win95; I)
From MAILER-DAEMON at www.video-collage.com Sun May 17 14:40:15 1998
From: MAILER-DAEMON at www.video-collage.com (Mail Delivery Subsystem)
Date: Sun, 17 May 1998 14:40:15 -0700 (PDT)
Subject: Returned mail: User unknown
Message-ID: <199805172139.RAB15707@www.video-collage.com>
The original message was received at Sun, 17 May 1998 17:39:44 -0400 (EDT)
from uucp at localhost
----- The following addresses had permanent fatal errors -----
eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com at eureka.abc-web.com
----- Transcript of session follows -----
... while talking to eureka.abc-web.com.:
>>> RCPT To:
<<< 553 sorry, your envelope sender is in my badmailfrom list (#5.7.1)
550 eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com at eureka.abc-web.com... User unknown
Reporting-MTA: dns; www.video-collage.com
Arrival-Date: Sun, 17 May 1998 17:39:44 -0400 (EDT)
Final-Recipient: RFC822; eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com at eureka.abc-web.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; eureka.abc-web.com
Diagnostic-Code: SMTP; 553 sorry, your envelope sender is in my badmailfrom list (#5.7.1)
Last-Attempt-Date: Sun, 17 May 1998 17:39:45 -0400 (EDT)
To: eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com at eureka.abc-web.com
Subject: Now we need your reply! (fwd)bc-web.com
From: cypherpunks at toad.Com
Date: Sun, 17 May 1998 16:36:27 -0500 (CDT)
eureka-help at eureka.abc-web.com wrote:
> From owner-cypherpunks at Algebra.Com Sun May 17 16:24:16 1998
> Mailing-List: contact eureka-help at eureka.abc-web.com; run by ezmlm
> Date: 17 May 1998 20:52:14 -0000
> Message-ID: <895438334.21977.ezmlm at eureka.abc-web.com>
> From: eureka-help at eureka.abc-web.com
> To: cypherpunks at toad.com
> Reply-To: eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com at eureka.abc-web.com
> Delivered-To: responder for eureka at eureka.abc-web.com
> Subject: Now we need your reply!
> Sender: owner-cypherpunks at Algebra.Com
> Precedence: bulk
> X-Mailing-List: cypherpunks at algebra.com
> X-List-Admin: ichudov at algebra.com
> X-Loop: cypherpunks at algebra.com
>
>
> We have received a subscription request for the Eureka!
> Adult Newsletter to be sent to your email address. To
> confirm this request, please use the Reply function on your
> email program to send this email back to us.
>
> If you do not reply to this email we will assume you have
> changed your mind, or may have been the victim of a 'prank'.
> If you did not enter your email address at one of our web-
> sites then somebody else has done so for you. If you do not
> wish to receive the newsletters just ignore this email. Or
> you can click below to have your email address permanently
> blocked from ever receiving any of our future mailings.
> Block me -----> http://eureka.abc-web.com/eureka/blockme.htm
>
> - The Eureka! Adult Newsletter Team.
>
>
> The following lines identify the source of this subscription
> request, including date/time, IP number and browser used.
>
> HEADER1=13:52 Pacific Time Sunday May 17 1998
> HEADER2=199.203.203.194 Mozilla/3.0Gold (Win95; I)
>
From shamrock at cypherpunks.to Sun May 17 17:43:48 1998
From: shamrock at cypherpunks.to (Lucky Green)
Date: Sun, 17 May 1998 17:43:48 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: <199805170431.XAA01850@manifold.algebra.com>
Message-ID:
On Sat, 16 May 1998, Igor Chudov @ home wrote:
> Tim May wrote:
> > * For smokeless powders, i.e., _not_ black powder, the powders are
> > semi-visually recognizable. So Bullseye is noticeably different from Unique
> > and 2400, for example.
>
> Is mixing them dangerous?
Taggants in gun powder are inherently dangerous. They frequently cause a
loss of stability of the powder.
> > * However, smokeless powders are worthless for bombs. (Black powder is
> > almost worthless, by modern standards. Much easier to make your own
> > plastique.)
>
> I thought that plastic explosives were hard to make. Is that wrong?
Making plastic explosives is easy. No, I am not going to post the recipe.
-- Lucky Green PGP v5 encrypted email preferred.
"Tonga? Where the hell is Tonga? They have Cypherpunks there?"
From ichudov at algebra.com Sun May 17 18:00:26 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Sun, 17 May 1998 18:00:26 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To:
Message-ID: <199805180056.TAA00480@manifold.algebra.com>
Lucky Green wrote:
> > I thought that plastic explosives were hard to make. Is that wrong?
>
> Making plastic explosives is easy. No, I am not going to post the recipe.
If _I_ knew the recipe, I would have posted it, at least anonymously.
I respect you a lot, Lucky, but in this case you are behaving like
an asshole.
- Igor.
From eureka-help at eureka.abc-web.com Sun May 17 19:28:41 1998
From: eureka-help at eureka.abc-web.com (eureka-help at eureka.abc-web.com)
Date: Sun, 17 May 1998 19:28:41 -0700 (PDT)
Subject: Successful Subscription
Message-ID: <895458516.7940.ezmlm@eureka.abc-web.com>
WELCOME TO EUREKA!
==================
Congratulations, your free subscription to the Eureka!
newsletter is now set up. We hope you enjoy every copy.
As promised, while you wait for your first newsletter
here are the links to the FREE videos and FREE photos!
BIENVENUE � EUREKA!
===================
F�licitations, votre abonnement libre � l'Eureka! le
bulletin est maintenant install�. Nous esp�rons que
vous appr�ciez chaque copie. Comme promis, alors que
vous attendez votre premier bulletin ici sont les liens
aux videos LIBRES et aux photos LIBRES!
WILLKOMMEN ZU EUREKA!
=====================
Gl�ckw�nsche, Ihre freie Subskription zum Eureka!
Rundschreiben wird jetzt oben eingestellt. Wir hoffen,
da� Sie jedes Exemplar genie�en. Wie, w�hrend Sie Ihr
erstes Rundschreiben hier warten, sind die Links zu den
FREIEN videos und zu den FREIEN Fotos versprochen!
RECEPCI�N A EUREKA!
===================
Felicitaciones, su suscripci�n libre al Eureka! el
bolet�n de noticias ahora se fija para arriba.
Esperamos que usted goce de cada copia. Seg�n lo
prometido, mientras que usted espera su primer bolet�n
de noticias aqu� son las conexiones a los videos LIBRES
y a las fotos LIBRES!
BENVENUTO A EUREKA!
===================
Congratulazioni, il vostro abbonamento libero al
Eureka! il bollettino ora � installato. Speriamo che
godiate ogni copia. Come promesso, mentre aspettate il
vostro primo bollettino qui sono i collegamenti ai vid-
eos LIBERI ed alle foto LIBERE!
BOA VINDA A EUREKA!
===================
Felicita��es, sua subscri��o livre ao Eureka! o boletim
de not�cias � ajustado agora acima. N�s esperamos que
voc� aprec�e cada c�pia. Como prometidas, quando voc�
esperar seu primeiro boletim de not�cias aqui s�o as
liga��es aos videos LIVRES e �s fotos LIVRES!
=======================================================
FREE hardcore videos ........ http://www.slutorama.com/
FREE hardcore photos .... http://209.50.232.36/desires/
=======================================================
The following lines identify the source of this subscription
request, including date/time, IP number and browser used.
From eureka-help at eureka.abc-web.com Sun May 17 20:02:30 1998
From: eureka-help at eureka.abc-web.com (eureka-help at eureka.abc-web.com)
Date: Sun, 17 May 1998 20:02:30 -0700 (PDT)
Subject: Successful Subscription
Message-ID: <895460543.21135.ezmlm@eureka.abc-web.com>
WELCOME TO EUREKA!
==================
Congratulations, your free subscription to the Eureka!
newsletter is now set up. We hope you enjoy every copy.
As promised, while you wait for your first newsletter
here are the links to the FREE videos and FREE photos!
BIENVENUE � EUREKA!
===================
F�licitations, votre abonnement libre � l'Eureka! le
bulletin est maintenant install�. Nous esp�rons que
vous appr�ciez chaque copie. Comme promis, alors que
vous attendez votre premier bulletin ici sont les liens
aux videos LIBRES et aux photos LIBRES!
WILLKOMMEN ZU EUREKA!
=====================
Gl�ckw�nsche, Ihre freie Subskription zum Eureka!
Rundschreiben wird jetzt oben eingestellt. Wir hoffen,
da� Sie jedes Exemplar genie�en. Wie, w�hrend Sie Ihr
erstes Rundschreiben hier warten, sind die Links zu den
FREIEN videos und zu den FREIEN Fotos versprochen!
RECEPCI�N A EUREKA!
===================
Felicitaciones, su suscripci�n libre al Eureka! el
bolet�n de noticias ahora se fija para arriba.
Esperamos que usted goce de cada copia. Seg�n lo
prometido, mientras que usted espera su primer bolet�n
de noticias aqu� son las conexiones a los videos LIBRES
y a las fotos LIBRES!
BENVENUTO A EUREKA!
===================
Congratulazioni, il vostro abbonamento libero al
Eureka! il bollettino ora � installato. Speriamo che
godiate ogni copia. Come promesso, mentre aspettate il
vostro primo bollettino qui sono i collegamenti ai vid-
eos LIBERI ed alle foto LIBERE!
BOA VINDA A EUREKA!
===================
Felicita��es, sua subscri��o livre ao Eureka! o boletim
de not�cias � ajustado agora acima. N�s esperamos que
voc� aprec�e cada c�pia. Como prometidas, quando voc�
esperar seu primeiro boletim de not�cias aqui s�o as
liga��es aos videos LIVRES e �s fotos LIVRES!
=======================================================
FREE hardcore videos ........ http://www.slutorama.com/
FREE hardcore photos .... http://209.50.232.36/desires/
=======================================================
The following lines identify the source of this subscription
request, including date/time, IP number and browser used.
From eureka-help at eureka.abc-web.com Sun May 17 21:07:55 1998
From: eureka-help at eureka.abc-web.com (eureka-help at eureka.abc-web.com)
Date: Sun, 17 May 1998 21:07:55 -0700 (PDT)
Subject: Successful Subscription
Message-ID: <895464469.18392.ezmlm@eureka.abc-web.com>
WELCOME TO EUREKA!
==================
Congratulations, your free subscription to the Eureka!
newsletter is now set up. We hope you enjoy every copy.
As promised, while you wait for your first newsletter
here are the links to the FREE videos and FREE photos!
BIENVENUE � EUREKA!
===================
F�licitations, votre abonnement libre � l'Eureka! le
bulletin est maintenant install�. Nous esp�rons que
vous appr�ciez chaque copie. Comme promis, alors que
vous attendez votre premier bulletin ici sont les liens
aux videos LIBRES et aux photos LIBRES!
WILLKOMMEN ZU EUREKA!
=====================
Gl�ckw�nsche, Ihre freie Subskription zum Eureka!
Rundschreiben wird jetzt oben eingestellt. Wir hoffen,
da� Sie jedes Exemplar genie�en. Wie, w�hrend Sie Ihr
erstes Rundschreiben hier warten, sind die Links zu den
FREIEN videos und zu den FREIEN Fotos versprochen!
RECEPCI�N A EUREKA!
===================
Felicitaciones, su suscripci�n libre al Eureka! el
bolet�n de noticias ahora se fija para arriba.
Esperamos que usted goce de cada copia. Seg�n lo
prometido, mientras que usted espera su primer bolet�n
de noticias aqu� son las conexiones a los videos LIBRES
y a las fotos LIBRES!
BENVENUTO A EUREKA!
===================
Congratulazioni, il vostro abbonamento libero al
Eureka! il bollettino ora � installato. Speriamo che
godiate ogni copia. Come promesso, mentre aspettate il
vostro primo bollettino qui sono i collegamenti ai vid-
eos LIBERI ed alle foto LIBERE!
BOA VINDA A EUREKA!
===================
Felicita��es, sua subscri��o livre ao Eureka! o boletim
de not�cias � ajustado agora acima. N�s esperamos que
voc� aprec�e cada c�pia. Como prometidas, quando voc�
esperar seu primeiro boletim de not�cias aqui s�o as
liga��es aos videos LIVRES e �s fotos LIVRES!
=======================================================
FREE hardcore videos ........ http://www.slutorama.com/
FREE hardcore photos .... http://209.50.232.36/desires/
=======================================================
The following lines identify the source of this subscription
request, including date/time, IP number and browser used.
From pleontks at hotmail.com Sun May 17 23:11:23 1998
From: pleontks at hotmail.com (John C)
Date: Sun, 17 May 1998 23:11:23 -0700 (PDT)
Subject: Newsletter
Message-ID: <19980518061036.7570.qmail@hotmail.com>
I'm getting ready to put out another newsletter. But I can only do it
with ya'll's help. if possible, could everyone send me an article or
anything at all for the newsletter?
Thanks
John
pleontks at hotmail.com
http://members.tripod.com/~pleontks
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
From MAILER-DAEMON at netcom.com Sun May 17 23:59:02 1998
From: MAILER-DAEMON at netcom.com (Mail Delivery Subsystem)
Date: Sun, 17 May 1998 23:59:02 -0700 (PDT)
Subject: Returned mail: User unknown
Message-ID: <199805180658.XAA18423@netcomsv.netcom.com>
The original message was received at Sun, 17 May 1998 23:58:55 -0700 (PDT)
from pax-ca11-11.ix.netcom.com [204.30.66.171]
----- The following addresses had permanent fatal errors -----
----- Transcript of session follows -----
... while talking to eureka.abc-web.com.:
>>> RCPT To:
<<< 553 sorry, your envelope sender is in my badmailfrom list (#5.7.1)
550 ... User unknown
----- Original message follows -----
Return-Path:
Received: from ca07b8bl (pax-ca11-11.ix.netcom.com [204.30.66.171])
by netcomsv.netcom.com (8.8.5-r-beta/8.8.5/(NETCOM v1.01)) with SMTP id XAA18419;
Sun, 17 May 1998 23:58:55 -0700 (PDT)
Message-Id: <3.0.5.32.19980517235334.008e0210 at popd.ix.netcom.com>
X-Sender: stewarts at popd.ix.netcom.com
X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
Date: Sun, 17 May 1998 23:53:34 -0700
To: eureka-help at eureka.abc-web.com, abuse at abc-web.com
From: Bill Stewart
Subject: unsubscribe
In-Reply-To: <895458516.7940.ezmlm at eureka.abc-web.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
unsubscribe
end
cypherpunks is a list with several hundred subscribers.
Some spammer has been trying to subscribe the list
to your service. Earlier today I connected to the
web site and found that somebody else had
permanently removed most of the list aliases,
but you seem to be sending out this announcement anyway.
At 02:28 AM 5/18/98 -0000, you wrote:
>WELCOME TO EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Congratulations, your free subscription to the Eureka!
>newsletter is now set up. We hope you enjoy every copy.
>As promised, while you wait for your first newsletter
>here are the links to the FREE videos and FREE photos!
>
>BIENVENUE =C0 EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>F=E9licitations, votre abonnement libre =E0 l'Eureka! le
>bulletin est maintenant install=E9. Nous esp=E9rons que
>vous appr=E9ciez chaque copie. Comme promis, alors que
>vous attendez votre premier bulletin ici sont les liens
>aux videos LIBRES et aux photos LIBRES!
>
>WILLKOMMEN ZU EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Gl=FCckw=FCnsche, Ihre freie Subskription zum Eureka!
>Rundschreiben wird jetzt oben eingestellt. Wir hoffen,
>da=DF Sie jedes Exemplar genie=DFen. Wie, w=E4hrend Sie Ihr
>erstes Rundschreiben hier warten, sind die Links zu den
>FREIEN videos und zu den FREIEN Fotos versprochen!=20
>
>RECEPCI=D3N A EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Felicitaciones, su suscripci=F3n libre al Eureka! el
>bolet=EDn de noticias ahora se fija para arriba.
>Esperamos que usted goce de cada copia. Seg=FAn lo
>prometido, mientras que usted espera su primer bolet=EDn
>de noticias aqu=ED son las conexiones a los videos LIBRES
>y a las fotos LIBRES!
>
>BENVENUTO A EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Congratulazioni, il vostro abbonamento libero al
>Eureka! il bollettino ora =E8 installato. Speriamo che
>godiate ogni copia. Come promesso, mentre aspettate il
>vostro primo bollettino qui sono i collegamenti ai vid-
>eos LIBERI ed alle foto LIBERE!
>
>BOA VINDA A EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Felicita=E7=F5es, sua subscri=E7=E3o livre ao Eureka! o boletim
>de not=EDcias =E9 ajustado agora acima. N=F3s esperamos que
>voc=EA aprec=EDe cada c=F3pia. Como prometidas, quando voc=EA
>esperar seu primeiro boletim de not=EDcias aqui s=E3o as
>liga=E7=F5es aos videos LIVRES e =E0s fotos LIVRES!
>
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D
>FREE hardcore videos ........ http://www.slutorama.com/
>FREE hardcore photos .... http://209.50.232.36/desires/
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D
>
>The following lines identify the source of this subscription
>request, including date/time, IP number and browser used.
>
>
>
From rob at www.usachat.com Mon May 18 00:04:52 1998
From: rob at www.usachat.com (Robin Nixon)
Date: Mon, 18 May 1998 00:04:52 -0700 (PDT)
Subject: unsubscribe
Message-ID: <003501bd822a$89a26300$d3add9cf@webchat.earthlink.net>
Please give me the exact address to block - we already blocked all we know
of yours.
- Robin.
-----Original Message-----
From: Bill Stewart
To: eureka-help at eureka.abc-web.com ;
abuse at abc-web.com
Date: Monday, May 18, 1998 12:05 AM
Subject: unsubscribe
>unsubscribe
>end
>cypherpunks is a list with several hundred subscribers.
>Some spammer has been trying to subscribe the list
>to your service. Earlier today I connected to the
>web site and found that somebody else had
>permanently removed most of the list aliases,
>but you seem to be sending out this announcement anyway.
>
>At 02:28 AM 5/18/98 -0000, you wrote:
>>WELCOME TO EUREKA!
>>==================
>>Congratulations, your free subscription to the Eureka!
>>newsletter is now set up. We hope you enjoy every copy.
>>As promised, while you wait for your first newsletter
>>here are the links to the FREE videos and FREE photos!
>>
>>BIENVENUE � EUREKA!
>>===================
>>F�licitations, votre abonnement libre � l'Eureka! le
>>bulletin est maintenant install�. Nous esp�rons que
>>vous appr�ciez chaque copie. Comme promis, alors que
>>vous attendez votre premier bulletin ici sont les liens
>>aux videos LIBRES et aux photos LIBRES!
>>
>>WILLKOMMEN ZU EUREKA!
>>=====================
>>Gl�ckw�nsche, Ihre freie Subskription zum Eureka!
>>Rundschreiben wird jetzt oben eingestellt. Wir hoffen,
>>da� Sie jedes Exemplar genie�en. Wie, w�hrend Sie Ihr
>>erstes Rundschreiben hier warten, sind die Links zu den
>>FREIEN videos und zu den FREIEN Fotos versprochen!
>>
>>RECEPCI�N A EUREKA!
>>===================
>>Felicitaciones, su suscripci�n libre al Eureka! el
>>bolet�n de noticias ahora se fija para arriba.
>>Esperamos que usted goce de cada copia. Seg�n lo
>>prometido, mientras que usted espera su primer bolet�n
>>de noticias aqu� son las conexiones a los videos LIBRES
>>y a las fotos LIBRES!
>>
>>BENVENUTO A EUREKA!
>>===================
>>Congratulazioni, il vostro abbonamento libero al
>>Eureka! il bollettino ora � installato. Speriamo che
>>godiate ogni copia. Come promesso, mentre aspettate il
>>vostro primo bollettino qui sono i collegamenti ai vid-
>>eos LIBERI ed alle foto LIBERE!
>>
>>BOA VINDA A EUREKA!
>>===================
>>Felicita��es, sua subscri��o livre ao Eureka! o boletim
>>de not�cias � ajustado agora acima. N�s esperamos que
>>voc� aprec�e cada c�pia. Como prometidas, quando voc�
>>esperar seu primeiro boletim de not�cias aqui s�o as
>>liga��es aos videos LIVRES e �s fotos LIVRES!
>>
>>=======================================================
>>FREE hardcore videos ........ http://www.slutorama.com/
>>FREE hardcore photos .... http://209.50.232.36/desires/
>>=======================================================
>>
>>The following lines identify the source of this subscription
>>request, including date/time, IP number and browser used.
>>
>>
>>
From brownrk1 at texaco.com Mon May 18 02:39:58 1998
From: brownrk1 at texaco.com (Brown, R Ken)
Date: Mon, 18 May 1998 02:39:58 -0700 (PDT)
Subject: Gunpowder taggant solution
Message-ID: <896C7C3540C3D111AB9F00805FA78CE20279C0@MSX11002>
> ichudov at algebra.com[SMTP:ichudov at algebra.com] wrote:
>
> Also, a gun owner could simply buy gnu powder in various places and
> mix the batches.
We call it Wildebeeste Powder in this neck of the woods.
If you mix Blue Wildebeeste and Black Wildebeeste you get a virtual
Serengeti. There's a good one in the Natural History Museum in
Kensington. Just next to the Horese Evolution quiz.
From jya at pipeline.com Mon May 18 04:28:05 1998
From: jya at pipeline.com (John Young)
Date: Mon, 18 May 1998 04:28:05 -0700 (PDT)
Subject: Crypto Under Digital Copyright Act
Message-ID: <199805181127.HAA16402@camel8.mindspring.com>
Congressional Record: May 15, 1998 (Senate)
DIGITAL MILLENNIUM COPYRIGHT ACT
Mr. KYL. Mr. President, I rise today to speak about a section in the
Digital Millennium Copyright Act that I am particularly proud of, and
that is the law enforcement exception in the bill. At the Judiciary
Committee markup, Senator Grassley and I, along with the assistance of
Chairman Hatch and Senator Ashcroft worked to strengthen the law
enforcement exception in the bill. We received input on the language
from the copyright community and the administration: the National
Security Agency (NSA), the Central Intelligence Agency (CIA), the
Departments of Commerce and Justice, and the Office of Management and
Budget (OMB).
The law enforcement exception ensures that the government continues
to have access to current and future technologies to assist in their
investigative, protective, or intelligence activities. I am concerned
that the tools and resources of our intelligence and law enforcement
communities are preserved--and more importantly, not limited, by
passage of S. 2037. Under that bill, a company who contracts with the
government can continue to develop encryption/decryption devices under
that contract, without having to worry about criminal penalties.
Because much of our leading technologies come from the private
sector, the government needs to have access to this vital resource for
intelligence and law enforcement purposes.
The law enforcement exception recognizes that oftentimes governmental
agencies work with non-governmental entities--companies, in order to
have access to and develop cutting edge technologies and devices. Such
conduct should not be prohibited or impeded by this copyright
legislation.
____________________
Digital Millenium Copyright Act:
http://jya.com/s2037.txt (162K)
From 88769500 at 27850.com Mon May 18 04:49:43 1998
From: 88769500 at 27850.com (Heather Johnson)
Date: Mon, 18 May 1998 04:49:43 -0700 (PDT)
Subject: I heard you wanted my picture..
Message-ID: <199805180718.HAA25658@mailroot.com>
Here it is!
From sunder at brainlink.com Mon May 18 09:53:47 1998
From: sunder at brainlink.com (Sunder)
Date: Mon, 18 May 1998 09:53:47 -0700 (PDT)
Subject: Gunpowder taggant solution
In-Reply-To: <199805161952.OAA22508@manifold.algebra.com>
Message-ID: <3560664D.A697C23A@brainlink.com>
Igor Chudov @ home wrote:
> Also, a gun owner could simply buy gnu powder in various places and
> mix the batches.
Ayeee! Just what we needed! Free Software GnuPowder. :) From the folx
who broght you Emacs. :)
(sorry had to be done!)
--
=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run |\/|\/
../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were.... |.....
======================= http://www.sundernet.com ==========================
From jya at pipeline.com Mon May 18 10:37:57 1998
From: jya at pipeline.com (John Young)
Date: Mon, 18 May 1998 10:37:57 -0700 (PDT)
Subject: German Phone Cards Hacked
Message-ID: <199805181737.NAA03845@camel8.mindspring.com>
Forwarded from Europe:
May 18, 1998
Telephone card fraud in the millions of dollars.
Hackers from the Netherlands have inundated the German market with illegally
recharged telephone cards, causing losses in the several millions of marks
(millions of dollars), stated the weekly Focus, due out Monday.
In breaking the telephone cards' code, the hackers succeeded in recharging
cards emptied of their credit.
The German association of tobacconist wholesalers assesses losses at 60
million marks (33 million dollars), reports Focus.
The con men bought used cards by the thousands from collectors. As a
result, their intitial price of five pfenning (2.7 cents) per card quickly
rose to one mark (55 cents).
According to experts cited by Focus, the recharged cards, which the
pirates resold at a lesser or equivalent price, are impossible to
distinguish from those purchased legitimately.
Card producers intend to stop this illegal commerce thanks to a new software
program allowing used cards to be electronically marked, the weekly believes.
[Translation by DN]
----------
Escroquerie de plusieurs millions de dollars par cartes t�l�phoniques
Des pirates informatiques n�erlandais ont inond� le march� allemand avec
des cartes t�l�phoniques recharg�es ill�galement, causant un pr�judice
de plusieurs millions de marks (plusieurs millions de dollars), affirme
l'hebdomadaire Focus � para�tre lundi.
En for�ant le syst�me de codage des cartes t�l�phoniques, les pirates
ont r�ussi � recharger des cartes vid�es de leurs unit�s.
L'association allemande des grossistes et d�bitants de tabac chiffre le
pr�judice � 60 millions de marks (33 millions de dollars), rapporte
Focus.
Les escrocs achetaient des cartes usag�es par milliers aupr�s de
collectionneurs. Leur prix initial de cinq pfennig (2,7 cents) par carte
est de ce fait rapidement mont� � pr�s d'un mark (55 cents).
Selon des experts cit�s par Focus, les cartes recharg�es, que les
pirates revendaient � un moindre prix ou au m�me prix, sont impossibles
� diff�rencier de celles d�ment achet�es.
Les fabricants de cartes entendent stopper ce commerce ill�gal gr�ce �
un nouveau programme informatique (software) permettant de marquer
�lectroniquement les cartes usag�es, croit savoir l'hebdomadaire.
From online at cyper-west.com Mon May 18 11:14:29 1998
From: online at cyper-west.com (OnLine Mortgage Corp.)
Date: Mon, 18 May 1998 11:14:29 -0700 (PDT)
Subject: Home Loans on the Net
Message-ID: <199805181264EAA42243@post.cyber-west.com>
With intersest rates so low, you might be intersted in obtaining a new Home Loan.
Does your income not quite cover all your needs? Are you left wanting for business needs, home needs, autos, travel, or for any other purpose or do you just want to get out of DEBT?
Just complete our EASY APPLICATION (http://www.mortgageweb.com/onlea.htm) and we will do a finanical analysis to see how much money you can save each month. Or how much money you can get to be used for any purpose.
You can borrow money for:
Debt Consolidation
Autos & Boats
Starting a Business
Medical Expenses
Anything you might need
You alone decide how much to borrow and how long to repay the loan. In fact may programs allow you to repay early with no penalty.
So APPLY NOW, you have nothing to lose. In fact if you act within the next 48 hours we will include a free pre-paid calling card with your loan. (http://www.mortgageweb.com/onlea.htm)
OnLine Mortgage Corporation
************************************************************************************************
We are responsible e-mailers and received information that you might be interested in this program. If this was done in error please accept our appology and hit reply and enter "remove in the heading".
**************************************************************************************************
From lfarrar at chsch.demon.co.uk Sun May 17 21:20:00 1998
From: lfarrar at chsch.demon.co.uk (Luke Farar)
Date: Mon, 18 May 1998 12:20:00 +0800
Subject: remove
Message-ID: <355CF548.1F08@chsch.demon.co.uk>
remove
From billp at nmol.com Mon May 18 13:23:34 1998
From: billp at nmol.com (bill payne)
Date: Mon, 18 May 1998 13:23:34 -0700 (PDT)
Subject: National Atomic Museum
Message-ID: <35609809.407F@nmol.com>
Monday 5/18/98 1:37 PM
John Young
J Orlin Grabbe
Morales http://jya.com/whpfiles.htm and I had lunch at Wendy�s at 11:30.
I read drafts of Morales upcoming filings. And discussed legal
strategies.
After lunch, I went to the National Atomic Museum on Kirtland AFB.
The museum is across the street from Sandia.
They now charge for admission ... but I made it in for $1 as a senior
citizen.
The museum main hall tour is laid out by history date of radiation.
The self-guided tour gets interesting about the time of Hahn,
Heisenberg,
Fermi, Lawrence, ... Then it gets into THE BOMB.
Lots of picture of the �50 NTS site explosions. But as we know from
Carole Gallagher book's American Ground Zero a DOE employee is quoted
�Those Mormons don�t give a shit about radiation.�
After touring the main hall, I went back to a wall display near the
bathrooms.
There they have a rather-large display on LANL mathematician Stanislas
Ulam.
Ulam�s thing was Monte Carlo computations. These use random or
pseudorandom
numbers.
Ted Lewis told me that they now use the gfsr at LANL for its nuclear
bomb
simulations.
http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=0
But this is how the mess got started. Me making contact with a
Japanese
professor who developed a new method for selecting the binary seed
matrix
for the gfsr.
I went into the gift shop.
I bought John Young a refrigerator magnet PROUDLY proclaiming
1945 509th COMPOSITE GROUP 1995
FIRST ATOMIC BOMBARDMENT
50th ANNIVERSARY
and Orlin a colorful red and orange postcard which reads on the back
Trinity
On July 16, 1945 at 5:30 AM, at a site code-named trinity,
approximately 130 miles south of Albuquerque on White
Sands Missile Range, the world�s first nuclear device was
exploded. The explosion, equal to 20,000 tons of TNT, was
was seen and heard over the entire state of New Mexico.
Great article, Orlin. http://www.aci.net/kalliste/speccoll.htm
Madsen did good too. http://caq.com/cryptogate
Let�s all hope Congress, unlike the bureaucrats, see the merits of
getting
the requested documents posted on Internet. And on to settlement of
this
UNFORTUNATE matter.
Later
bill
From shamrock at cypherpunks.to Mon May 18 13:31:35 1998
From: shamrock at cypherpunks.to (Lucky Green)
Date: Mon, 18 May 1998 13:31:35 -0700 (PDT)
Subject: Crypto Under Digital Copyright Act
In-Reply-To: <199805181127.HAA16402@camel8.mindspring.com>
Message-ID:
On Mon, 18 May 1998, John Young wrote:
> Congressional Record: May 15, 1998 (Senate)
>
> DIGITAL MILLENNIUM COPYRIGHT ACT
>
> Mr. KYL. Mr. President, I rise today to speak about a section in the
> Digital Millennium Copyright Act that I am particularly proud of, and
> that is the law enforcement exception in the bill.
Yup. Reverse engineer a cipher, go to jail. Seems future security analysis
of ciphers will have to be released anonymously from Tonga.
-- Lucky Green PGP v5 encrypted email preferred.
"Tonga? Where the hell is Tonga? They have Cypherpunks there?"
From jim at mentat.com Mon May 18 16:23:06 1998
From: jim at mentat.com (Jim Gillogly)
Date: Mon, 18 May 1998 16:23:06 -0700 (PDT)
Subject: GFSR initialization? [Re: National Atomic Museum]
Message-ID: <9805182322.AA27897@mentat.com>
[Bill Payne's's mailing list pruned back to cypherpunks only]
> Ted Lewis told me that they now use the gfsr at LANL for its nuclear
> bomb=20
> simulations.
>
> http://av.yahoo.com/bin/query?p=3Dgfsr&hc=3D0&hs=3D0=20
>
> But this is how the mess got started. Me making contact with a
> Japanese=20
> professor who developed a new method for selecting the binary seed
> matrix
> for the gfsr.
Is that to speed it up, so you don't have to initialize it by spinning
through a bunch of initial iterations? Turns out there's a time-memory
tradeoff, where if you do a recursion relationship on where you want it
to start, you can set it up in log2 time and come out with the same
starting point you would have by spinning: the recursion equations
cancel nicely and it boils down to something manageable. I think other
people have initialized it with another PRNG with good success.
I that's not classified, since I came up with the recursion
shortly after the Lewis & Payne paper on GFSR came out -- JACM, wasn't
it? I never got around to writing it up.
Jim Gillogly
From wopaulai91 at yahoo.com Mon May 18 19:14:18 1998
From: wopaulai91 at yahoo.com (wopaulai91 at yahoo.com)
Date: Mon, 18 May 1998 19:14:18 -0700 (PDT)
Subject: Information you requested!
Message-ID: <199805182121RAA19197@us.ibm.net.bmc.com>
Thank you for your interest in our training Course.
Success Courses offers an extensive Video Tape training course in "How to Collect Judicial Judgments".
If you are like many people, you are not even sure what a Judicial Judgment is and why processing Judicial Judgments can earn you very substantial income.
If you ever sue a company or a person and you win then you will have a Judicial Judgment against them. You are happy you won but you will soon find out the shocking fact: "Its now up to you to collect on the Judgment". The court does not require the loser to pay you. The court will not even help you. You must trace the loser down, find their assets, their employment, bank accounts, real estate, stocks and bonds, etc. Very few people know how to find these assets or what to do when they are found. The result is that millions of Judgments are just sitting in files and being forgotten.
"In 79% of the cases the winner of a Judgment never sees a dime."
The non-payment of judicial debt has grown to epidemic proportions. Right now in the United States there is between 200 and 300 billion dollars of uncollected Judicial Judgment debt. For every Judgment that is paid, 5 more Judgments take its place.
We identified this massive market 4 years ago and have actively pursued Judicial Judgments since. We invented this business. We have perfected it into a well proven and solid profession in which only a select few will be trained in the techniques necessary to succeed in this profession.
With our first hand experience we have built a course which teaches you how to start your business in this new unknown and exciting field of processing Judicial Judgments.
By following the steps laid out in our course and with reasonable effort you can become very successful in the processing of Judicial Judgments.
The income potential is substantial in this profession. We have associates who have taken our course and are now working full time making $96,000.00 to over $200,000.00 per year. Part time associates are earning between $24,000.00 and $100,000.00 per year. Some choose to operate out of their home and work by themselves. Others build a sizable organization of 15 to 25 people in attractive business offices.
Today Success Courses and our associates have over 632 million dollars in Judicial Judgments that we are currently processing. Of this 632 million, 36 million is in the form of joint ventures between our firm and our associates. Joint ventures are where we make our money. We only break even when our course is purchased. We make a 12% margin on the reports we supply to our associates. Our reporting capability is so extensive that government agencies, police officers, attorneys, credit agencies etc. all come to us for reports.
Many of our associates already have real estate liens in force of between 5 million to over 15 million dollars. Legally this means that when the properties are sold or refinanced our associate must be paid off. The norm is 10% interest compounded annually on unpaid Judicial Judgments. Annual interest on 5 million at 10% translates to $500,000.00 annually in interest income, not counting the payment of the principle. Our associates earn half of this amount or $250,000.00 per year. This is just for interest, not counting principle and not counting the compounding of the interest which can add substantial additional income. Typically companies are sold for 10 times earnings. Just based on simple interest an associate with 5 million in real estate liens could sell their business for approximately 2.5 million dollars.
92% of all of our associates work out of their home; 43% are women and 36% are part time.
One of the benefits of working in this field is that you are not under any kind of time frame. If you decide to take off for a month on vacation then go. The Judgments you are working on will be there when you return. The Judgments are still in force, they do not disappear.
The way we train you is non-confrontational. You use your computer and telephone to do most of the processing. You never confront the debtor. The debtor doesn't know who you are. You are not a collection agency.
Simply stated the steps to successful Judicial Processing are as follows:
� Mail our recommended letter to companies and individuals with Judicial Judgments. (We train you how to find out who to write to)
� 8% to 11% of the firms and people you write will call you and ask for your help. They call you, you don't call them unless you want to.
� You send them an agreement (supplied in the course) to sign which splits every dollar you collect 50% to you and 50% to them. This applies no matter if the judgment is for $2,000.00 or $2,000,000.00.
� You then go on-line to our computers to find the debtor and their assets. We offer over 120 powerful reports to assist you. They range from credit reports from all three credit bureaus, to bank account locates, employment locates, skip traces and locating stocks and bonds, etc. The prices of our reports are very low. Typically 1/2 to 1/3 of what other firms charge. For example we charge $6.00 for an individuals credit report when some other companies charge $25.00.
� Once you find the debtor and their assets you file garnishments and liens on the assets you have located. (Standard fill in the blanks forms are included in the course)
� When you receive the assets you keep 50% and send 50% to the original Judgment holder.
� Once the Judgment is fully paid you mail a Satisfaction of Judgment to the court. (Included in the course)
Quote's from several of our students:
Thomas in area code 516 writes us: "I just wanted to drop you a short note thanking you for your excellent course. My first week, part time, will net me 3,700.00 dollars. Your professionalism in both the manual and the video opened doors for me in the future. There's no stopping me now. As of February 3rd, 1995, Thomas states he has over $8,500,000 worth of judgments he is working on.
After only having this course for four months, Larry S. in area code 314 stated to us: "I am now making $2,000.00 per week and expect this to grow to twice this amount within the next year. I am having a ball. I have over $250,000 in judgments I am collecting on now."
After having our course for 7 months Larry S. in 314 stated "I am now making $12,000.00 per month and have approximately $500,000.00 in judgments I am collecting on. Looks like I will have to hire someone to help out"
Marshal in area code 407 states to us "I feel bad, you only charged me $189.00 for this course and it is a gold mine. I have added 3 full time people to help me after only having your course for 5 months"
If the above sounds interesting to you then its time for you to talk to a real live human being, no cost or obligation on your part.
Please call us at Area Code 2 5 3 then 8 6 3--5 5 2 2. We have Customer Support staff available to you from 8:00AM to 7:00PM (Pacific Time) Monday through Saturday. Closed Sunday. If you call this number you can talk to one of our experienced Customer Support personnel. They can answer any questions you may have - with no obligation. Sometimes we run special pricing on our courses and combinations of courses. When you call our Customer Support line they can let you know of any specials we may be running. If you like what you read and hear about our courses, then the Customer Support person can work with you to place your order. We are very low key. We merely give you the facts and you can then decide if you want to work with us or not.
>From the above information and actual results you can see why we can state the following:
With our course you can own your own successful business. A business which earns you substantial income now and one which could be sold in 3-5 years, paying you enough to retire on and travel the world. A business which is extremely interesting to be in. A Business in which every day is new and exciting. None of your days will be hum drum. Your brain is challenged. A business which protects you from Corporate downsizing. A business which you can start part time from your home and later, if you so desire, you can work in full time. A business which is your ticket to freedom from others telling you what to do. A business which lets you control your own destiny. Our training has made this happen for many others already. Make it happen for you!
Thank you for your time and interest.
24mx58.10gr.1
From 9086097 at 6urt6ijratr.com Tue May 19 01:26:20 1998
From: 9086097 at 6urt6ijratr.com (9086097 at 6urt6ijratr.com)
Date: Tue, 19 May 1998 01:26:20 -0700 (PDT)
Subject: 40 MILLION EMAIL ADDRESSES CHEAP PRICE!!!
Message-ID: <199805190826.BAA22562@toad.com>
40 MILLION EMAILS FOR SALE super low price!
Our Fresh Addresses Will Bring You
Incredible Results!
http://207.93.198.154/webhost
If you REALLY want to get the word out regarding
your services or products, Bulk Email is the BEST
way to do so, PERIOD! Advertising in newsroups is
good but you're competing with hundreds even THOUSANDS
of other ads. Will your customer's see YOUR ad in the
midst of all the others?
Bulk Email will allow you to DIRECTLY contact your
potential customers. They are much more likely to
take the time to read about what you have to offer
if it was as easy as reading it via email rather
than searching through countless postings in
newsgroups.
There is a secret to effective Bulk Email...HIGH
QUALITY LISTS! There are SO many companies offering
bulk email lists that are months old and it's not
uncommen for HALF of those addresses to be outdated
and undeliverable. Also, most companies offer lists
that they have compiled from addresses extracted from
newsgroups, THE WORST PLACE TO GET ADDRESSES FROM!
Why? Simple, most people that post messages in news-
groups KNOW that their addresses might be extracted
so they use FAKE addresses resulting in undeliverable
messages.
You can now get FRESH, HIGH QUALITY lists of addresses
that have NOT been extracted from newsgroups! Our lists
are compiled of addresses that we have extracted from
member directories and help forums where you CAN NOT
use fake email addresses! Also, our lists are LESS than
1 month old and are CONSTANTLY updated to remove dupes
and undeliverables!
Our emails can be downloaded at a web site or be shipped to your home in disks. Our emails are in text
form, one line per email. This form is compatible with Pegasus, Eudora, Microsoft email programs, and
many other popular email softwares.
We believe that if you have a great product or service for everyone, you should let everyone know. Do it
cost effectively today! Sending emails doesn't cost you one cent! In just one night, millions of people will
know about your company or your corporation. Market your company by reaching 40,000,000 (40 million)
fresh customers for only $79.00!!!!
Special Sale! Buy the 40 Million email addresses today and receive Email Platinum Professional Version
FREE! Email Platinum Pro is 4 programs in one! (This message is sent by Email Platinum. You can too send
out mass sales letters professionally.)
Email Platinum is an extremely fast mass emailer (150,000 emails per hour with modest Pentium) that does
four things:
1) Collects email addresses from newsgroups, web sites, or from AOL member files by key words and by
specific interests.
2) Mail out your sales letters with automated friendly addressing (example: Dear John, Dear Nancy, etc.)
Ramdomizes from and to field. One push of a button does it all. Guarantee no cut and paste.
3) Have capability to remove email addresses of people who don't like emails.
4) Post your sales letters to THOUSANDS OF NEWSGROUPS WITH A PUSH OF A BUTTON --- within HALF
AN HOUR!!
Email Platinum and Email Addresses are your best sales tools! If you have a good product, you will be rich
in no time.
Call today (415)585-3825. All for $79. Not a penny extra.
Call today (415)585-3825. Technical support available 24 hours. Emails are updated regularly.
We can accept Visa or Master Card.
http://207.93.198.154/webhost
Or, simply print this form and fill it out. Mail it along with $79 check or money order to:
Alex Chiu
PO BOX 16547
San Francisco CA 94116
(415) 585-3825
Upon the receipt of your payment, you will immediately be instructed via email or by phone on how to
download the fresh email addresses.
Name: _________________________________
Address: ________________________________________
_________________________________________________
Telephone number: ___________________________
Email address: ______________________________
-----------------------------------------------------
------------------------------------------------------
Don't want to email millions of people yourself? No problem. I can do it for you professionally! I mail out
two million emails for you within 3 days for $129!! Tell me what kind of customer you would want, and I
will set the target with my highly targeted list. A mere $129 service includes:
Email two million people. (targeted prospects)
Post advertisement on 2000 newsgroups.
telephone recommendations and technical support on how to make money on the internet.
I guarantee you this is a great way to start your own company on the internet. Few months later, you will
be like me making $5000 a month with internet! Call (415) 585-3825 if you have any question.
From www at dejanews.com Tue May 19 02:40:00 1998
From: www at dejanews.com (www at dejanews.com)
Date: Tue, 19 May 1998 02:40:00 -0700 (PDT)
Subject: Deja News Registration Confirmation
Message-ID: <199805190939.EAA21236@x5.dejanews.com>
Welcome to My Deja News!
You have registered for My Deja News using the email address:
cypherpunks at toad.com. If you did not register for My Deja News,
please ignore this message.
To enable you to post messages on Deja News, we must confirm
your email address. This allows us to minimize "spam" and other
problems. To confirm your email address, visit the following Web
page:
http://www.dejanews.com/ec.xp/Z9601d5cf485376063bac83214984f531fd6293a
If your email software supports it, you can simply click on the
link. Since this Web page address (URL) is quite lengthy, however,
you may find it necessary to copy the entire URL and paste it into
your Web browser.
As a reminder, your username is bsphynx and your password
is sphynx. You may wish to keep this email to refer to in
case you forget.
If you have any questions about My Deja News, please refer to the
Help page at http://www.dejanews.com/help/help_regstr.shtml
Thanks,
Deja News
From jya at pipeline.com Tue May 19 04:39:44 1998
From: jya at pipeline.com (John Young)
Date: Tue, 19 May 1998 04:39:44 -0700 (PDT)
Subject: German Phone Cards Hacked
In-Reply-To: <199805181737.NAA03845@camel8.mindspring.com>
Message-ID: <199805191139.HAA15263@camel8.mindspring.com>
See English version of German article yesterday on Dutch
hack of phone cards:
http://jya.com/card-less.htm
From jya at pipeline.com Tue May 19 04:57:57 1998
From: jya at pipeline.com (John Young)
Date: Tue, 19 May 1998 04:57:57 -0700 (PDT)
Subject: G8 on High Tech Crime
Message-ID: <199805191157.HAA20483@camel8.mindspring.com>
Ross Anderson and Ulf M�ller have provided URLs
for the recent communique from the Brimingham G8
summit on "principles and action plan" for fighting
high tech crime:
http://jya.com/g8crime.htm
From bill.stewart at pobox.com Tue May 19 08:05:24 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Tue, 19 May 1998 08:05:24 -0700 (PDT)
Subject: linux-ipsec: ANNOUNCE: FreeS/WAN IPSEC & IKE version 0.8 released & useful!
Message-ID: <3.0.5.32.19980518152708.008bdd30@popd.ix.netcom.com>
Forwarded from linux-ipsec at clinet.fi - posted by Hugh Daniel
---------------------------------------------------------
I would like to announce for the FreeS/WAN software team that they
now have a freeswan-0.8 release available for download from the
FreeS/WAN home page at:
http://www.xs4all.nl/~freeswan
The 0.8 (and target 1.0 in June) runs only in a VPN (tunnel) mode,
protecting and encrypting net traffic for a subnet behind the SG.
This setup is called a SG for Security Gateway. We plan on
implementing the rest of the IPSEC and IKE draft standards in our 2.0
release later this summer for the 2.1.xxx and 2.2.xx series Linux
kernels.
There is some useful documentation for the current FreeS/WAN done by
Kai Martius at:
http://www.imib.med.tu-dresden.de/imib/Internet/index.html
The 0.8 release has been tested extensively in the hand keyed
ESP-3DES-HMAC-MD5-96 tunnel mode and is quite robust. On a 150Mhz 586
Clone PC TCP throughput is over 320 Kbytes/second sustained as
measured by netperf.
The IKE daemon pluto has been tested only a very little and
sometimes works and sometimes does not. It will work for the simple
VPN case before 1.0.
Feedback, new features, documentation, scripts and bug fixes &
reports are especially useful in the next few weeks before we start in
on the 0.9x series of release working up to a stable 1.0 release in
June. Don't wait for the last minute to submit that neat feature or
bug fix, as we might not have time to include it!
If you have questions about the project please see our home page
where you will find a mail list, list archives, FTP directory's etc.
Thanks to everyone who made this release possible, but mostly the
people who coded it up!
Please post all bugs, fixes, code etc. to the public email list at
.
||ugh Daniel
hugh at toad.com
Systems Testing & Project mis-Management
The Linux FreeS/WAN Project
http://www.xs4all.nl/~freeswan
From LISTSERV at LISTSERV.AOL.COM Tue May 19 08:05:54 1998
From: LISTSERV at LISTSERV.AOL.COM (L-Soft list server at America Online (1.8c))
Date: Tue, 19 May 1998 08:05:54 -0700 (PDT)
Subject: Rejected posting to CYBERIA-L@LISTSERV.AOL.COM
Message-ID: <199805191505.IAA03014@toad.com>
You are not authorized to send mail to the CYBERIA-L list from your
cypherpunks at TOAD.COM account. You might be authorized to send to the list from
another of your accounts, or perhaps when using another mail program which
generates slightly different addresses, but LISTSERV has no way to associate
this other account or address with yours. If you need assistance or if you have
any question regarding the policy of the CYBERIA-L list, please contact the
list owners: CYBERIA-L-request at LISTSERV.AOL.COM.
------------------------ Rejected message (36 lines) --------------------------
Received: from netcomsv.netcom.com (uucp1-b.netcom.com [163.179.3.1])
by listserv.aol.com (8.8.8/8.8.8)
with ESMTP id LAA20089 for ;
Tue, 19 May 1998 11:05:16 -0400 (EDT)
Received: from ca07b8bl (pax-ca14-19.ix.netcom.com [204.31.233.83])
by netcomsv.netcom.com (8.8.5-r-beta/8.8.5/(NETCOM v1.01)) with SMTP id IAA23186;
Tue, 19 May 1998 08:05:12 -0700 (PDT)
Message-Id: <3.0.5.32.19980518104054.008bd710 at popd.ix.netcom.com>
X-Sender: stewarts at popd.ix.netcom.com (Unverified)
X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
Date: Mon, 18 May 1998 10:40:54 -0700
To: Law & Policy of Computer Communications ,
CYBERIA-L at LISTSERV.AOL.COM
From: Bill Stewart
Subject: Re: regulating speech (was: DNS)
In-Reply-To: <3.0.16.19980515115128.34271d5c at pop.radix.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
At 12:41 PM 5/15/98 -0400, Donald Weightman wrote:
>I wonder if LEBRON V. AMTRAK is relevant here. There the Court extended
>the First Amendment to corporations created by, and under the control of,
>the government in the case of an artist who argued successfully that Amtrak
>had been wrong to reject his billboard display because of its political
>message.
>
>The devil is in the details -- of InterNIC's creation and operation, vs.
>Amtrak's.
The Supreme Court just decided that Tax-funded radio/tv stations
don't have to include all candidates for an office in their debates
if they don't feel like it, based on First Amendment reasons.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From eureka-help at eureka.abc-web.com Tue May 19 08:42:45 1998
From: eureka-help at eureka.abc-web.com (eureka-help at eureka.abc-web.com)
Date: Tue, 19 May 1998 08:42:45 -0700 (PDT)
Subject: Successful Subscription
Message-ID: <895592559.16954.ezmlm@eureka.abc-web.com>
WELCOME TO EUREKA!
==================
Congratulations, your free subscription to the Eureka!
newsletter is now set up. We hope you enjoy every copy.
As promised, while you wait for your first newsletter
here are the links to the FREE videos and FREE photos!
BIENVENUE � EUREKA!
===================
F�licitations, votre abonnement libre � l'Eureka! le
bulletin est maintenant install�. Nous esp�rons que
vous appr�ciez chaque copie. Comme promis, alors que
vous attendez votre premier bulletin ici sont les liens
aux videos LIBRES et aux photos LIBRES!
WILLKOMMEN ZU EUREKA!
=====================
Gl�ckw�nsche, Ihre freie Subskription zum Eureka!
Rundschreiben wird jetzt oben eingestellt. Wir hoffen,
da� Sie jedes Exemplar genie�en. Wie, w�hrend Sie Ihr
erstes Rundschreiben hier warten, sind die Links zu den
FREIEN videos und zu den FREIEN Fotos versprochen!
RECEPCI�N A EUREKA!
===================
Felicitaciones, su suscripci�n libre al Eureka! el
bolet�n de noticias ahora se fija para arriba.
Esperamos que usted goce de cada copia. Seg�n lo
prometido, mientras que usted espera su primer bolet�n
de noticias aqu� son las conexiones a los videos LIBRES
y a las fotos LIBRES!
BENVENUTO A EUREKA!
===================
Congratulazioni, il vostro abbonamento libero al
Eureka! il bollettino ora � installato. Speriamo che
godiate ogni copia. Come promesso, mentre aspettate il
vostro primo bollettino qui sono i collegamenti ai vid-
eos LIBERI ed alle foto LIBERE!
BOA VINDA A EUREKA!
===================
Felicita��es, sua subscri��o livre ao Eureka! o boletim
de not�cias � ajustado agora acima. N�s esperamos que
voc� aprec�e cada c�pia. Como prometidas, quando voc�
esperar seu primeiro boletim de not�cias aqui s�o as
liga��es aos videos LIVRES e �s fotos LIVRES!
=======================================================
FREE hardcore videos ........ http://www.slutorama.com/
FREE hardcore photos .... http://209.50.232.36/desires/
=======================================================
The following lines identify the source of this subscription
request, including date/time, IP number and browser used.
From guy at panix.com Tue May 19 08:42:59 1998
From: guy at panix.com (Information Security)
Date: Tue, 19 May 1998 08:42:59 -0700 (PDT)
Subject: NSA & y2k
Message-ID: <199805191542.LAA10584@panix2.panix.com>
Forwarding...
---guy
> From owner-ignition-point at majordomo.pobox.com Tue May 19 10:29:02 1998
> Subject: IP: NSA concerns could hamper DOD Y2K fix
Source: Federal Computer Week
http://www.fcw.com/pubs/fcw/1998/0518/fcw-frontnsa-5-18-1998.html
NSA concerns could hamper DOD Y2K fix
BY BOB BREWIN (antenna at fcw.com)
HEATHER HARRELD (heather at fcw.com)
DANIEL M. VERTON (dan_verton at fcw.com)
The National Security Agency has slapped a security blanket on the
Pentagon's efforts to fix the Year 2000 millennium bug, which could further
slow the Defense Department's already-behind-schedule Year 2000 fixes.
NSA has determined that all information detailing DOD's computers and its
efforts to fix the Year 2000 problem are a "national security interest" and
"highly sensitive." As a result, the Pentagon has cut off the military
services
and DOD project offices from the Defense Integrated Support Tool (DIST)
database, which the Defense Information Systems Agency maintains to
provide details on all DOD computer systems and interfaces for use in
planning and deployment.
DIST, according to DISA, is a database of some 9,000 DOD systems that
the department uses to track such key areas as system interfaces, compliance
with high-priority standards, interoperability testing, consolidation
goals and
Year 2000-compliance planning. DIST was seen as critical to the Year 2000
problem because it provides a central source of information about interfaces
between different DOD systems, which is a chief concern of Year 2000
conversion efforts.
DOD began using DIST to track Year 2000 compliance in August 1996, and
a Dec. 19, 1997, memo from the Office of the Secretary of Defense to DOD
chief information officers identified DIST as the "central, authoritative
database for tracking resolution of the Year 2000-related problems for
systems throughout the department."
That aggregation of extensive details about Year 2000 problems with DOD
systems poses a threat to national security, according to NSA.
"The DOD's Y2K conversion effort is a national security interest," NSA
reported in a statement supplied to FCW. "All information detailing these
information systems and the progress being made toward their conversions is
considered to be highly sensitive."
DOD is not trying to cover up information about its Year 2000 efforts, a
DOD spokeswoman said. "We couldn't hide what we're doing if we wanted
to, and we certainly don't want to," she said. "The idea is to move these
fixes
along at the fastest possible clip but not to jeopardize other security
measures
as we do it."
While industry and service sources said they could understand NSA's security
concerns, they said the classification could hobble the Pentagon's
already-delayed Year 2000 remediation efforts. One former high-ranking
DOD official described the classification issue as symptomatic of what he
called the Pentagon's "gross mismanagement" of Year 2000 issues.
[snip of 90 lines]
**********************************************
To subscribe or unsubscribe, email:
majordomo at majordomo.pobox.com
with the message:
(un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************
From mscompia at microsoft.com Tue May 19 10:46:34 1998
From: mscompia at microsoft.com (mscompia at microsoft.com)
Date: Tue, 19 May 1998 10:46:34 -0700 (PDT)
Subject: Information From The Microsoft Personal Information Center
Message-ID: <0b3382445171358UPIMSSMTPSYS08@msn.com>
Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp.
Password: writecode
If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page.
From StanSqncrs at aol.com Tue May 19 11:11:00 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Tue, 19 May 1998 11:11:00 -0700 (PDT)
Subject: AOL Top Story
Message-ID: <8688e6ed.3561cae5@aol.com>
Hackers Tell About Security Woes
WASHINGTON (AP) - Computer hackers told Congress today that computer security
is so lax, they could disable the entire Internet in a half-hour. Members of
the hacker think-tank called ``The Loft,'' who were praised by senators for
calling attention to the problems of computer security, also warned that they
could transfer Federal Reserve funds by computer and disrupt electrical power.
One hacker, identified by his online handle ``Mudge,'' told the Senate
Governmental Affairs Committee ``if you're looking for computer security then
the Internet is not the place to be.''
From investorsedge at mci2000.com Tue May 19 15:33:58 1998
From: investorsedge at mci2000.com (SunGroup)
Date: Tue, 19 May 1998 15:33:58 -0700 (PDT)
Subject: 90 Day Trial Offer: Day Trades/Growth/Blue Chips/Penny Stocks
Message-ID: <199805182644SAA35444@rush.provo.novell.com>
5/18/98
Dear Investor. Investors Edge is offering a 3-month subscription free.
Investors Edge is a Newsletter that searches out timely undervalued and special situation investment opportunities. From Day Trades to high growth companies. Once you see your returns that you make from our advice, we are confident you will sign up for a full subscription. You have nothing to lose except timely investment opportunities.
Join the rank of those savvy investors who get insights into little known,
high growth companies and accurate market timing for day traders that have the realistic potential to post substantial price gains in the near future.
Click or type here : http://www.investorsedge.net
www.investorsedge.net
Here is a sample of a Market Alert.
Power Technology, Inc. Years Ahead of it's competitors
5/18/98 Market Alert
Power Technology PWTC (OTC: BB: PWTC) Time to start to accumulating. We have learned that the company is about to have a major event. Here is a brief description of the company.
Power Technology's (OTC BB:PWTC), principal offices and laboratory are located at 1000 West Bonanza Rd. Las Vegas, Nevada 89106. The centrally located warehouse, laboratory, office structure, owned by Alvin Snaper, is a two-story 30,000 square foot building. The Company utilities 5,000 square feet for the development and testing battery technology for electric automobiles and other uses.
Current technology in the automotive battery industry utilizes a 6 to12 volt battery system that employs standard electro-plates with lead-acid chemistries. Power Technology has developed with already proven technology, a batter that substantially lighter than the conventional battery and also have a quicker re-charge rate and will be more cost effective. Because this new technology does not use lead, this product will be environmentally friendly.
The potential market for the new Power Technology battery could be any application that utilizes the conventional lead-acid technology. Also the current target market for Power Technology's battery will be the new environmentally friendly electric car. Until recent amendments postponed legislation, the California Air Resources Board decreed that 2% of vehicles sold in California by major automakers must meet a zero-emissions vehicle standard by the year 1998. By the year 2003, 10% of automakers sales mix in California must be electric. In addition clean-air-regulators in a dozen Northeastern states and Washington, DC are considering adopting the same air-quality standards as in California, which could result in an electric vehicle mandate covering roughly 40% of the US car and light-truck market.
The electric cars produce to-date have battery packs that last between 25,000 and 30,000 miles and require a two to three hour recharge using a 220-volt outlet or six to 10 ten hour recharge using a 110-volt outlet and cost about $2000 to $2,500 to replace. Still, these operating and recharge statistics only apply to electric cars or batteries operating at room temperature. At higher temperatures, like those found on sun-soaked asphalt highways (approximately 50% of North America), battery life is drastically diminished. Currently electric cars will carry two people about 50 miles on a hot day. With this kind of performance the consumer will be very limited to where and how far they are able to drive.
The Battery that Power Technology has developed will let a consumer drive approximately 250 miles one a normal charge. The recharge time on a 110-volt outlet is approximately 3 hours. The Power Tech battery also does not contain any harmful materials.
Two weeks ago I saw a prototype of the Battery and spoke to the inventor, Mr. Alan Snaper. The company currently has about $500.000 in the bank and is in discussions with several major companies and governmental agencies regarding this product. Currently Power Technology (OTC.BB) trades around 5 dollars a share. The company just recently started to trade. In my opinion Power Technology is undervalued. I believe this company will do very well in 1998. This is one of those undiscovered, overlooked companies on Wall Street. I really can't even project the potential of this company. 10 to 15 a share by the end of 1998 is extremely conservative.
Take a look at the management. The stock should be 10 just based on the management's resume.
Management: Alvin A. Snaper, is the company's vice-president of development and the project coordinator for the new technology. He has been engaged in scientific research and development of products and processes for 30 years. His well known inventions include the IBM Selectic Ball, Tang (the Orange drink), the NASA Apollo Photo-pack and a line of industrial hard coatings currently used by companies such as Gillette, Boeing, TRW, Vermont-American, Gulf Western and many others. Mr. Snapper currently holds 600 U.S. and foreign patents, products and processes. Mr. Snaper is the only inventor to receive the Design News Magazine Best Patent of the Year award for three separate years. In fact he is the only individual to receive more than one such citation.
Charles Warn is the Chief chemical engineer for the project. He has over 40 years experience in development and project engineering and design expertise in a variety of different disciplines. His past experience includes working with General Motors and Parker-Hannifin with high performance aircraft fuel systems.
Chances are that one of the big three automakers will buy out Power Technology.
Due to no exposure in the financial industry, Power is undiscovered and a screaming buy.
From kie25 at msn.com Tue May 19 17:34:28 1998
From: kie25 at msn.com (kie25 at msn.com)
Date: Tue, 19 May 1998 17:34:28 -0700 (PDT)
Subject: A DIRTY LITTLE JOKE!!!
Message-ID: <199805191585RAA15856@server.on.ca>
| ------------------WWW.THEDIRTYJOKE.COM------------------ |
|This filthy joke was brought to you by the wonderful folks|
|at WWW.THEDIRTYJOKE.COM ... Feel free to send this joke�� |
|to anyone you think might get a kick out if it ... and for|
|more great jokes visit WWW.THEDIRTYJOKE.COM ...���������� |
| ------------------WWW.THEDIRTYJOKE.COM------------------ |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
�
The other day I was out playing some golf ... and my ball
landed on the rough in a patch of buttercups.� As I lifted
my club in the air I heard a faint voice ... "Please don't
hurt my buttercups, buttercups."� I lowered my club and took
a quick glance back and forth to make sure that I was alone.
Satisfied that I was alone, I began to raise my club ... and
again came the same voice, this time a bit louder, "Please
don't hurt my buttercups, buttercups."� This time I was so
sure of the voice that I spoke aloud, "Hello, is someone out
there." No sooner than I had finished speaking a tiny fairy
appeared before me.� "I am the forest fairy, if you don't
hurt my buttercups then I'll give you all the butter you
could want for the rest of your life." and so I replied ...
"Where the hell where you when I was in the pussywillows?"
�
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| -----------------WWW.EROTICBOXOFFICE.COM---------------- |
|If you're looking for the sexiest women on the net, you�� |
|should start you're hunt at WWW.EROTICBOXOFFICE.COM ... We|
|have the youngest, most adorable girls you'll ever see!�� |
|And you won't find 'em anywhere else ...����������������� |
| ------------------THE HUNT STARTS HERE------------------ |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
From redsonja at liii.com Tue May 19 20:08:20 1998
From: redsonja at liii.com (She Devil With A Modem)
Date: Tue, 19 May 1998 20:08:20 -0700 (PDT)
Subject: Suit with braindead tie
Message-ID: <199805200308.XAA06738@rowan.liii.com>
Also Sprach Anonymous:
>
> time.com / The Netly News
> May 19, 1998
>
> There was blood in the water in Washington, DC yesterday, and
> Microsoft's foes hardly had a chance to rejoice over the government's
> anticipated antitrust lawsuit before they were asking for more.
> Longtime Microfoe Gary Reback, an attorney with the Silicon Valley law
> firm Wilson Sonsini Goodrich & Rosati, still thinks breaking up
> Microsoft AT&T-style would be a good idea. At a press conference
> yesterday, Sen. Orrin Hatch (R-Utah) predicted the lawsuit "will
> become even broader. I have no doubt about that." Netscape dubbed it a
> welcome but only an "initial step."
>
> [...remainder snipped...]
I wonder if anyone else has picked up on the "Braindead military
action" of awarding Microsoft the dubiously coveted intelligence
desktop? It may not be as braindead as you think.
Yes, if standard kickbacks and BS occur as they have in the past
(those who are not free to speak about the mistakes of the past
may be doomed to see them repeated) then technical support for
the poor troopies required to maintain the shitty, buggy NT ports
may end up making "Blue Screen Of Death" have an entirely new and
sad meaning. It's sad that the lack of the intelligence community's
desire to police itself as much as it would like to police America's
generic civilians results in the sort of kickbacking that yields
inferior weaponry, but I guess if they don't address that it will
end up biting them in the ass. And yes, that is indeed indicative
of a braindead military, led by the supreme oxymoron of a braindead
military intelligence community, where the dutiful are asked to
turn their eyes away (for reasons of classification, of course)
from the acts of the greedy.
But assume for a moment that it might be the military and not M$oft
that holds the leash on the contract. Imagine a Microsoft that
has sold it's soul to the US Intel community. Couldn't happen to a
nicer company, don't you think? Microsoft HAVING to port their NT
stuff to the Unix boxes that hold the databases and the communications
servers. Microsoft HAVING to provide a certain amount of "mission
critical" tech support. Microsoft HAVING to deal with adapting to
the real world, rather than forcing the world to adapt to it.
This could be the beginning of a beautiful "friendship". >;-7
--
"Good evening, Mr. Burglar! My name is Jowles! | Do not CD c
Would you care for a cocktail before I attempt | taunt --------P===\==/
to intimidate you with my aggressive behavior?" | happy fun /_\__
-- Miss Manners' Attack Dog | fencer! _\ \
S
From jya at pipeline.com Tue May 19 20:17:08 1998
From: jya at pipeline.com (John Young)
Date: Tue, 19 May 1998 20:17:08 -0700 (PDT)
Subject: Chaum's patent on traceable payment systems
In-Reply-To:
Message-ID: <199805200317.XAA29396@camel8.mindspring.com>
Chaum's "limited-traceability" patent includes other features
which directly counterbalance those of the Abstract accurately
posted by Anonymous. We've transcribed the initial sections of the
17-page patent which provide a fuller view of what his system
offers:
http://jya.com/chaum-lts.htm
It's an interesting, nuanced proposal, from 1994, which helps
explain some of the strategy he's been keeping close to his
chest until patent approval, and which may portend more
provocative designs in the pipeline for outfoxing the keepers
of the chickens.
From StanSqncrs at aol.com Tue May 19 20:40:49 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Tue, 19 May 1998 20:40:49 -0700 (PDT)
Subject: 'Nobody', Still At Home!
Message-ID: <7272bfd8.3562508e@aol.com>
In a message dated 5/19/98 10:09:01 PM Central Daylight Time,
mixmaster at remail.obscura.com writes:
<< Stan, It is considered rude to quote a private e-mail publicly without
obtaining permission from the sender first. Try putting "netiquitte" in your
favorite search engine. Then read and learn. This will help you. >>
Gee, like sending anonomous, unsolicited e-mail isn't against "netiquitte"?
Try taking that "plank" out of you eye, buddy!
Stan
From postmaster at xxxmail.net Tue May 19 20:49:29 1998
From: postmaster at xxxmail.net (Adults Only)
Date: Tue, 19 May 1998 20:49:29 -0700 (PDT)
Subject: http://www.scarlett.net/starter
Message-ID: <3.0.3.32.19980519091310.00a09b80@208.15.12.231>
http://www.scarlett.net/starter
Everyone needs legal images on their web sites these days!!
And XXX by SCARLETT has got the pictures you need!!
XXX RAW EXTREME HARDCORE , BIZAARE Pics is what we specialize in!!
Check out http://www.scarlett.net/starter
Our specials are unbeatable and only 30 CD's are sold to Webmasters!! :D
CD #1 - 1000+images for $500.00 (Mostly hardcore)
CD #2 - 500+images for $250.00 (ALL EXTREME HARDCORE)
CD #3 - 500+images for $250.00 (Girls with toys)
CD #4 - 626 images for $350.00 (NEW ALL HARDCORE TEEN CD)
No one else has nasty stuff like this for this price folks!! All images
are thumbnailed with HTML pages and come with the raw 1200x800 150dpi images.
APIC/WebPosse receive a 20% discount.
10% discount if you purchase all four.
++PEACE & LOVE++
http://www.scarlett.net
http://www.scarlett.net
http://www.scarlett.net
From 36997526 at giselp.com Wed May 20 01:29:10 1998
From: 36997526 at giselp.com (36997526 at giselp.com)
Date: Wed, 20 May 1998 01:29:10 -0700 (PDT)
Subject: Secrets To Losing Weight Right Now and Keeping It Off Forever!
Message-ID: <>
Are You Serious About Losing Weight Right Now?
If you are, please continue.
If not, we apologize for the intrusion.
You can slim down right now using Five Simple Techniques taught by experts around the world.
It's been tested and guaranteed effective 98.2% to work with just about anyone. It doesn't matter who you are or if you have dieted and failed before. This program is 100% guaranteed. It's safe for anyone, and any age.
Imagine, getting down to that perfect dress size, or fitting into those jeans that just don't want to go on anymore.
You can lose those unwanted pounds right now without the use of:
Expensive Diet Pills
Awful Tasting Diet Shakes
or, just plain starving yourself.
And best of all, It's perfectly safe!
Summer is almost here. So say goodbye to YoYo Diets forever.
It's time to start a new You!
For Free Information on shaving those unwanted pounds safely, email us at:
weightloss at giselp.com
We guarantee you'll have a new attitude!
Please pardon our intrusion. To be removed, Click reply and type "Remove" in Subject box and you will be permanently removed from any future mailings.
From 36997526 at giselp.com Wed May 20 01:29:10 1998
From: 36997526 at giselp.com (36997526 at giselp.com)
Date: Wed, 20 May 1998 01:29:10 -0700 (PDT)
Subject: Secrets To Losing Weight Right Now and Keeping It Off Forever!
Message-ID: <>
Are You Serious About Losing Weight Right Now?
If you are, please continue.
If not, we apologize for the intrusion.
You can slim down right now using Five Simple Techniques taught by experts around the world.
It's been tested and guaranteed effective 98.2% to work with just about anyone. It doesn't matter who you are or if you have dieted and failed before. This program is 100% guaranteed. It's safe for anyone, and any age.
Imagine, getting down to that perfect dress size, or fitting into those jeans that just don't want to go on anymore.
You can lose those unwanted pounds right now without the use of:
Expensive Diet Pills
Awful Tasting Diet Shakes
or, just plain starving yourself.
And best of all, It's perfectly safe!
Summer is almost here. So say goodbye to YoYo Diets forever.
It's time to start a new You!
For Free Information on shaving those unwanted pounds safely, email us at:
weightloss at giselp.com
We guarantee you'll have a new attitude!
Please pardon our intrusion. To be removed, Click reply and type "Remove" in Subject box and you will be permanently removed from any future mailings.
From out at sex-e-world.com Wed May 20 01:46:01 1998
From: out at sex-e-world.com (out at sex-e-world.com)
Date: Wed, 20 May 1998 01:46:01 -0700 (PDT)
Subject: Adults Only
Message-ID: <199805200859.BAA15075@ns1.1connect.com>
This message is intended for those over the age of 18. If you are under the age of 18
click your delete key now!
Click into gigabytes of pure hardcore.- Secure Instant Online Access
http://www.sex-e-world.com/
Free 3 day trial membership
From nuw at mail.usa.com Wed May 20 10:22:55 1998
From: nuw at mail.usa.com (nuw at mail.usa.com)
Date: Wed, 20 May 1998 10:22:55 -0700 (PDT)
Subject: The market is wide open
Message-ID: <199805201719.NAA07700@pop01.globecomm.net>
||||||
(o o)
oOOo-(_)-oOOo
___|___|___|___|___|
___|___|___|___|___|
Just popping over to say...
Online Marketers Visit Us On The World-Wide-Web
http://www.fontaineonline.com/sawtell
Bulk Email Software
Bulk Friendly Web Hosting
Bulk Friendly Email Accounts (incoming & outgoing)
Bulk Friendly ISP
Email Address Databases !!
Bulk Email Delivery Service
http://www.fontaineonline.com/sawtell
Our Site is best viewed with
Netscape 3.0
> WHERE AM I?
> ------------------------------------
>A helicopter was flying around above Seattle yesterday when
>an electrical malfunction disabled all of the aircraft's electronic
>navigation and communication equipment. Due to the clouds and haze
>the pilot could not determine his position or course to steer to
>the airport. The pilot saw a tall building, flew toward it, circled,
>drew a handwritten sign and held it in the helicopter's window. T
>he sign said "WHERE AM I ?" in large letters.
>
>People in the tall building quickly responded to the aircraft,
>drew a large sign and held it in a building window. Their sign said,
>"YOU ARE IN A HELICOPTER.' The pilot smiled, waved, looked at his
>map and determine the course to steer to SEATAC
>(Seattle/Tacoma) airport and landed safely.
>
>After they were on the ground, the co-pilot asked the pilot how
>the "YOU ARE IN A HELICOPTER" sign helped determine their
>position. The pilot responded, "I knew that had to be the
>MICROSOFT building because they gave me a technically correct
>but completely useless answer."
Jean-Francois Avon, Pierrefonds(Montreal) QC Canada
JFA Technologies, R&D physicists & engineers
Instrumentation & control, LabView programming.
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From 6YqDi2e7N at alwret.com Thu May 21 01:32:16 1998
From: 6YqDi2e7N at alwret.com (6YqDi2e7N at alwret.com)
Date: Thu, 21 May 1998 01:32:16 -0700 (PDT)
Subject: LOSE FAT/BUILD MUSCLE: USE CREATINE
Message-ID:
____________________________________________________________________________
THIS IS A ONE TIME MAILER!
____________________________________________________________________________
In appreciation for accepting this e-mail, we would like to invite you to
take the next step in enhancing your health, physique, and strength:
**Retail Outlets, Wholesalers, Distributors, Coaches, Trainers, Fire/Police Departments Welcome
(Please scroll to bottom of page for more info.)**
UNBEATABLE PROMOTION!
THE NEWS IS OUT.......
**CREATINE MONOHYDRATE: **
IS A METABOLITE THAT FUNCTIONS AS A PRECURSOR TO CREATINE PHOSPHATE. ONCE
CONVERTED TO CREATINE PHOSPHATE IT PROVIDES A HIGH ENERGY PHOSPHATE
MOLECULE FOR ATP PRODUCTION. ATP (ADENOSINE TRI PHOSPHATE) IS THE CHEMICAL
IN OUR BODIES THAT FUELS ALL MUSCULAR CONTRACTIONS. WITH HIGHER AMOUNTS OF
ATP AVAILABLE, YOU WILL PUSH HEAVIER WEIGHTS, EXERCISE HARDER WITHOUT
FATIGUE, AND RIP THROUGHOUT YOUR WORKOUTS! CREATINE'S ROLE, COUPLED WITH
TRAINING INFLUENCES MUSCULAR CONTRACTION, CELL HYDRATION, STRENGTH,
ENDURANCE AND ULTIMATELY, LONG TERM MUSCULAR GROWTH. AS LITTLE AS 5-10
GRAMS TAKEN PRIOR TO WORKING OUT WILL INTENSIFY YOUR TRAINING SESSIONS LIKE
NOTHING THAT'S AVAILABLE ON THE MARKET TODAY.
"BUYER BEWARE"
UNFORTUNATELY THERE ARE MANY UNSCRUPULOUS SUPPLEMENT COMPANIES OFFERING
CREATINE THAT HAS BEEN CUT IN HALF BY ADDING MALTODEXTRINE (A COMPLEX
CARBOHYDRATE). WE SELL ONLY 100% PURE CREATINE (PHARMACEUTICAL GRADE
AMERICAN MADE/HPLC TESTED).
WE GUARANTEE IT OR YOUR MONEY BACK!
**UP TO 60% BELOW RETAIL PRICES***
COME SEE WHY THOUSANDS SAVE WITH US AND WHY WE ARE THE #1 HEALTH AND
NUTRITION COMPANY ON THE INTERNET........
1100 g. OF PURE CREATINE: $69.99 (COMPARE TO $120: SAVE UP TO 50%)
(2.4 lbs./4 MONTHS SUPPLY) NO LIMIT!
PACKAGE PRICES:
"BIG3"
(IF YOU NEED TO LOSE THE FAT AND GAIN LEAN MUSCLE)
(3 MOS. SUPPLY/CREATINE-CLA-CARNITINE SUGGESTED PRICE: $220)
ON SALE: $139.99 YOU SAVE $80!
**Order now to receive an additional $40 in free gifts**
"MUSCLE MAXX"
(IF YOU ARE LEAN BUT NEED TO ADD MORE MUSCLE)
(3 MOS. SUPPLY/CREATINE-GLUTAMINE-TAURINE SUGGESTED PRICE: $200
ON SALE: $129.99 You SAVE $70!
**Order now to receive an additional $40 in free gifts**
TOLL FREE IN THE USA: 1- (800) 933-5043
CALL: 1-(714) 770-0750 (FOR NATIONAL & INTERNATIONAL CALLERS)
OR
http://206.67.54.156
CLICK HERE TO VISIT THE #1 HEALTH/FITNESS SECURE WEB-PAGE AND GET MORE
DETAILS ON OVER 50 OTHER PRODUCTS+200 MORE EXPECTED BY SUMMER OF 98'
(0RDER ONLINE 24HRS/7DAYS A WEEK)!
ATTN: RETAIL STORE OWNERS/ NATIONAL & INTERNATIONAL DISTRIBUTORS ONLY:
CARRY OUR PRODUCTS AND WE WILL ADVERTISE YOUR STORE/STORES FOR "FREE" ($400
VALUE PER MONTH/ PER STORE) ON OUR WEB-SITE UNDER "RETAIL STORES NEAR YOU".
PLEASE VISIT OUR WEB-SITE FOR MORE INFORMATION. NOW WHAT SUPPLEMENT
COMPANY GIVES YOU THAT KIND OF PRODUCT SUPPORT AND MARKETING???? DON'T LET
THIS OPPORTUNITY PASS YOU BY....CALL (714) 583-1975 TO GET YOUR STORE
WHOLESALE PRICES AND VOLUME DISCOUNTS!
From josh434 at juno.com Thu May 21 11:01:44 1998
From: josh434 at juno.com (josh d smith)
Date: Thu, 21 May 1998 11:01:44 -0700 (PDT)
Subject: programing
Message-ID: <19980522.120339.3414.0.josh434@juno.com>
hello i am new to this list
i would like to know what programing language everyone prefers
and any books they recommend on that subject
thanx
josh
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From darl0006 at tc.umn.edu Thu May 21 11:22:21 1998
From: darl0006 at tc.umn.edu (Matthew T Darling)
Date: Thu, 21 May 1998 11:22:21 -0700 (PDT)
Subject: programing
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID:
I prefer Ada, Apple's MLX, basic, and Logo. At times i also like to
program in machine language.
;)
From declan at pathfinder.com Thu May 21 11:29:36 1998
From: declan at pathfinder.com (Declan McCullagh)
Date: Thu, 21 May 1998 11:29:36 -0700 (PDT)
Subject: programing
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID:
My favorites are Applesoft BASIC and 6502 assembly. I suggest you go out
an buy an Apple IIe. Just think -- no need to deal with any messy
compiler, and you've got BASIC in ROM! A win-win situation, I say!
Good luck!
-Declan
On Fri, 22 May 1998, josh d smith wrote:
> hello i am new to this list
> i would like to know what programing language everyone prefers
> and any books they recommend on that subject
From StanSqncrs at aol.com Thu May 21 12:08:31 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Thu, 21 May 1998 12:08:31 -0700 (PDT)
Subject: programing
Message-ID:
In a message dated 5/21/98 1:47:56 PM Central Daylight Time,
declan at pathfinder.com writes:
<< My favorites are Applesoft BASIC and 6502 assembly. I suggest you go out
an buy an Apple IIe. Just think -- no need to deal with any messy
compiler, and you've got BASIC in ROM! A win-win situation, I say! >>
Oh Man! If you're gonna suggest 6502, go out and get a Cad... - a C-64 with a
6510!
Seriously. ;-)
Stan Rosenthal
From jya at pipeline.com Thu May 21 12:34:34 1998
From: jya at pipeline.com (John Young)
Date: Thu, 21 May 1998 12:34:34 -0700 (PDT)
Subject: Archives: Blast from the past on GSM...
In-Reply-To: <199805211325.GAA04504@joseph.cs.berkeley.edu>
Message-ID: <199805211934.PAA12995@camel8.mindspring.com>
Robert Hettinga wrote:
>Anyway, much more than Y2K, I can imagine some poor old fart sweating away
>right now, waiting for some intellegent young hacker to come along and
>evicerate his whole installed code base, just because he decided the "rest
>of us" were too stupid to figure out how smart he was.
Are you imagining "limited traceability" being discovered to be not what
it claims to be?
It was humorous that several of Chaum's equations were printed upside
down and/or mirror-imaged, yet got through the 4-year review process
just fine. He must have chuckled at that.
And that several "embodiments of the present invention" just flat out
said "if you trust this digital transaction you are one dumb MF who
deserves to be monitored," thereby assuring the user of his invention
that a target is just as dumb.
It's impressive that Chaum intends to fleece the law-abiding and the
outlaws by getting them chasing their tails thinking they're secretly
tracing/escaping the opposition while he laughs all the way to the . . .
Y2K is the tip of this techno-shamanry-duplicity, wild humor with a
straight-bankers-face, umm, like guess who -- our best Chaumian style
comedian.
From sextracash at pleasureclub.com Thu May 21 13:54:46 1998
From: sextracash at pleasureclub.com (Sextra Cash)
Date: Thu, 21 May 1998 13:54:46 -0700 (PDT)
Subject: Does your site offer free content?
Message-ID:
Hello Adult Webmaster,
It's one thing to get a surfer to visit your site once. But that's not
where the money is. You have to find a way to get your visitors to come
back again and again. Build a clientelle.
We have found that the sites that offer "of the day" pics are the most
successful in building a loyal following. Changing pictures everyday,
though, can be tedious and expensive. So, to help you build your site,
we are offering FREE CONTENT!
SextraCash has just introduced a new way to bring surfers back to your
site EVERYDAY.
Introducing the DAILY SEXPACK.
Everyday, a new free pic will be posted to six different categories.
All six pics are updated daily. Your surfers will come back everyday
to see the new "of the day" pics. Best of all, it's TOTALLY FREE TO YOU.
It is not often that you will receive an offer that is truly a win/win
proposition. Most free content providers have a hidden agenda.
Either they want to keep all of the money generated by the banners,
or make you post something about them in a prime location on your site.
That is not what I am offering. You get to keep all of the banner money,
and I don't require a reciprocal link of any kind. Check it out.
http://www.pleasureclub.com/sextracash/sexpack.html
From josh434 at juno.com Thu May 21 14:23:51 1998
From: josh434 at juno.com (josh d smith)
Date: Thu, 21 May 1998 14:23:51 -0700 (PDT)
Subject: programming
Message-ID: <19980522.152606.3382.5.josh434@juno.com>
i was thinking along the lines of pascal or c
i don't want to use apple or any form of it and besides i have a ibm
compatible
which do you think is better
thanx for all your responses
they've helped somewhat
what is wrong with pascal or c please enclose all things that i should
take in to consideration
much appreciative
josh
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From hedges at infonex.com Thu May 21 15:20:50 1998
From: hedges at infonex.com (Mark Hedges)
Date: Thu, 21 May 1998 15:20:50 -0700 (PDT)
Subject: programing
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID:
PERL is horrendously less efficient, but easy to code for grunt work like
data processing and administrative scripts. PERL is THE BOMB for CGI web
programming, and combined with a nice free database with like mySQL, you
can produce some really amazing applications. I'd guess quite a few on the
list use PERL... I do, almost exclusively, but I'm making services and
doing sysadmin and not producing platform-specific applications. Then, C is
the most likely language used. Probably lots of people have their own
favorite languages. The O'Reilly and Associates 'Nutshell' books are widely
accepted as good reference manuals and tutorials in many lanugages. Certain
languages work better for certain applications. Check a technical bookstore.
Mark Hedges
Infonex/Anonymizer
>At 12:03 PM 5/22/98 -0600, you wrote:
>>
>>hello i am new to this list
>>i would like to know what programing language everyone prefers
>>and any books they recommend on that subject
>
>Josh, my guess is that about 99% of programmers on this list use C
>whether they like it or not. What they prefer might be quite
>different. ;)
From vcarlos35 at juno.com Thu May 21 15:59:34 1998
From: vcarlos35 at juno.com (Karl Rierson)
Date: Thu, 21 May 1998 15:59:34 -0700 (PDT)
Subject: programming
In-Reply-To: <19980522.152606.3382.5.josh434@juno.com>
Message-ID: <19980521.185808.5791.0.vcarlos35@juno.com>
The problem with C or pascal is that it requires
quite a bit of punctuation such as:
braces {}
parentheses ()
and semicolons ;
Since your keyboard seems to be missing even a
period, programming in C may be a bit difficult...
Sorry. Couldn't resist.
On Fri, 22 May 1998 15:25:42 -0600 josh434 at juno.com (josh d smith)
writes:
>i was thinking along the lines of pascal or c
>i don't want to use apple or any form of it and besides i have a ibm
>compatible
>which do you think is better
>thanx for all your responses
>they've helped somewhat
>what is wrong with pascal or c please enclose all things that i should
>take in to consideration
>much appreciative
> josh
----
Karl Rierson,
PGP: 0x72136D5B/2048-bit RSA/ EBDD 6E87 4C85 6F7F 65EA B30C 00FF 0229
F**cking Juno hasn't heard of decent sized line wraps
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From caj at math.niu.edu Thu May 21 16:01:13 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Thu, 21 May 1998 16:01:13 -0700 (PDT)
Subject: programming
In-Reply-To: <19980522.152606.3382.5.josh434@juno.com>
Message-ID:
On Fri, 22 May 1998, josh d smith wrote:
> i was thinking along the lines of pascal or c
> what is wrong with pascal or c please enclose all things that i should
> take in to consideration
Neither has an ON GOTO command.
I mean, this feature is decades old! Jeez, you'd think they'd
have one by now. At least, we have FORTRAN's arithmetic IF.
How can you write a good text adventure game without an ON GOTO?
Seriously, I think ANSI C would be more universal, and less
anal-retentive than Pascal. Pascal was designed by a Nazi
Fascist who wanted all programmers to sit up straight in
their chairs and keep their office supplies carefully
arranged. Real computer programming isn't office supplies
and sitting up straight. It's slouching, poorly-ventilated
basements, and 20 half-empty cans of Barq's root beer.
So program in C.
Although the examples in Wayner's _Disappearing Cryptography_
are written in pascal and lisp. I guess I recommend learning
as many languages as possible, but prepare to use C more than
any other.
> much appreciative
> josh
-- __ +---------------------------------------------+
,ad8888ba, (88)| Scott Adams, WHERE ARE YOU????????????????? |
d8"' -- `"8b `""'+--------------+--------------+---------------+
d8' "A Neo- | SpidermanTM | SpidermanTM | SpidermanTM, |
88 NEO-Retro- ,adPPYYba, :88 | is no | is no | I want you |
88 Techno- "" `Y8 :88 | Vandal!!! | Killer!!! | to: BLOW ME |
Y8, Fest!" ,adPPPPP88 :88 +--------------+--------------+---------------+
Y8a. -- .a8P 88, ,88 :88 | Nothing special happens. |
`"Y8888Y"' `"8bbdP"Y8 :88 +---------------------------------------------+
;88 | Draw a straight line that passes through |
o=|caj at math.niu.edu|=888888P; | every box in this .sig, and win $100.00! |
http://www.math.niu.edu/~caj/ +---------------------------------------------+
From nobody at REPLAY.COM Thu May 21 17:37:45 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 21 May 1998 17:37:45 -0700 (PDT)
Subject: Off topic.
Message-ID: <199805220037.CAA26634@basement.replay.com>
Call 1-800-343-3222 to stop the U. S. government from leeching off of the tobacco companies.
From josh434 at juno.com Thu May 21 19:31:10 1998
From: josh434 at juno.com (josh d smith)
Date: Thu, 21 May 1998 19:31:10 -0700 (PDT)
Subject: programing
Message-ID: <19980522.203316.3382.0.josh434@juno.com>
hello it is i josh once again
i finally bought a book for visual basic
does anyone know where i can get a complier for version 5
the book is by waite group press
by e zone it's web based though and i don't have the internet but i think
it will be fine reading it out of the book what do you think
thanx josh
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From rsriram at krdl.org.sg Thu May 21 19:46:37 1998
From: rsriram at krdl.org.sg (R Sriram)
Date: Thu, 21 May 1998 19:46:37 -0700 (PDT)
Subject: programing
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID: <19980522104014.12855@krdl.org.sg>
On Fri, May 22, 1998 at 12:03:37PM -0600, josh d smith wrote:
| hello i am new to this list
| i would like to know what programing language everyone prefers
| and any books they recommend on that subject
| thanx
| josh
My favourites are 6510 assembly (C=64), 6502 assembly (BBC Micro), Z80
assembly (Speccy - you need assembler software), and 8086 assembly.
From x1 at acwref.org.sg Thu May 21 22:17:01 1998
From: x1 at acwref.org.sg (X1)
Date: Thu, 21 May 1998 22:17:01 -0700 (PDT)
Subject: programing
Message-ID: <19980522125520.26251@krdl.org.sg>
On Fri, May 22, 1998 at 08:33:11PM -0600, josh d smith wrote:
| hello it is i josh once again
| i finally bought a book for visual basic
| does anyone know where i can get a complier for version 5
| the book is by waite group press
| by e zone it's web based though and i don't have the internet but i think
| it will be fine reading it out of the book what do you think
| thanx josh
This doesn't appear to have anything even closely related to the
purpose of the cypherpunks list. You should look at newsgroups like
comp.lang.basic.visual and look at other mailing lists.
From josh434 at juno.com Thu May 21 23:09:25 1998
From: josh434 at juno.com (josh d smith)
Date: Thu, 21 May 1998 23:09:25 -0700 (PDT)
Subject: programing
Message-ID: <19980523.001120.9374.0.josh434@juno.com>
sorry if i offended you x1 but everyone else seemed like they were
willing to talk on the subject and nothing else was being said and i
needed some advise and you all are suposed to be inteligent which some of
you have proved thanx everyone for your input so on the subject of
cyptogrify (sorry about the spelling) what program do you request using?
and where can i get it
thanx
josh
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From icollins at scotland.net Fri May 22 02:49:28 1998
From: icollins at scotland.net (Iain Collins)
Date: Fri, 22 May 1998 02:49:28 -0700 (PDT)
Subject: programing
Message-ID: <01BD856F.1E4A6CE0.icollins@scotland.net>
On Saturday, May 23, 1998 3:33 AM, josh d smith [SMTP:josh434 at juno.com] wrote:
> hello it is i josh once again
> i finally bought a book for visual basic
> does anyone know where i can get a complier for version 5
> the book is by waite group press
> by e zone it's web based though and i don't have the internet but i think
> it will be fine reading it out of the book what do you think
> thanx josh
You don't have the internet? You didn't get it with your CD? - I heard you can get it
on 3 x 1.44 MB disks from KwikMart (only $1.99).
Now, I'm not too sure how all this 'internet' stuff works (all rather complicated), but
don't you need one to send an e-mail? Boy have I been burned... ;)
Iain, icollins at sol.co.uk
PS: If you would like serious answer then feel free to send me a serious question
and I'd be happy to help you out (I'd say the questions are off topic from this list :).
From Markus.Kuhn at cl.cam.ac.uk Fri May 22 03:33:34 1998
From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn)
Date: Fri, 22 May 1998 03:33:34 -0700 (PDT)
Subject: programing (Ada95)
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID:
josh d smith wrote on 1998-05-22 18:03 UTC:
> i would like to know what programing language everyone prefers
> and any books they recommend on that subject
Depends on what I write:
C for efficient quickly developed unsecure hacks
Perl for less efficient more quickly developed hacks
Ada95 for efficient large scale security critical applications,
especially anything where multi-threading is a big issue
C and Perl are widely known, so I'll only speak about the third one:
Ada95 is actually a very nice language, and I wonder why it is still mostly
used by avionics engineers and the NSA and not so much in the commercial
world. Ada95 is object oriented, has exceptions, multithreading, object
synchronization, generics, decent type concepts, safe arrays and pointers,
etc. There is now a high-quality GNU Ada95 compiler available (GNAT, uses
the same backend and optimizer as gcc). I've put together some beginner's
information about Ada95 on
http://www.cl.cam.ac.uk/~mgk25/ada.html
where you find information about books, free compilers and online tutorials.
Java is also a quite nice language. Essentially rather close in functionality
to Ada95, but more targeted towards mobile code applications, while Ada95
is more targeted towards high-performance and embedded security applications
(has better support for low-level programming than Java). Pascal and
Basic are mostly obsolete today (no classes, exceptions, tasks, etc.).
Markus
--
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org, home page:
From steve at tightrope.demon.co.uk Fri May 22 03:38:48 1998
From: steve at tightrope.demon.co.uk (Steve Mynott)
Date: Fri, 22 May 1998 03:38:48 -0700 (PDT)
Subject: programing
In-Reply-To: <19980523.001120.9374.0.josh434@juno.com>
Message-ID: <19980522113435.55078@tightrope.demon.co.uk>
I would recommend PERL as a powerful, compact language, which has many
crypto modules available.
--
pub 1024/D9C69DF9 1997/10/14 Steve Mynott
"Documentation? The code is the documentation!"
From x1 at aardvark.org.sg Fri May 22 04:08:31 1998
From: x1 at aardvark.org.sg (X1)
Date: Fri, 22 May 1998 04:08:31 -0700 (PDT)
Subject: Crypto programs.
Message-ID: <19980522190349.54147@krdl.org.sg>
On Sat, May 23, 1998 at 12:11:17AM -0600, josh d smith wrote:
| sorry if i offended you x1 but everyone else seemed like they were
| willing to talk on the subject and nothing else was being said and i
| needed some advise and you all are suposed to be inteligent which some of
| you have proved thanx everyone for your input so on the subject of
| cyptogrify (sorry about the spelling) what program do you request using?
| and where can i get it
Some of the best crypto programs:
PGP available at http://www.pgpi.com/
If you're in the US, look at http://www.pgp.com/
If you run Linux, you could look at CFS (Cryptographic File System)
Look at http://www.cs.hut.fi/crypto for lots of info about crypto,
links, algorithms, software, etc.
From ichudov at algebra.com Fri May 22 05:04:13 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Fri, 22 May 1998 05:04:13 -0700 (PDT)
Subject: vznuri is Vulis
In-Reply-To: <199805220508.BAA09714@panix2.panix.com>
Message-ID: <199805221202.HAA13035@manifold.algebra.com>
Information Security wrote:
> > From ichudov at Algebra.Com Thu May 21 23:09:59 1998
> > Information Security wrote:
> > > > From: "Vladimir Z. Nuri"
> > > > as for Timmy, you're better off ignoring him. he doesn't realize that
> > > > people take him far less seriously than he would hope.
> > >
> > > Heh-heh-heh.
> > > Vulis's alternate personality is pathetic at flaming.
> >
> > 1) He is not Vulis's alternate personality
>
> He says in email he wants to convince me otherwise,
> but then failed to follow through with anything
> to document a real "Vladimir Z. Nuri".
Look, why don't you read two year old archives to figure things out.
> > 2) You are also pathetic
> And you are Igor.
> ---guy, Vulis Terminator
> KABLAMMO! dm.com was gone...Vulis never to post in his own name again
- Igor.
From lordgrey at borrowedtime.com Fri May 22 05:10:16 1998
From: lordgrey at borrowedtime.com (Dan S. Camper)
Date: Fri, 22 May 1998 05:10:16 -0700 (PDT)
Subject: programing
Message-ID: <199805221209.HAA22593@goanna.outer.net>
>sorry if i offended you x1 but everyone else seemed like they were
>willing to talk on the subject and nothing else was being said and i
>needed some advise and you all are suposed to be inteligent which some of
>you have proved thanx everyone for your input so on the subject of
>cyptogrify (sorry about the spelling) what program do you request using?
>and where can i get it
COBOL would let you practice putting periods at the end of statements.
Learn two things at once!
More seriously, code written in C, C++ and Perl is in demand. There's a
better chance that more people can maintain or update your code than if
it was written in a less mainstream language, and customers tend to
appreciate that. Out of those three, Perl is probably the best
introductory language.
DSC
From howree at cable.navy.mil Fri May 22 05:27:17 1998
From: howree at cable.navy.mil (Reeza!)
Date: Fri, 22 May 1998 05:27:17 -0700 (PDT)
Subject: Off topic.
In-Reply-To: <199805220037.CAA26634@basement.replay.com>
Message-ID: <3.0.5.32.19980522222705.008005d0@205.83.192.13>
At 02:37 AM 22 05 98 +0200, Anonymous wrote:
>Call 1-800-343-3222 to stop the U. S. government from leeching off of the
tobacco companies.
>
>
Is there a 1-800 number to stop both the government and the tobacco
companies from leeching off of the general populace?
From gypsywanderer at hotmail.com Fri May 22 06:13:32 1998
From: gypsywanderer at hotmail.com (Gypsy Wanderer)
Date: Fri, 22 May 1998 06:13:32 -0700 (PDT)
Subject: Unix O/S
Message-ID: <19980522131258.29926.qmail@hotmail.com>
Hi
I'm new to posting on this list (I've been checking it out for a while,
really interesting stuff).
I'm a computer science student and therefore a newbie, but am interested
in cryptography.
I will be taking a UNIX course next year and plan to set up a UNIX drive
on my PC.
I'm interested in getting some advice on which UNIX O/S would be good to
set up. I'm currently aware of FreeBSD, OpenBSD, SCO UNIX, and LINUX.
Suggestions and the reasons why would be greatly appreciated.
Thanks, Gypsy
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
From nobody at REPLAY.COM Fri May 22 06:55:35 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 May 1998 06:55:35 -0700 (PDT)
Subject: Off topic.
Message-ID: <199805221355.PAA03760@basement.replay.com>
On Fri, 22 May 1998, Reeza! wrote:
> At 02:37 AM 22 05 98 +0200, Anonymous wrote:
> >Call 1-800-343-3222 to stop the U. S. government from leeching off of the
> tobacco companies.
> >
> >
>
> Is there a 1-800 number to stop both the government and the tobacco
> companies from leeching off of the general populace?
>
How do the tobacco companies leech off of the general populace? By selling
them something they want? I just don't want to pay five dollars for a pack
of cigarettes which is why I'm spamming this number.
From nobody at REPLAY.COM Fri May 22 07:29:10 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 May 1998 07:29:10 -0700 (PDT)
Subject: .Re: programing
Message-ID: <199805221429.QAA08672@basement.replay.com>
josh d smith wrote:
>
> hello it is i josh once again
> i finally bought a book for visual basic
> does anyone know where i can get a complier for version 5
> the book is by waite group press
> by e zone it's web based though and i don't have the internet but i think
> it will be fine reading it out of the book what do you think
> thanx josh
>
Josh,
Visual Basic is object oriented and uses late binding, like Smalltalk.
I advise you learn Smalltalk before trying to understand Visual Basic.
Also, version 5 is too advanced for a beginner. Start at version one and
only upgrade for new features as you need them.
From nobody at REPLAY.COM Fri May 22 08:07:11 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 May 1998 08:07:11 -0700 (PDT)
Subject: .Re: Unix O/S
Message-ID: <199805221507.RAA14858@basement.replay.com>
Gypsy Wanderer wrote:
>
> Hi
> I'm new to posting on this list (I've been checking it out for a while,
> really interesting stuff).
>
> I'm a computer science student and therefore a newbie, but am interested
> in cryptography.
>
> I will be taking a UNIX course next year and plan to set up a UNIX drive
> on my PC.
>
> I'm interested in getting some advice on which UNIX O/S would be good to
> set up. I'm currently aware of FreeBSD, OpenBSD, SCO UNIX, and LINUX.
> Suggestions and the reasons why would be greatly appreciated.
>
> Thanks, Gypsy
>
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com
I'm starting a petition for less wasted bandwidth in cypherpunks.
To show your support, just respond to this thread.
From paulmerrill at acm.org Fri May 22 08:29:37 1998
From: paulmerrill at acm.org (Paul H. Merrill)
Date: Fri, 22 May 1998 08:29:37 -0700 (PDT)
Subject: .
In-Reply-To: <199805221429.QAA08672@basement.replay.com>
Message-ID: <3565C458.CB00696D@acm.org>
VB isn't really all that bad, and it is a useful skill while Smalltalk is of
limited value. As far as the version goes, VB5 is currently available and its
product will work directly with WIN32. A more advisable phasing methodology
would be to only USE a small subset at first, adding other functionality to the
pot in use as time (and familiarity, and experience, etc.) progress.
PHM
Anonymous wrote:
> josh d smith wrote:
> >
> > hello it is i josh once again
> > i finally bought a book for visual basic
> > does anyone know where i can get a complier for version 5
> > the book is by waite group press
> > by e zone it's web based though and i don't have the internet but i think
> > it will be fine reading it out of the book what do you think
> > thanx josh
> >
>
> Josh,
> Visual Basic is object oriented and uses late binding, like Smalltalk.
> I advise you learn Smalltalk before trying to understand Visual Basic.
>
> Also, version 5 is too advanced for a beginner. Start at version one and
> only upgrade for new features as you need them.
From StanSqncrs at aol.com Fri May 22 11:24:43 1998
From: StanSqncrs at aol.com (StanSqncrs)
Date: Fri, 22 May 1998 11:24:43 -0700 (PDT)
Subject: Unix O/S
Message-ID: <684212d9.3565c2af@aol.com>
In a message dated 5/22/98 10:29:27 AM Central Daylight Time,
nobody at REPLAY.COM writes:
<< I'm starting a petition for less wasted bandwidth in cypherpunks. >>
You would.
<< To show your support, just respond to this thread. >>
Oh, so there's no way we can show if we don't support your idea. You create
what we call an un-level playing field.
BUT, in this case, I think there's a simple way that you can have it so
there's less wasted bandwidth here. Ban anonomous posting. ;-)
Stan
From jya at pipeline.com Fri May 22 16:24:14 1998
From: jya at pipeline.com (John Young)
Date: Fri, 22 May 1998 16:24:14 -0700 (PDT)
Subject: Clinton Backs Cyber-Terror Warnings
Message-ID: <199805222324.TAA01375@dewdrop2.mindspring.com>
May 22, 1998
Clinton Backs Cyber-Terror Warnings
Filed at 1:31 p.m. EDT
By The Associated Press
ANNAPOLIS, Md. (AP) -- Nuclear warheads were the stuff of Cold War
stockpiles and beachheads the battlefields of times gone by. To counter
today's threats, President Clinton told a new class of Naval officers, the
United States must amass germ-warfare vaccines and battle terrorists in
cyberspace.
``If our children are to grow up safe and free, we must approach these new
21st century threats with the same rigor and determination we applied to the
toughest security challenges of this century,'' the president said today in
a commencement speech at the U.S. Naval Academy.
For the 769 graduating midshipmen and 139 midshipwomen whose dress uniforms
shone blindingly white in the sun, Clinton painted a near-apocalyptic
picture of the enemies who threatened their mission beyond the academy.
``As we approach the 21st century, our foes have extended the fields of
battle from physical space to cyberspace, from the world's vast bodies of
water to the complex workings of our own human body. Rather than invading
our beaches or launching bombers, these adversaries may attempt cyber
attacks against our critical military systems and our economic base,''
Clinton said.
Clinton also called for an interconnected ``cyber-system'' that would warn
and minimize damage of attacks on computers that control the stock market,
banking, utilities, air traffic and other so-called ``critical
infrastructure.''
Private companies including IBM, Dell Computers, Bell South and GTE have
already agreed to participate in the ``cyber-system,'' which Clinton wants
to be fully operational by 2003, administration officials said.
``If we fail to take strong action, then terrorists, criminals and hostile
regimes could invade and paralyze these vital systems, disrupting commerce,
threatening health, weakening our capacity to function in a crisis,''
Clinton said.
He appointed National Security Council adviser Richard Clarke, who
specializes in such issues as drug trafficking and terrorism, to head a new
office on infrastructure protection and counter-terrorism. Former Sen. Sam
Nunn and Jamie Gorelick, formerly the Justice Department's No. 2 official
and now Fannie Mae's vice chairwoman, will lead a private industry advisory
group.
[Warnings of bio-terrorism snipped]
From jya at pipeline.com Fri May 22 17:28:49 1998
From: jya at pipeline.com (John Young)
Date: Fri, 22 May 1998 17:28:49 -0700 (PDT)
Subject: Clinton's Anti-Terrorism Initiative
Message-ID: <199805230028.UAA03044@dewdrop2.mindspring.com>
We've collected news and White House reports on
Clinton's broad anti-terrorism initiative announced today,
including description of two related Presidential Directives:
http://jya.com/prez-init.htm (50K)
From jya at pipeline.com Fri May 22 17:44:37 1998
From: jya at pipeline.com (John Young)
Date: Fri, 22 May 1998 17:44:37 -0700 (PDT)
Subject: NSA Sets Terms for Secret Court Review
Message-ID: <199805230044.UAA16392@dewdrop2.mindspring.com>
The US Attorney in the Payne v. NSA lawsuit has described
the procedure NSA requires for the case judge to assess NSA's
"Glomar response" with a Top Secret-SCI-CODEWORD declaration
concerning Crypto AG, NSA backdoor spying on cryptosystems,
and other underhanded interceptions:
http://jya.com/usa052098.htm
From assass1n at division-x.org Fri May 22 18:25:44 1998
From: assass1n at division-x.org (Assass1n)
Date: Fri, 22 May 1998 18:25:44 -0700 (PDT)
Subject: Need a Decent nntp server
Message-ID: <3.0.5.32.19980521234128.007a9250@mail.division-x.org>
This might be a little off subject since I am new to this mailing list but
I am in need of a good nntp server because the one my ISP runs is always
down if anyone has a list or just one or two good servers that alow sending
and receving please let me know
Assass1n
assass1n at division-x.org
From jya at pipeline.com Fri May 22 19:14:54 1998
From: jya at pipeline.com (John Young)
Date: Fri, 22 May 1998 19:14:54 -0700 (PDT)
Subject: PDD 63
Message-ID: <199805230204.WAA06865@dewdrop2.mindspring.com>
We've made an HTML version of Presidential Decision
Directive 63 which details Clinton's anti-terrorism orders
to federal agencies today:
http://jya.com/pdd63.htm (39K)
From arpe at worldregister.com Sat May 23 05:24:52 1998
From: arpe at worldregister.com (WorldRegister)
Date: Sat, 23 May 1998 05:24:52 -0700 (PDT)
Subject: World-wide security network for vehicles / objects
Message-ID:
Important e-mail for your company, all of your employees, and customers
Dear Sir/Madam
Please, also click on http://www.worldregister.com
You will see how easily, cost-efficiently, and effectively you can
protect your valuable property� (vehicles and objects) better against theft
and misappropriation. You will also see how you can reduce your risk of unintentionally purchasing stolen goods � and with that prevent from slipping under the "wheels of justice." Immediate success is guaranteed.
We notify all press organs, insurance companies, leasing banks, and
merchants who are accessible worldwide via the Internet and by e-mail about
our new vigilance medium.� You can start profiting today!
Short documentation
http://www.worldregister.com/english/kurzprospekt.htm
Good reasons for joining
http://www.worldregister.com/english/stichworte/motivation.htm
Mask pattern of one free property query
http://www.worldregister.com/english/info/privat_11_2.htm
Mask pattern of a fee-based property listing
http://www.worldregister.com/english/info/privat_4_2.htm
Fraud prevention for insurance companies.�General.
http://www.worldregister.com/english/info/versi_7.htm
Uncovering of fake theft
http://www.worldregister.com/english/info/versi_5.htm
Warding off of claims reported multiple times
http://www.worldregister.com/english/info/versi_8.htm
----------------------------------------------------------------
Your e-mail address is published on the Internet.� We believe that this
innovation interests you for professional reasons.� In advanced, we would
like to thank you for your time.� If you have any further questions, please
do not hesitate to contact us.
Sincerely,� WorldRegister, Werner Bachman.
Tel: +41 1 313 04 71 Fax: +41 1 313 04 68
----------------------------------------------------------------
From jya at pipeline.com Sat May 23 06:31:45 1998
From: jya at pipeline.com (John Young)
Date: Sat, 23 May 1998 06:31:45 -0700 (PDT)
Subject: E-Commerce Enhancement Act
Message-ID: <199805231331.JAA03260@dewdrop2.mindspring.com>
Excerpt from statement on introduction of S.2107, "Electronic
Commerce Enhancement Act," May 21, 1998 :
The most important benefit of this legislation, however, lies in the
area of electronic innovation. Currently, digital encryption is in a
relatively undeveloped state. One reason for that is the lack of
opportunity for many individuals and companies to make use of the
technology. Another is the lack of a set industry standard. By allowing
use of this technology in the filling out of government paperwork, and
by establishing a standard for digital encryption, the federal
government can open the gates to quick, efficient development of this
technology, as well as its more application throughout the economy. The
benefits to American businesses as they struggle to establish paper-
free workplaces that will lower administrative costs, will be
significant, and will further spur our national economy.
-----
Full statement: http://jya.com/s2107-intro.txt
From jf_avon at citenet.net Sat May 23 07:35:30 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Sat, 23 May 1998 07:35:30 -0700 (PDT)
Subject: E-Commerce Enhancement Act
Message-ID: <199805231443.KAA25446@cti06.citenet.net>
On Sat, 23 May 1998 09:30:01 -0400, John Young wrote:
>Excerpt from statement on introduction of S.2107, "Electronic
>Commerce Enhancement Act," May 21, 1998 :
[snip]
> The
>benefits to American businesses as they struggle to establish paper-
>free workplaces that will lower administrative costs, will be
>significant, and will further spur our national economy.
>Full statement: http://jya.com/s2107-intro.txt
one of my friend replied when I asked just *where* was the promised paperless office:
"as likely as a paperless toilet..."
:-)
Ciao
jfa
Jean-Francois Avon, Pierrefonds(Montreal) QC Canada
JFA Technologies, R&D physicists & engineers
Instrumentation & control, LabView programming.
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From bigboots at apci.net Sat May 23 14:21:26 1998
From: bigboots at apci.net (Kentroy)
Date: Sat, 23 May 1998 14:21:26 -0700 (PDT)
Subject: hello
Message-ID: <35673E3D.9C0B79F3@apci.net>
TO whom ewver this concerns,
I came across your web page about making bumber stickers and was
iteresetes in purchasing some of the paper you talked about on your
page. If you can send me info or what everi need to purchase it you can
contact me at Vyncez at hotmail.com
From billp at nmol.com Sat May 23 18:42:32 1998
From: billp at nmol.com (bill payne)
Date: Sat, 23 May 1998 18:42:32 -0700 (PDT)
Subject: "TOP SECRET (TS), Sensitive Compartmented Information (SCI), CODEWORD"
Message-ID: <356778D1.310F@nmol.com>
Saturday 5/23/98 7:16 PM
J Orlin Grabbe http://www.aci.net/kalliste/
Just saw subject heading. "TOP SECRET (TS), Sensitive Compartmented
Information (SCI), CODEWORD"
But jya.com did not respond.
I will buy a refrigerator magnet at the National Atomic Museum
in Albquerque
1945 509th COMPOSITE GROUP 1995
FIRST ATOMIC BOMBARDMENT
50th ANNIVERSARY
for you and Masanori TOO.
For business reasons perhaps I should buy the whole bowl full.
This is so gross they have to be worth some MONEY, $US, YEN, SF, DM,
Ringitt, etc.
Later
bill
From nl0v at nl0vpg.net Sat May 23 19:52:52 1998
From: nl0v at nl0vpg.net (nl0v at nl0vpg.net)
Date: Sat, 23 May 1998 19:52:52 -0700 (PDT)
Subject: An invitation
Message-ID: <34755181_76443379>
This is a one time mailing and is never sent unsolicited. Your email address was included in an "Opt-In" target list of those interested
in receiving adult site advertizing.If you have received this message in error please delete it.
Looking for High Quality Video and Pics???
Visit our site - you will not be disappointed!!
http://www.oasis.nu/jenny
From nobody at REPLAY.COM Sun May 24 02:35:14 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 24 May 1998 02:35:14 -0700 (PDT)
Subject: (no subject)Re: Unix O/S
Message-ID: <199805240935.LAA03446@basement.replay.com>
StanSqncrs wrote:
>
> In a message dated 5/22/98 10:29:27 AM Central Daylight Time,
> nobody at REPLAY.COM writes:
>
> << I'm starting a petition for less wasted bandwidth in cypherpunks. >>
>
> You would.
>
> << To show your support, just respond to this thread. >>
>
> Oh, so there's no way we can show if we don't support your idea. You create
> what we call an un-level playing field.
>
> BUT, in this case, I think there's a simple way that you can have it so
> there's less wasted bandwidth here. Ban anonomous posting. ;-)
>
> Stan
Stan,
this is a petition. Unlike playing fields, petitions usually only
have one side, so your complaint is invalid.
Your new proposal merits inclusion, however. All those in favour of
banning anonymous posting can show their support by
responding to the thread via an anonymous remailer.
From tiikue43 at netcom.com Sun May 24 18:00:59 1998
From: tiikue43 at netcom.com (tiikue43 at netcom.com)
Date: Sun, 24 May 1998 18:00:59 -0700 (PDT)
Subject: The Hidden Secrets of Mortgage Lenders
Message-ID: <19980524427WAA48163@earthlink.net.ur.mx>
(this is a one time mailing only!!)
Dear Homeowner,
Would you like to pay off all your debts, including your mortgage in 5 to 8 years, without increasing your monthly payments? Or are you happy paying 88% of the value of your home in interest during the first ten years? Do you want to continue making the minimum payment on your charge cards, which could take you over 20 years to pay them off? How can we do this? With accelerators.
Accelerators are nothing new, large corporations have been using them for centuries. Accelerators allow you to pay off the principal of your debts, therefore limiting the amount of interest that you owe. The result can be a substantial reduction in the length of time an individual pays on his or her mortgage and consumer debts, and a dramatic reduction in the amount of total payments.
With accelerators you can eliminate your mortgage and debt in 5 to 8 years then take the same money you were using to pay off your debts and build true wealth during the time it would have taken you to pay off your mortgage originally. You don't need to be a wall street wizard to make this work. Let Equity 1st teach you how to avoid the pitfalls that cause most people to fail financially.
In our program, you will know how and when you will be out of debt, as well as when you will be financially independent and able to live off the income from your investments.
Most lenders want to keep you in debt as long as possible. The longer you are in debt, the more interest you pay. Equity 1st of Salt Lake City, Utah, has been helping people totally eliminate all their debts, and reach their financial goals, since the 1980's.
Whether you require a first mortgage, second mortgage, debt consolidation, debt restructuring, or mortgage acclerator program, I can help you with all your financing needs. My network of nationwide lenders enables me to find the best interest rates available.. Programs are also available for homeowners with slow credit, little or no equity, or even bankruptcy.
The reality: 96% of all Americans fail to achieve financial independence. Do you want to be in the 4% who do?
To learn more about how you can be debt free, and have all your financing options explained to you, click HERE to request more information, (place debt free, and your first name in the subject). If you prefer to speak with a Financial Consultant for a no obligation consultation, call toll free at 888-283-4899, in North Carolina call 910-777-8117. Consultants are available Monday - Friday from 8:00am until 9:00pm and on Saturday between the hours of 9:00am to 12:00pm eastern standard time. When calling have this ID code SRLM available.
Sincerely,
Denise Whitaker
Financial Consultant and Mortgage Lending Officer
In a message dated 5/24/98 4:58:12 AM Central Daylight Time, nobody at REPLAY.COM
writes:
<< Your new proposal merits inclusion, however. All those in favour of
banning anonymous posting can show their support by
responding to the thread via an anonymous remailer. >>
The joke's not that funny the 2nd time around either!
Stan
From die at pig.die.com Mon May 25 11:22:38 1998
From: die at pig.die.com (Dave Emery)
Date: Mon, 25 May 1998 11:22:38 -0700 (PDT)
Subject: [rttyman@wwa.com: [Spooks] Digital Steganography]
Message-ID: <19980525142146.B3293@die.com>
----- Forwarded message from Bob Margolis -----
Date: Mon, 25 May 1998 12:54:47 -0500
From: Bob Margolis
To: spooks at qth.net
Subject: [Spooks] Digital Steganography
Secret Messages: Army Researchers Discover Advance Technique To Relay
Information
Army researchers bring new meaning to the phrase, 'a picture's worth
a thousand words.'
An advanced technique for hiding secret messages inside of images is
a new discovery made recently by U.S.Army Research Laboratory (ARL)
researchers and a Federated Laboratory partner from the University of
Delaware.
"As a method to provide secure communications on the battlefield, we
are pursuing research in the area of digital steganography," says
Lisa Marvel, an electronics engineer at ARL's Information Science &
Technology Directorate.
The Greek word, steganography, means covered writing.
"Our initial system involves embedding hidden messages within images.
Images that are typically transmitted over the battlefield, such as
weather or terrain maps," she says.
The hidden message, be it an authentication mark, time stamp or new
orders to a commander, is completely undetectable and resistant to
removal and arbitrary decoding. Only the intended recipient holding
the 'key' can decode the hidden message.
Consider for a moment the impact of this new capability. U.S. Forces
are pent behind enemy lines and out numbered three to one. The
commander is not able to communicate their situation to base, because
an enemy listener is detected on the communication network.
The commander orders a message be sent through the Stego
Communication System. In less than 45 seconds a soldier types the
message on a laptop computer, hides the message in a map and sends it
to base undetected. U.S. troops are deployed with enemy forces
unaware of the impending ambush. U.S. soldiers are recovered with no
casualties.
Steganography is part of ARL's defensive information warfare efforts
under the Federated Laboratory Program. The research began in
February 1997 and is projected to continue over the next two years.
"The result of this basic research can be packaged as software that
can run on any laptop, anywhere. The main focus for the next two
years is to increase the amount of undetectable information that we
are able to hide in an image and develop techniques that make
messages even more resilient to any kind of corruption," Marvel says.
Typically, basic research is projected for use five years out. But,
Marvel says this particular work is implementable in a shorter
timeframe. She predicts that when the research is completed in two
years it will just be a matter of software rewrite and packaging,
which will take about 6 months before it can actually become a true
product.
Marvel credits the collaborative work, commissioned by the Federated
Laboratory, for the successful progress of the project. Marvel
developed the initial test system, guided by Dr. Charles Boncelet,
Professor of electrical engineering at the University of Delaware.
"Dr. Boncelet brought in some specific insights and his expertise in
random signals and noise truly contributed to the success of the
work," Marvel says.
Dr. Charles Retter another ARL engineer provided his expertise in low
rate error correcting codes, "which is key to how we are able to
extract the message from the image without having the original
image," she adds.
Digital steganography is a new topic of research that incorporates
ideas from communications, cryptography, information theory, and
signal processing. So far, very little information exists in the
formal literature on this topic, unlike digital watermarking which is
currently a very active area of research.
Although similar, steganography differs from watermarking in several
aspects. For example, digital watermarking is used to embed a visible
or invisible signature into a medium in order to indicate ownership,
such as the station insignia seen in the bottom corner of a
television screen during programming.
Steganography, on the other hand, is used to encode a hidden message
typically much larger than a signature, Marvel explains.
In preparing to file for a patent, the ARL researchers are conducting
the required background research on the prior art.
"We found that a few basic techniques used over the years work pretty
well, but are not nearly as sophisticated or complete. It appears
that our technique is unique," Marvel concludes.
---
Submissions spooks at qth.net
----- End forwarded message -----
--
Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
From corvett52 at yahoo.com Mon May 25 13:08:13 1998
From: corvett52 at yahoo.com (corvett52 at yahoo.com)
Date: Mon, 25 May 1998 13:08:13 -0700 (PDT)
Subject: The Internet Success ToolBox
Message-ID: <>
Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
corvett54 at yahoo.com
You will be removed promptly.
*****************************************************************
"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!
This is what you will receive on CD-ROM:
1. Stealth Mass Mailer ($399.00 value) - This unique, first of
it's kind - software that allows you to easily send 250,000 e-mail
messages an hour. Simply enough by making a single
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.
This, easy to use, software is designed for the basic computer
user to understand. It's as easy as imputing the mail server,
selecting the list of e-mail recipients to send to, inserting your
e-mail address, adding your subject line, selecting your sales
letter, and pressing send.
2. E-Mail Pro Extractor ($350.00 value) - This one of a kind software
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of
e-mail addresses by domain names.
The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum
messages, or data from the member directory. Each of these
files are filled with e-mail addresses.
3. Check Deposit System ($125.00 value) - Check Deposit System
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary.
4. 16 Million E-mail Addresses ($149.00 value) - We took a total of
over 92 million e-mail addresses from many of the touted CD's that
are out there (bought them all - some were $300+)! We added the
millions we had in storage to those. When we combined them all,
we had in excess of 100+ million addresses in one huge file.
We then ran a super "sort/de-dupe" program against this
huge list. It cut the file down to less than 25 million!!
We then ran a program that contained 150+ keywords to
remove addresses with vulgarity, profanity, sex-related
names, postmaster, webmaster, flamer, abuse, spam,
etc...Also we eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!
So, you see, our list will save people hundreds of
dollars buying all others that are out there on CD. Using
ours will be like using the 100+ million that we started with,
but a lot less money and a lot less time!
If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following
awesome bonuses absolutely FREE.
A value of over $600.00 !!!
To order:
____ YES! I'm bursting with anticipation! Please send me "The
Internet Success Toolbox" so I can start advertising my business to
"millions of people" - absolutely FREE! I'm anxious to see how others
are creating immediate "cash-flow explosions", and eliminating most of
their advertising and marketing costs - and how I can do the same!
Enclosed is $395.
____ YES AGAIN! Because I'm responding within 7 days, I will receive
6 BONUSES with a total value of $663.90 - absolutely FREE! They include:
BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!
BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and
internet cash flow heaven!
BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified
Ad Sites on the Internet" - a virtual GOLDMINE!
BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your
Business on Automatic Pilot and Turn Your Marketing System Into a
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even
When You Don't!!"
BONUS #5 ($195 value): Unlimited technical support. Even though
"The Internet Success Toolbox" will be simple to use, it's great to
know support is always available - if and when you really need it!
And last but not least . . . .
BONUS #6 ($175 value): Order within 7 days and I'll also throw in a
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE
lodging at one of over 30 "premier" resorts.
Some vacation spots you can choose from include: Hawaii; Orlando,
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!
Hey, when you start making a TON of money, you'll wanna do some
celebrating, won't you? So start packing those bags!
That's it. A lot more than you bargained for isn't it?
When you total all the goodies up, you're looking as a total value of
$663.90! All yours - absolutely FREE - with your purchase of our amazing
package "The Internet Success Toolbox " for only $395.00.
And I'll even pay for shipping your package. You can have it in days. And
start making money THE VERY SAME DAY!
Anyway, I have a copy right here on my desk reserved for you. All I need
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.
___Yes, Also send me info on obtaining a Merchant Account so that I can take
credit cards for my business.
___I am interested in becoming a re-seller for your company. Please send
re-seller information.
Name _____________________________________________________
Street Address ____________________________________________
City)__________________State_______Zip_____________
Phone # (_____) ___________________________
Fax # (______) _____________________
E-mail Address _________________________
___Visa ___MasterCard
Total:$________
Account Number_____________________
Expiration Date____________________
I understand that all sales are final.
____________________________________
Signature
To order by check:
***********************************************************
Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.
(We are able to perform this service using our
Check Deposit System Software)
************************************************************
* Orders by Credit Card are shipped IMMEDIATELY.
Fax completed order form to: (425) 379-9722
* Orders by personal, business or credit card CHECK are shipped in 7-10
business days.
* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK or MONEY ORDER are
shipped IMMEDIATELY. Mail to:
SYS
11014 19th Ave SE Suite 305
Everett, WA 98208.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From corvett52 at yahoo.com Mon May 25 13:08:13 1998
From: corvett52 at yahoo.com (corvett52 at yahoo.com)
Date: Mon, 25 May 1998 13:08:13 -0700 (PDT)
Subject: The Internet Success ToolBox
Message-ID: <>
Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
corvett54 at yahoo.com
You will be removed promptly.
*****************************************************************
"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!
This is what you will receive on CD-ROM:
1. Stealth Mass Mailer ($399.00 value) - This unique, first of
it's kind - software that allows you to easily send 250,000 e-mail
messages an hour. Simply enough by making a single
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.
This, easy to use, software is designed for the basic computer
user to understand. It's as easy as imputing the mail server,
selecting the list of e-mail recipients to send to, inserting your
e-mail address, adding your subject line, selecting your sales
letter, and pressing send.
2. E-Mail Pro Extractor ($350.00 value) - This one of a kind software
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of
e-mail addresses by domain names.
The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum
messages, or data from the member directory. Each of these
files are filled with e-mail addresses.
3. Check Deposit System ($125.00 value) - Check Deposit System
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary.
4. 16 Million E-mail Addresses ($149.00 value) - We took a total of
over 92 million e-mail addresses from many of the touted CD's that
are out there (bought them all - some were $300+)! We added the
millions we had in storage to those. When we combined them all,
we had in excess of 100+ million addresses in one huge file.
We then ran a super "sort/de-dupe" program against this
huge list. It cut the file down to less than 25 million!!
We then ran a program that contained 150+ keywords to
remove addresses with vulgarity, profanity, sex-related
names, postmaster, webmaster, flamer, abuse, spam,
etc...Also we eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!
So, you see, our list will save people hundreds of
dollars buying all others that are out there on CD. Using
ours will be like using the 100+ million that we started with,
but a lot less money and a lot less time!
If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following
awesome bonuses absolutely FREE.
A value of over $600.00 !!!
To order:
____ YES! I'm bursting with anticipation! Please send me "The
Internet Success Toolbox" so I can start advertising my business to
"millions of people" - absolutely FREE! I'm anxious to see how others
are creating immediate "cash-flow explosions", and eliminating most of
their advertising and marketing costs - and how I can do the same!
Enclosed is $395.
____ YES AGAIN! Because I'm responding within 7 days, I will receive
6 BONUSES with a total value of $663.90 - absolutely FREE! They include:
BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!
BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and
internet cash flow heaven!
BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified
Ad Sites on the Internet" - a virtual GOLDMINE!
BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your
Business on Automatic Pilot and Turn Your Marketing System Into a
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even
When You Don't!!"
BONUS #5 ($195 value): Unlimited technical support. Even though
"The Internet Success Toolbox" will be simple to use, it's great to
know support is always available - if and when you really need it!
And last but not least . . . .
BONUS #6 ($175 value): Order within 7 days and I'll also throw in a
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE
lodging at one of over 30 "premier" resorts.
Some vacation spots you can choose from include: Hawaii; Orlando,
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!
Hey, when you start making a TON of money, you'll wanna do some
celebrating, won't you? So start packing those bags!
That's it. A lot more than you bargained for isn't it?
When you total all the goodies up, you're looking as a total value of
$663.90! All yours - absolutely FREE - with your purchase of our amazing
package "The Internet Success Toolbox " for only $395.00.
And I'll even pay for shipping your package. You can have it in days. And
start making money THE VERY SAME DAY!
Anyway, I have a copy right here on my desk reserved for you. All I need
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.
___Yes, Also send me info on obtaining a Merchant Account so that I can take
credit cards for my business.
___I am interested in becoming a re-seller for your company. Please send
re-seller information.
Name _____________________________________________________
Street Address ____________________________________________
City)__________________State_______Zip_____________
Phone # (_____) ___________________________
Fax # (______) _____________________
E-mail Address _________________________
___Visa ___MasterCard
Total:$________
Account Number_____________________
Expiration Date____________________
I understand that all sales are final.
____________________________________
Signature
To order by check:
***********************************************************
Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.
(We are able to perform this service using our
Check Deposit System Software)
************************************************************
* Orders by Credit Card are shipped IMMEDIATELY.
Fax completed order form to: (425) 379-9722
* Orders by personal, business or credit card CHECK are shipped in 7-10
business days.
* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK or MONEY ORDER are
shipped IMMEDIATELY. Mail to:
SYS
11014 19th Ave SE Suite 305
Everett, WA 98208.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From iofferfun at bigfoot.com Mon May 25 14:13:00 1998
From: iofferfun at bigfoot.com (iofferfun at bigfoot.com)
Date: Mon, 25 May 1998 14:13:00 -0700 (PDT)
Subject: Have a peek
Message-ID: <199805252112.OAA25547@cygint.cygnus.com>
I thought that you would be interested in these sites. There are
some interesting links on them. You should check them out.
Arts sites: http://www.areyou.com/tt/arts.html
Automobile sites: http://www.areyou.com/tt/auto.html
Business Consultants sites: http://www.areyou.com/tt/bizcon.html
Business Opportunities sites: http://www.areyou.com/tt/bizop.html
Business Services sites: http://www.areyou.com/tt/bizserv.html
Computer Services sites: http://www.areyou.com/tt/comserv.html
Computer Software sites: http://www.areyou.com/tt/software.html
Money & Finance sites: http://www.areyou.com/tt/finance.html
Free Computer Products sites:
http://www.areyou.com/tt/freecomputer.html
Gambling sites: http://www.areyou.com/tt/gambling.html
Games sites: http://www.areyou.com/tt/game.html
Health and Fitness sites: http://www.areyou.com/tt/fitness.html
Health Care Products sites: http://www.areyou.com/tt/health.html
Hobby collecting sites: http://www.areyou.com/tt/collecting.html
Home Business sites: http://www.areyou.com/tt/homebiz.html
Internet & Web Resources sites:
http://www.areyou.com/tt/webres.html
Marketing sites: http://www.areyou.com/tt/marketing.html
Shopping sites: http://www.areyou.com/tt/shopping.html
Sports sites: http://www.areyou.com/tt/sports.html
I hope you enjoyed them.
Liza
A mailing list was created for this promotion and will not be
reused. Each
email address is permanently removed from the list after this
letter is
mailed. However, if you still wish to email me with any questions
or
comments, please use the return address of this email. Thank you
for taking
the time to read this material.
From huihienii21 at msn.com Mon May 25 16:34:38 1998
From: huihienii21 at msn.com (huihienii21 at msn.com)
Date: Mon, 25 May 1998 16:34:38 -0700 (PDT)
Subject: Want to Advertise? Bulk Friendly Hosting? We Have It!!
Message-ID: <1998051434NAA13714@AOL-SUCKS.upm.edu.my>
Express Mail Server & MORE!!!
The Next Genereration in Mass Emailers, Completely bypass your ISP's email server and send out your email
originating from your personal computer directly into your recipients mail system! Send email directly from you computer without using any of your ISP's server resources!
Mail is delivered instantaneously, This incredible mail engine actually hand delivers the message from
your computer into the recipients mail system. No delay; message literally travels right to its destination.
Guaranteed delivery Every single last one of your messages gets delivered! Message goes
directly from your computer to your recipients mail system.
Personalize messages, Automatically inserts recipients name in the body or your letter for a
dramatic increase in responses. Verifies every single addresses before sending. Puts all bad addresses in a bad address file (practically eliminates
undeliverables!).
Unbelievably FAST !! This new technology uses a multithreaded process to connect directly
with your recipients mail system! Express Mail will send up to 80,000 messages per hour with a 28.8
modem (even faster with ISDN and T-1) and every single message will be individually placed in your
recipients mail system instantaneously!
Randomizing option allows you to break through any filters. This is a necessity to get mail through to AOL members. Create your messages in the built-in word processor. It has everything you need including spell check and color! Customization feature allows you to personally create your program. This will single-handedly generate additional sales for you and your
clients. You'll love this feature!
REQUIREMENTS
Windows 95 or higher
8 MB RAM
486 or faster processor
10 MB free space on your hard drive
**SPECIAL** ONLY $150.00**
Call 1-800-298-7863 To Order Your Demo Today!!
Recieve 250,000 email addresses & Stealth Mass Mailer for free!!(With Purchase)
OTHER MAIL PROGRAMS
Fresh 20 Million + Email Addresses on CD for only $90.00
Get 3 Stealth Mass Mailers with unlock codes for only $150.00
We also have Gold Rush for only $300.00
Email Adressee Extractor for $100.00
Caller ID for $100.00
Bulk Mate List Manager for $129.00
Desk Top Server 98 for $339.00
MX Lookup for $185.00
MUCH MORE
Bulk Friendly Web Hosting On Foreign Backbone only $90.00 a month, Sex site Hosting, only $350.00 a month, 2 page Bulk Friendly web hosting only $60.00 month
Also, call about a great rate of 8.9 cents long distance, even with 800/888 numbers!!
14.9 cents a minute calling cards(not prepaid) EARN MONEY TOO!!!
800 voice mail with unlimited calls, only $45.00 a month!!!!!
Please leave information on the item that you are calling about. Thank you.
Need to advertise a product or service? We can do it for you!! If you are already paying someone to do it, then call us and I bet we can beat them. Our fees usually start at $395.00 for 1.2 million, we even have lower rates.
WE CAN ALSO ADVERTISE YOUR PRODUCTS OR SERVICES!!!!
PLEASE CALL US FOR RATES ON THIS!!!!! EXCELLANT RATES!!
From ABrigano at aol.com Mon May 25 17:35:46 1998
From: ABrigano at aol.com (ABrigano)
Date: Mon, 25 May 1998 17:35:46 -0700 (PDT)
Subject: [MVW] Mailing List Additions ...
Message-ID: <93a5f2fe.356a0ab0@aol.com>
Hello,
Recently, MVW has undergone an expansion of it's mailing list. You have been
placed on the mailing list for Mohawk Valley Wrestling. If you would like to
be removed from the mailing list, please, feel free to e-mail abrigano at aol.com
with the subject REMOVE and you will be removed from the list immediately.
On the other hand, if you'd like to see some excellent e-wrestling cards that
will knock your socks off, stay tuned and read our mail once and a while. You
won't be dissapointed. I'll do my best to keep your intrest through each and
every card. The 7 month old MVW as at it's hottest, and I want to share it
with you.
Thank You,
Anthony Brigano
From caj at math.niu.edu Mon May 25 18:54:38 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Mon, 25 May 1998 18:54:38 -0700 (PDT)
Subject: Cite for "... [Spooks] Digital Steganography"
In-Reply-To: <19980525142146.B3293@die.com>
Message-ID:
On Mon, 25 May 1998, Dave Emery wrote:
=> ----- Forwarded message from Bob Margolis -----
Hi, all.
=> "As a method to provide secure communications on the battlefield, we
=> are pursuing research in the area of digital steganography," says
=> Lisa Marvel, an electronics engineer at ARL's Information Science &
=> Technology Directorate.
Lisa Marvel presented the paper, "Reliable Blind Information
Hiding for Images" at the last Info Hiding Workshop (2nd annual) in April.
Coauthored with C. Boncelet, Jr. (U. Delaware) and C. Retter (Also
from US ARM), the paper describes spread-spectrum techniques for hiding
a good 1-5 Kilobytes in a 512x512 greyscale image securely and w/ error
correction.
The proceedings aren't out yet, but one of the conference-goers
was kind enough to put electronic versions of the papers online. See:
http://www.cl.cam.ac.uk/~fapp2/ihw98/papers.html
The ARM paper is in session 1.
-Xcott
,oooooooo8 o ooooo at math.niu.edu --- http://www.math.niu.edu/~caj/
o888' `88 ,888. 888
888 ,8'`88. 888 "I have discovered a truly marvelous proof of
888o. ,oo ,8oooo88. 888 this statement, which, unfortunately, this margin
`888oooo88 o88o o888o 888 is too small to contain. And my FUCKING word
____________________8o888'__processor won't let me resize it."_______________
From global8888 at yahoo.com Mon May 25 21:02:11 1998
From: global8888 at yahoo.com (global8888 at yahoo.com)
Date: Mon, 25 May 1998 21:02:11 -0700 (PDT)
Subject: The Internet Success ToolBox
Message-ID: <>
Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
global8889 at yahoo.com
You will be removed promptly.
*****************************************************************
"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!
This is what you will receive on CD-ROM:
1. Stealth Mass Mailer ($399.00 value) - This unique, first of
it's kind - software that allows you to easily send 250,000 e-mail
messages an hour. Simply enough by making a single
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.
This, easy to use, software is designed for the basic computer
user to understand. It's as easy as imputing the mail server,
selecting the list of e-mail recipients to send to, inserting your
e-mail address, adding your subject line, selecting your sales
letter, and pressing send.
2. E-Mail Pro Extractor ($350.00 value) - This one of a kind software
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of
e-mail addresses by domain names.
The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum
messages, or data from the member directory. Each of these
files are filled with e-mail addresses.
3. Check Deposit System ($125.00 value) - Check Deposit System
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary.
4. 16 Million E-mail Addresses ($149.00 value) - We took a total of
over 92 million e-mail addresses from many of the touted CD's that
are out there (bought them all - some were $300+)! We added the
millions we had in storage to those. When we combined them all,
we had in excess of 100+ million addresses in one huge file.
We then ran a super "sort/de-dupe" program against this
huge list. It cut the file down to less than 25 million!!
We then ran a program that contained 150+ keywords to
remove addresses with vulgarity, profanity, sex-related
names, postmaster, webmaster, flamer, abuse, spam,
etc...Also we eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!
So, you see, our list will save people hundreds of
dollars buying all others that are out there on CD. Using
ours will be like using the 100+ million that we started with,
but a lot less money and a lot less time!
If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following
awesome bonuses absolutely FREE.
A value of over $600.00 !!!
To order:
____ YES! I'm bursting with anticipation! Please send me "The
Internet Success Toolbox" so I can start advertising my business to
"millions of people" - absolutely FREE! I'm anxious to see how others
are creating immediate "cash-flow explosions", and eliminating most of
their advertising and marketing costs - and how I can do the same!
Enclosed is $395.
____ YES AGAIN! Because I'm responding within 7 days, I will receive
6 BONUSES with a total value of $663.90 - absolutely FREE! They include:
BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!
BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and
internet cash flow heaven!
BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified
Ad Sites on the Internet" - a virtual GOLDMINE!
BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your
Business on Automatic Pilot and Turn Your Marketing System Into a
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even
When You Don't!!"
BONUS #5 ($195 value): Unlimited technical support. Even though
"The Internet Success Toolbox" will be simple to use, it's great to
know support is always available - if and when you really need it!
And last but not least . . . .
BONUS #6 ($175 value): Order within 7 days and I'll also throw in a
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE
lodging at one of over 30 "premier" resorts.
Some vacation spots you can choose from include: Hawaii; Orlando,
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!
Hey, when you start making a TON of money, you'll wanna do some
celebrating, won't you? So start packing those bags!
That's it. A lot more than you bargained for isn't it?
When you total all the goodies up, you're looking as a total value of
$663.90! All yours - absolutely FREE - with your purchase of our amazing
package "The Internet Success Toolbox " for only $395.00.
And I'll even pay for shipping your package. You can have it in days. And
start making money THE VERY SAME DAY!
Anyway, I have a copy right here on my desk reserved for you. All I need
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.
___Yes, Also send me info on obtaining a Merchant Account so that I can take
credit cards for my business.
___I am interested in becoming a re-seller for your company. Please send
re-seller information.
Name _____________________________________________________
Street Address ____________________________________________
City)__________________State_______Zip_____________
Phone # (_____) ___________________________
Fax # (______) _____________________
E-mail Address _________________________
___Visa ___MasterCard
Total:$________
Account Number_____________________
Expiration Date____________________
I understand that all sales are final.
____________________________________
Signature
To order by check:
***********************************************************
Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.
(We are able to perform this service using our
Check Deposit System Software)
************************************************************
* Orders by Credit Card are shipped IMMEDIATELY.
Fax completed order form to: (425) 379-9722
* Orders by personal, business or credit card CHECK are shipped in 7-10
business days.
* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK or MONEY ORDER are
shipped IMMEDIATELY. Mail to:
SYS
11014 19th Ave SE Suite 305
Everett, WA 98208.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From global8888 at yahoo.com Mon May 25 21:02:11 1998
From: global8888 at yahoo.com (global8888 at yahoo.com)
Date: Mon, 25 May 1998 21:02:11 -0700 (PDT)
Subject: The Internet Success ToolBox
Message-ID: <>
Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
global8889 at yahoo.com
You will be removed promptly.
*****************************************************************
"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!
This is what you will receive on CD-ROM:
1. Stealth Mass Mailer ($399.00 value) - This unique, first of
it's kind - software that allows you to easily send 250,000 e-mail
messages an hour. Simply enough by making a single
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.
This, easy to use, software is designed for the basic computer
user to understand. It's as easy as imputing the mail server,
selecting the list of e-mail recipients to send to, inserting your
e-mail address, adding your subject line, selecting your sales
letter, and pressing send.
2. E-Mail Pro Extractor ($350.00 value) - This one of a kind software
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of
e-mail addresses by domain names.
The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum
messages, or data from the member directory. Each of these
files are filled with e-mail addresses.
3. Check Deposit System ($125.00 value) - Check Deposit System
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary.
4. 16 Million E-mail Addresses ($149.00 value) - We took a total of
over 92 million e-mail addresses from many of the touted CD's that
are out there (bought them all - some were $300+)! We added the
millions we had in storage to those. When we combined them all,
we had in excess of 100+ million addresses in one huge file.
We then ran a super "sort/de-dupe" program against this
huge list. It cut the file down to less than 25 million!!
We then ran a program that contained 150+ keywords to
remove addresses with vulgarity, profanity, sex-related
names, postmaster, webmaster, flamer, abuse, spam,
etc...Also we eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!
So, you see, our list will save people hundreds of
dollars buying all others that are out there on CD. Using
ours will be like using the 100+ million that we started with,
but a lot less money and a lot less time!
If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following
awesome bonuses absolutely FREE.
A value of over $600.00 !!!
To order:
____ YES! I'm bursting with anticipation! Please send me "The
Internet Success Toolbox" so I can start advertising my business to
"millions of people" - absolutely FREE! I'm anxious to see how others
are creating immediate "cash-flow explosions", and eliminating most of
their advertising and marketing costs - and how I can do the same!
Enclosed is $395.
____ YES AGAIN! Because I'm responding within 7 days, I will receive
6 BONUSES with a total value of $663.90 - absolutely FREE! They include:
BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!
BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and
internet cash flow heaven!
BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified
Ad Sites on the Internet" - a virtual GOLDMINE!
BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your
Business on Automatic Pilot and Turn Your Marketing System Into a
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even
When You Don't!!"
BONUS #5 ($195 value): Unlimited technical support. Even though
"The Internet Success Toolbox" will be simple to use, it's great to
know support is always available - if and when you really need it!
And last but not least . . . .
BONUS #6 ($175 value): Order within 7 days and I'll also throw in a
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE
lodging at one of over 30 "premier" resorts.
Some vacation spots you can choose from include: Hawaii; Orlando,
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!
Hey, when you start making a TON of money, you'll wanna do some
celebrating, won't you? So start packing those bags!
That's it. A lot more than you bargained for isn't it?
When you total all the goodies up, you're looking as a total value of
$663.90! All yours - absolutely FREE - with your purchase of our amazing
package "The Internet Success Toolbox " for only $395.00.
And I'll even pay for shipping your package. You can have it in days. And
start making money THE VERY SAME DAY!
Anyway, I have a copy right here on my desk reserved for you. All I need
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.
___Yes, Also send me info on obtaining a Merchant Account so that I can take
credit cards for my business.
___I am interested in becoming a re-seller for your company. Please send
re-seller information.
Name _____________________________________________________
Street Address ____________________________________________
City)__________________State_______Zip_____________
Phone # (_____) ___________________________
Fax # (______) _____________________
E-mail Address _________________________
___Visa ___MasterCard
Total:$________
Account Number_____________________
Expiration Date____________________
I understand that all sales are final.
____________________________________
Signature
To order by check:
***********************************************************
Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.
(We are able to perform this service using our
Check Deposit System Software)
************************************************************
* Orders by Credit Card are shipped IMMEDIATELY.
Fax completed order form to: (425) 379-9722
* Orders by personal, business or credit card CHECK are shipped in 7-10
business days.
* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK or MONEY ORDER are
shipped IMMEDIATELY. Mail to:
SYS
11014 19th Ave SE Suite 305
Everett, WA 98208.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From lottdin at hotmail.com Mon May 25 21:49:49 1998
From: lottdin at hotmail.com (Tony Grendair)
Date: Mon, 25 May 1998 21:49:49 -0700 (PDT)
Subject: A Lottery You can Control The stakes In!
Message-ID: <19980526044859.14362.qmail@hotmail.com>
A Lottery You Control the Odds IN?
Read the first few lines and see if you aren't at least intrigued. Are
you SURE you won't miss out?
OK. So this is another MLM, BUT, this is the best one I've ever seen.
Firstly, the cost to me for starting in on this program = $20 US plus
postage. That's it. Second, you actually get something for your money.
Something truly useful. The package you receive contains detailed
reports of (1) How to start a small business, something very popular in
today's economy (2) How to find Gov't auctions. You'ld be surprised how
many there are (3) Home based business and (4) How to start an Answering
service. Each of the reports is very inciteful and will get you at least
wondering what it would be like to control your own destiny. PLUS, this
program gives you the chance to raise the start up capital, or just make
a bunch of money. This is a lottery you control the stakes at. With a
little effort you can easily turn 20 dollars into much more. Think just
10 people over the entire Internet need to take a chance like I did. I
only need a response of about .05%, that's .005 out of a hundred I reach
with this program. This is my first time ever doing this and I can't see
one reason it won't work and I'm a business student at one of the best
schools in the country. Hey I might not need a summer job. Wouldn't that
be sweet?
Throw your hand in and with a little work this could be the greatest
thing that ever happened. Remember, people get rich with these
programs, that's why there out there, there is no reason it can't be
you. Maybe nothing in this life is free but this may be as close as
there is.
Please accept my apology if this was sent to you in error!
*******************************************************************
You are about to possibly make $50,000--in less than 90 days
Read the enclosed program...THEN READ IT AGAIN!
********************************************************************
Dear Friend,
If you are looking to make some real money, and you don't want to
spend
much money to do it then this is for you. This business will only cost
you
$20 to get into, and that's not much when you consider some of the other
offers
that you will receive.
*********************************************************************
Testimonial:
I am an Executive Director of a YMCA and would never do anything that
I
thought would be wrong. So please take a look at the business program
that we
are offering you. I think this is one of the safest investments that
you
can make, and the rewards are outstanding $$$$. It requires very
little
effort on your part, and no hard selling. Now that's what I've been
looking for!
Many people have paid off debts, bought houses, taken vacations,
etc. with the money they have made through this business, and believe
me that it does
not take long before the money starts to come in. Within 5 to 7 days
of sending
your advertisement out via bulk e-mail you will start receiving orders
for the
reports.
You will have $5 bills overflowing your mailbox or PO Box. Many people
have to pick their mail up at the window because all of the mail will
not fit
into the box! Excited yet?
I was very skeptical too when I first received an advertisement about
this great business opportunity, and passed on it many times--just
deleting them
when I received the offers. Thank goodness someone sent me another
chance.
The money has been rolling in now for about 9 weeks. I have paid the
money that I owed to state income tax, and paid off two other credit
cards. I
know that in another 30 to 40 days I will be debt free, and how many
people
can say that now days?
We are only giving you the opportunity to help yourself to this
outstanding money making opportunity. The rest is up to you, but think
about this.
I have only spent about $100--$20 to order the reports and $80 to send
bulk
emails, and I am almost debt free now. Within another 3 to 4 weeks I
will be
there--debt free, and I never thought that would happen. There is no
other
opportunity that costs so little to get in, and to make such large sums
of money.
I urge you to act now. I promise you will be very satisfied with the
results. Butch Christy
******************************************
Please, if you have any questions about this program feel free to
email
me with your questions. I will be glad to help you to financial
freedom. The
following is the program and how it works, and please when you decide
to act upon
this great opportunity, follow all directions exactly. Making changes
in the program in any way will result in lost income for you and
others.
Thanks for taking the time to look at this program, and best wishes.
Jennifer Evans
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
This is a LEGAL, MONEYMAKING PHENOMENON
PRINT this letter, read the directions, THEN READ IT AGAIN!!!
You are about to embark on the most profitable and unique program you
may
ever see. Many times over, it has demonstrated and proven its ability
to
generate large amounts of money. This program is showing fantastic
appeal with a huge and ever-growing on-line population desirous of
additional
income.
This is a legitimate, LEGAL, money-making opportunity. It does not
require you to come in contact with people, do any hard work, and best
of all,
you never have to leave the house, except to get the mail and go to the
bank!
This truly is that lucky break you've been waiting for! Simply follow
the easy instructions in this letter, and your financial dreams will
come
true! When followed correctly, this electronic, multi-level marketing
program
works.
Thousands of people have used this program to:
-Raise capital to start their own business
-Pay off debts
-Buy homes, cars, etc.,
-Even retire!
This is your chance, so don't pass it up!
____________________________________________________________
OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
____________________________________________________________
Basically, this is what we do:
We send thousands of people a product for $5.00 that costs next to
nothing to produce and e-mail. As with all multi-level businesses, we
build our
business by recruiting new partners and selling our products. Every
state in the U.S. allows you to recruit new multi-level business online
(via your
computer).
The products in this program are a series of four business and
financial
reports costing $5.00 each. Each order you receive via "snail mail"
will
include:
*$5.00 cash
*The name and number of the report they are ordering
*The e-mail address where you will e-mail them the report they ordered.
To fill each order, you simply e-mail the product to the buyer.
The $5.00 is yours!
This is the EASIEST electronic multi-level marketing business anywhere!
FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE
STAGGERING BENEFITS!!!!
********INSTRUCTIONS**********
This is what you MUST do:
1. Order all 4 reports shown on the list below (you can't sell them if
you
don't order them).
*For each report, send $5.00 CASH, the NAME & NUMBER OF THE
REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, AND YOUR RETURN POSTAL
ADDRESS
(in case of a problem) to the person whose name appears on the list
next
to the report.
* When you place your order, make sure you order each of the four
reports. You will need all four reports so that you can save them on
your computer and resell them.
* Within a few days you will receive, via e-mail, each of the four
reports. Save them on your computer so they will be accessible for you
to
send to the 1,000's of people who will order them from you.
2. IMPORTANT--DO NOT alter the names of the people who are listed next
to each report, or their sequence on the list, in any way other than is
instructed below in steps "a" through "d" or you will lose out on the
majority of your profits. Once you understand the way this works,
you'll
also see how it doesn't work if you change it. Remember, this method
has
been tested, and if you alter it, it will not work. This is just the
nature of the program. In order to achieve the multiplying phenomenon
you must follow the steps.
a. Look below for the listing of available reports.
b. After you've ordered the four reports, replace the name and
address under REPORT #1 with your name and address, moving the one that
was there
down to REPORT #2.
c. Move the name and address that was under REPORT #2 down to
REPORT#3.
d. Move the name and address that was under REPORT #3 down to
REPORT
#4.
e. The name and address that was under REPORT #4 is removed from
the
list and has NO DOUBT collected their 50 grand.
Please make sure you copy everyone's name and address ACCURATELY!!!
3. Take this entire letter, including the modified list of names, and
save it to your computer. Make NO changes to the instruction portion
of this
letter.
4. Now you're ready to start an advertising campaign on the WORLDWIDE
WEB!
Advertising on the WEB is very, very inexpensive, and there are
HUNDREDS
of FREE places to advertise. Another avenue which you could use for
advertising
is e-mail lists. You can buy these lists for under $20/2,000 addresses
or you can
pay someone a minimal charge to take care of it for you.
BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!
5. For every $5.00 you receive, all you must do is e-mail them the
report they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON
ALL ORDERS!
This guarantees the e-mail THEY send out, with YOUR name and address
on
it, will be prompt because they can't advertise until they receive the
report!
___________________________
AVAILABLE REPORTS
___________________________
***Order Each REPORT by NUMBER and NAME***
Notes:
- ALWAYS SEND $5 CASH FOR EACH REPORT
- ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL
- Make sure the cash is concealed by wrapping it in at least two sheets
of paper.
- On one of those sheets of paper, include: (a) the number and name of
the report you are ordering, (b) your e-mail address, and (c) your
postal
address.
__________________________________________________________
REPORT #1 "How to Start Your Own Home Based Business For Fun &
Profit!"
ORDER REPORT #1 FROM:
KKyKo
Rideau Town Center
Post Office Box 30029
Kingston, ON
Canada
K7K 7B5
Please ensure sufficient postage, it is slightly more to mail to Canada.
If you like I can include how I collected over 4000 email addresses for
free and I'll include the list I compiled. Simply add five dollars to
this order.
_____________________________________________________________
REPORT #2 "An Insiders Handbook on U.S. Government Auction Sales"
ORDER REPORT #2 FROM:
U.S. Champs
Post Office Box 1612
Hermitage, PA 16148
_____________________________________________________________
REPORT #3 "How To Make Money Without Leaving Your House!"
ORDER REPORT #3 FROM:
Caines
3622 Tiffany Lane
West Middlesex, PA 16159
_____________________________________________________________
REPORT #4 "Earn Extra Money With a Home Based Answering Machine"
ORDER REPORT #4 FROM:
Timberlane Consultants
2627 Romar Drive
Hermitage, PA 16148
_____________________________________________________________
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
_____________________________________________________________
Let's say you decide to start small just to see how well it works.
Assume your goal is to get 10 people to participate on your first level.
(Placing a lot of FREE ads on the Internet will EASILY get a larger
response.) Also
assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline
members.
Follow this example to achieve the STAGGERING results below.
1st level--your 10 members with
$5..................................$50
2nd level--10 members from those 10 ($5 x100)..................$500
3rd level--10 members from those 100 ($5 x 1,000)..............$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...........$50,000
THIS TOTALS
----------------->$55,550
Remember friends, this assumes that the people who participate only
recruit 10 people each. Think for a moment what would happen if they
got 20
people to participate! Most people get 100's of participants! THINK
ABOUT
IT!!!!!
Your cost to participate in this is practically nothing (surely you can
afford $20 for a chance to make $55,000). You obviously already have
an
Internet connection and e-mail is FREE!!! REPORT #3 shows you the most
productive methods for bulk e-mailing and purchasing e-mail lists.
Some
list and bulk e-mail vendors even work on trade!
About 50,000 new people get online every month!
********TIPS FOR SUCCESS*********
*TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the
directions accurately.
*Send for the four reports IMMEDIATELY so you will have them when the
orders start coming in because:
When you receive a $5 order, you MUST send out the requested
product/report to comply with the U.S. Postal & Lottery Laws, Title 18,
Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also
Code of Federal Regs. Vol. 16, Sections 255 and 436, which state that
"a
product or service must be exchanged for money received".
*ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
*Be patient and persistant with this program. If you follow the
instructions exactly, the results WILL undoubtedly be SUCCESSFUL!
*ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!
************YOUR SUCCESS GUIDELINE******************
Follow these guidelines to guarantee your success:
If you don't receive 10 to 20 orders for REPORT #1 within two weeks,
continue advertising until you do. Then, a couple of weeks later you
should
receive at least 100 orders for REPORT #2. If you don't, continue
advertising until
you do. Once you have received 100 or more orders for REPORT #2, YOU
CAN
RELAX, because the system is already working for you, and the cash will
continue
to roll in!
THIS IS IMPORTANT TO REMEMBER:
Every time your name is moved down on the list, you are placed in front
of a DIFFERENT report. You can KEEP TRACK of your PROGRESS by watching
which
report people are ordering from you. If you want to generate more
income, send
another batch of e-mails and start the whole process again! There is no
limit to
the income you will generate from this business!!
NOTE: If you need help with starting a business, registering a
business
name, how income tax is handled, etc., contact your local office of the
Small Business Administration (a Federal agency) for free help and
answers to
questions. Also, the Internal Revenue Service offers free help via
telephone and free seminars about business taxes.
*******TESTIMONIALS*******
This program does work, but you must follow it EXACTLY! Especially
the
rule of not trying to place your name in a different position, it won't
work
and you'll lose a lot of potential income. I'm living proof that it
works. It
really is a great opportunity to make relatively easy money, with little
cost to
you. If you do choose to participate, follow the program exactly, and
you'll be on your way to financial security.
Sean McLaughlin, Jackson, MS
My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a
cost accountant with a major U.S. Corporation and I make pretty good
money. When I
received the program I grumbled to Doris about receiving "junk mail". I
made fun
of the whole thing, spouting my knowledge of the population and
percentages involved. I "knew" it wouldn't work. Doris totally
ignored
my supposed intelligence and jumped in with both feet. I made merciless
fun
of her, and was ready to lay the old "I told you so" on her when the
thing
didn't work....Well, the laugh was on me! Within two weeks she had
received
over 50 responses. Within 45 days she had received over $147,200 in $5
bills! I
was shocked! I was sure that I had it all figured out and that it
wouldn't
work. I AM a believer now. I have joined Doris in her "hobby". I did
have
seven more years until retirement, but I think of the "rat race" and
it's not
for me. We owe it all to MLM.
Frank T., Bel-Air, MD
I just want to pass along my best wishes and encouragement to you.
Any
doubts you have will vanish when your first orders come in. I even
checked with
the U.S. Post Office to verify that the plan was legal. It definitely
is! IT WORKS!!!!!
Paul Johnson, Raleigh, NC
The main reason for this letter is to convince you that this system is
honest, lawful, extremely profitable, and is a way to get a large sum
of
money in a short time. I was approached several times before I checked
this
out. I joined just to see what one could expect in return for the
minimal
effort and money required. To my astonishment, I received $36,470.00
in the first
14 weeks, with money still coming in.
Sincerely yours, Phillip A. Brown, Esq.
Not being the gambling type, it took me several weeks to make up my
mind
to participate in this plan. But conservative that I am, I decided
that the
initial investment was so little that there was just no way I wouldn't
get
enough orders to at least get my money back. Boy, was I surprised when
I
found my medium-size post office box crammed with orders! For awhile,
it
got so overloaded that I had to start picking up my mail at the window.
I'll
make more money this year than in any 10 years of my life before. The
nice thing about this deal is that it doesn't matter where in the U.S.
the
people live. There simply isn't a better investment with a faster
return.
Mary Rockland, Lansing, MI
I had received this program before. I deleted it, but later I
wondered
if I shouldn't have given it a try. Of course, I had no idea who to
contact
to get another copy, so I had to wait until I was e-mailed another
program.
11 months passed then it came...I didn't delete this one!...I made more
than
$41,000 on the first try!!
Wilburn, Muncie, IN
This is my third time to participate in this plan. We have quit our
jobs, and will soon buy a home on the beach and live off the interest
on our money.
The only way on earth that this plan will work for you is if you do it.
For
your sake, and for your family's sake don't pass up this golden
opportunity. Good luck and happy spending!
Charles Fairchild, Spokane, WA
NOW WHAT IS $20 FOR A CHANCE TO MAKE AN EXCESS OF $50,000? ORDER YOUR
REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM!!!!!!
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
From billp at nmol.com Tue May 26 06:58:49 1998
From: billp at nmol.com (bill payne)
Date: Tue, 26 May 1998 06:58:49 -0700 (PDT)
Subject: Appeals court notices
Message-ID: <356AC83A.747B@nmol.com>
Monday 5/26/98 7:39 AM
John Young
I looked at http://www.jya.com/nsa-cases.htm
CALIFORNIA NORTHERN DISTRICT COURT
Gilmore v. NSA
Bernstein v. State
U.S. COURT OF APPEALS, NINTH CIRCUIT
Gilmore v. NSA [Court denied access to docket]
Bernstein v. USA, et al 09/10/97 12/08/97 Open:
Submitted
Looks like Gilmore http://www.cygnus.com/~gnu/ is on his way to the
Supreme Court. Too.
We must all keep in mind that the government has loaded the courts with
its own
judges.
I was told not to worry if I got caught doing illegal work breaking
electronic
locks for the FBI. The courts would cover for me.
Not enough people took seriously what some were saying during the
Vietnam
war. Looks like those who screamed "Fascist pigs", unfortunately, were
right.
FASCISM - a political and economic movement, strongly nationalistic,
magnifying the rights
of the state as opposed to those of the individual, in which industry,
though remaining largely
under private ownership, and all administrative political units, are
controlled by a strong central
government.
This morning I will file some papers for Morales with the court.
And get forms for notice of appeal to the Tenth circuit.
Let's all hope its not too late to make some PEACEFUL changes. And hope
for settlement too.
Later
bill
Counterfeiting Wiegand Wire Access Credentials
Bill Payne
October 16,1996
Abstract
Wiegand wire access credentials are easy and
inexpensive to counterfeit.
Access Control & Security Systems Integration magazine, October
1996 [http://www/securitysolutions.com] published the article,
Wiegand technology stands the test of time
by PAUL J. BODELL, page 12
Many card and reader manufacturers offer Wiegand (pronounced
wee-gand) output. However, only three companies in the
world make Wiegand readers. Sensor Engineering of Hamden
Conn., holds the patent for Wiegand, and Sensor has licensed
Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
Germany, to manufacture Wiegand cards and readers. ... A
Wiegand output reader is not the same thing as a Wiegand
reader, and it is important to understand the differences.
In brief, Wiegand reader use the Wiegand effect to
translate card information around the patented Wiegand
effect in which a segment of a specially treated wire
generates an electronic pulse when subjected to a specific
magnetic field. If the pulse is generated when the wire is
near a pick-up coil, the pulse can be detected by a circuit.
Lining up several rows of wires and passing them by a cold
would generate a series of pulses. Lining up two rows of
wires - calling on row "zero bits" and the other "one bits"
- and passing them by two different coils would generate two
series of pulses, or data bits. These data bits can then be
interpreted as binary data and used to control other
devices. If you seal the coils in a rugged housing with
properly placed magnets, and LED and some simple circuitry,
you have a Wiegand reader. Carefully laminate the special
wires in vinyl, and artwork, and hot-stamp a number on the
vinyl, and you have a Wiegand card.
IN THE BEGINNING
Wiegand was first to introduce to the access control
market in the late 1970s. It was immediately successful
because it filled the need for durable, secure card and
reader technology.
Embedded in the cards, Wiegand wires cannot be altered or
duplicated. ...
Bodell's Last statement is incorrect.
Tasks for EASILY counterfeiting Wiegand wire cards are
1 Locate the wires inside the card to read the 0s and 1s.
2 Build an ACCEPTABLE copy of the card.
Bodell's clear explanation of the working of a Wiegand card can
be visualized
zero row | | |
one row | |
binary 0 1 0 0 1
representation
Solutions to Task 1
A X-ray the card
B MAGNI VIEW FILM, Mylar film reads magnetic fields ...
Edmunds Scientific Company, catalog 16N1, page
205, C33,447 $11.75
is placed over the top of the Wiegand card.
COW MAGNET, Cow magnetics allow farmers to trap metal in the
stomachs of their cows. Edmunds, page 204, C31,101 $10.75
is placed under the card.
Location of the wires is easily seen on the green film.
Mark the position of the wires with a pen.
Next chop the card vertically using a shear into about 80/1000s
paper-match-sized strips.
Don't worry about cutting a wire or two.
Note that a 0 has the pen mark to the top. A 1 has the pen mark
at the bottom.
Take a business card and layout the "paper match"-like strips to
counterfeit the card number desired.
Don't worry about spacing. Wiegand output is self-clocking!
Tape the "paper-match - like" strips to the business card.
Only the FUNCTION of the card needs to be reproduced!
History
Breaking electronic locks was done as "work for others" at Sandia
National Laboratories beginning in 1992 funded by the Federal
Bureau of Investigation/Engineering Research Facility, Quantico,
VA.
The FBI opined that this work was SECRET/NATIONAL SECURITY
INFORMATION.
Details of the consequences of this work are covered in
Fired Worker File Lawsuit Against Sandia
Specialist Says He Balked When Lab Sought Electronic
Picklock Software, Albuquer Journal, Sunday April 25, 1993
State-sanctioned paranoia, EE Times, January 22, 1996
One man's battle, EE Times, March 22, 1994
Damn the torpedoes, EE Times, June 6, 1994
Protecting properly classified info, EE Times, April 11,
1994
DOE to scrutinize fairness in old whistle-blower cases,
Albuquerque Tribune, Nov 7 1995
DOE boss accelerates whistle-blower protection, Albuquerque
Tribune, March 27, 1996
DOE doesn't plan to compensate 'old' whistle-blowers with
money, Albuquerque Tribune September 27, 199
From twaweb at inet2.twa.com Tue May 26 11:12:53 1998
From: twaweb at inet2.twa.com (Trans World Specials)
Date: Tue, 26 May 1998 11:12:53 -0700 (PDT)
Subject: Trans World Specials Fare Sales
Message-ID: <19980526153826.19097.qmail@inet2.twa.com>
Welcome to Trans World Specials
for May 26th, 1998. Fares are
valid for travel originating
5/30/98 and returning 6/1/98 or
6/2/98. All tickets must be
purchased May 29th.
Have you been to www.twa.com
lately? Enroll in Aviators or
check your mileage portfolio online.
Read about TWA's J.D. Power &
Associates / Frequent Flyer
Magazine Long Haul service award.
On to this week's Trans World Specials
***********COACH FARES************
Roundtrip fares betweeen ST. LOUIS, MO and:
Cedar Rapids, IA (CID) $79
Detroit, MI (DTW) $89
Wichita, KS (ICT) $89
Colorado Springs, CO (COS) $139
Boston, MA (BOS) $149
Roundtrip fares between BOSTON, MA and:
Cedar Rapids, IA (CID) $149
Little Rock, AR (LIT) $149
St. Louis, MO (STL) $149
Wichita, KS (ICT) $149
Colorado Springs, CO (COS) $169
Roundtrip fares between CEDAR RAPIDS, IA and:
St. Louis, MO (STL) $79
Detroit, MI (DTW) $99
Boston, MA (BOS) $149
Travel is not valid on Trans World
Express flights 7000-7999.
Call TWA at 1-800-221-2000 and book your
your Trans World Special today.
*******GETAWAY VACATIONS************
ORLANDO -- Econo Lodge Maingate Hawaiian includes:
- roundtrip economy airfare
- 2 nights hotel accommodations
- airport transfers
- Avis 4-door compact car rental
- 2 for 1 Church Street Station admission
- kids 12 and under eat FREE
- just 1.5 miles to Walt Disney World main entrance
- 2000 bonus Aviator Miles in addition to actual miles
- from $239 departing New York (JFK)
- from $245 departing St. Louis
- from $255 departing Cincinnati, Columbus, Dayton
Detroit, Indianapolis, Kansas City, Litte Rock,
Milwaukee, Nashville, Oklahoma City, Omaha
- from $299 departing Boston, Hartford, Philadelphia
Pittsburgh
TASTE OF EUROPE FROM $2139 includes:
- roundtrip economy airfare
- buffet breakfast daily
- sightseeing
- some dinners
- travel by private luxury motorcoach
- available for 8/20/98 departure
- available from Los Angeles, San Francisco, Seattle
- FIRST CLASS upgrade option for only $1099 each way
- 5000 bonus Aviator Miles in addition to actual miles
Call 1-800-GETAWAY( 438-2929) now
and book your GETAWAY VACATION.
******************ALAMO**************
ALAMO offers these low rates for an
economy car valid 5/30/98 - 6/1/98
$17.99 Detroit, St. Louis
$20.99 Boston, Little Rock
$29.99 Colorado Springs
For reservations call Alamo at 1-800-GO-ALAMO and
request rate code RT and ID # 443833. For online
reservations access Alamo at
http://www.goalamo.com
***********HILTON HOTELS & RESORTS*****
Hilton Hotels/Resorts offers this low rate
valid the nights of 5/30/98 - 6/1/98
$67 Detroit Metro Airport Hilton Suites, Romulus, MI
( explore the many shopping malls or
the Windsor Casino)
For reservations call Hilton at 1-800-774-1500 and
ask for Hilton Value Rates. Visit Hilton at
http://www.hilton.com
**********TERMS & CONDITIONS**************
Airfare Terms and Conditions:
GENERAL CONDITIONS: Fares shown are round trip, nonrefundable and
are subject to change. Changes to itinerary are not permitted. Fares
do not include Passenger Facility Charges of up to $12 depending
on itinerary. Must use E-Ticketing for domestic travel. Credit card
is the only form of payment accepted. Offer is not available in
conjunction with any other discount, coupon or promotional offer.
Seats are limited and may not be available on all flights or days
of the week. Tickets must be purchased at time of booking and no
later than 5/29/98. Standby passengers not allowed. DOM
Monday (6/1) or Tuesday (6/2). Travel is effective 5/30/98 with
all travel to be completed by 6/2/98. Minimum stay is 2 days.
Maximum stay is 3 days.
Getaway Conditions:
ALL PACKAGES: Package include round-trip economy airfare from
cities indicated. Price is per person based on double occupancy
and is subject to change. Availability, restrictions, surcharges,
blackouts and cancellation penalties apply. No other discounts
or promotions are valid in conjunction with these packages.
DOMESTIC CONDITIONS: Depart for Orlando Sunday-Wednesday and
return Tuesday-Friday. Travel is valid 6/23/98-7/29/98 with all
travel completed 7/31/98. Surcharges apply 7/12-7/31. Price
does not include Passenger Facility Charges of up to $16 per
person. Full payment due by 6/1/98.
INTERNATIONAL CONDITIONS: Seats are limited and may not be
available on all flights. Price does not include Passenger
Facility Charges, US departure/arrival, agriculture, and
security fees from point of origin of travel up to approximately
$90 per person. Single supplement from $489. Full payment is
required by 6/1/98.
Car Rental Conditions:
Taxes (including in California, VLF taxes ranging up to $1.89 per day),
registrations fee/tax reimbursement, and airport access fees/taxes,
if any, are extra. Optional CDW, liability insurance, fuel, additional
driver fee, drop charges and other optional items are extra. Rates higher
for renters under age 25. Rates valid for rentals commencing on Saturday
and ending by 11:59 PM on Tuesday. Rates only valid during week in which
they are published via TWA Internet site. A 24-hour advance reservation
is required. Availability is limited.
Hotel Conditions:
Hilton Hotels and Resorts special rates are available only during the
specific week in which they are published via the TWA Hot Deals
Internet site and the HiltonNet Internet site. Limited availability;
rooms at these Hilton Value Rates are sold on a first-come, first-served
basis. Availability, rate, and terms of occupancy are not guaranteed
and will be confirmed at time of reservation. Participating hotels,
rates and terms are subject to change without notice. Single or double
occupancy. Early check-in, late check-out subject to availability.
No extra charge for children when they stay in parents' or grandparents'
room; total room occupancy subject to local fire safety regulations and
other applicable laws or regulations. Rates vary by season, do not
include any other fees or charges, including without limitation state or
local taxes or gratuities and are subject to change without notice.
Advance booking required. Advance deposit may be required. Offer cannot
be combined with any other special discounts, coupons, certificates,
special rates, promotional offers, award stays, or meeting/group stays.
Hilton reserves the right to cancel any Hilton Value Rate at any time
without notice. Hilton is not responsible for the terms of other offers
in the program, or for any electronic, computer, telephone, security, virus
or any other problem or damage related to use of the program or its offers.
For reservations call 1-800-221-2000 (domestic) or 1-800-892-4141 (international)
or call your travel agent and ask for TWA's special Internet fares.
From xena at best.com Tue May 26 11:30:02 1998
From: xena at best.com (Xena - Warrior Princess)
Date: Tue, 26 May 1998 11:30:02 -0700 (PDT)
Subject: Holograms
Message-ID:
EURO HOLOGRAM IS MISSING
Somewhere between Paris and Munich, a unique hologram design, intended to
deter counterfeiting of the new euro currency, has turned up missing. The
French-made hologram was on its way to a high-security printer near
Nuremberg for testing. One European Union monetary official called the
disappearance "startling" and there's speculation that the EU may have to
change the design of its high-denomination euro banknotes, due to be issued
in 2002. The hologram was designed by a small business in Paris and was
taken to be loaded onto an Air France flight at Roissy airport by Brink's
security services. Officials in Paris say the theft bears the hallmarks of
a well-organized crime, as only an expert would understand the significance
of the hologram in the note-printing process. (Financial Times 21 May 98)
From nobody at REPLAY.COM Tue May 26 21:43:13 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 26 May 1998 21:43:13 -0700 (PDT)
Subject: Structure of MISTY
Message-ID: <199805270443.GAA18680@basement.replay.com>
http://www.mitsubishi.com/ghp_japan/misty/200misty.htm
From jdobruck at kki.net.pl Wed May 27 02:50:01 1998
From: jdobruck at kki.net.pl (Jan)
Date: Wed, 27 May 1998 02:50:01 -0700 (PDT)
Subject: PGP v6.0 & OpenPGP
Message-ID: <356BE23C.EB31683A@kki.net.pl>
Greetings.
I've heard these two are going to come out one day soon.
What I'm interested in is what's so new in it that it's being called
version 6.0... Thanks in advance.
And my second message is about my archive. The reason why it hadn't
been updated to something worthwhile is the fact that i need to
spell-check the archives i download. There are tons of errors in them.
It's
just too bad that people don't spell check their own documents on the
net.
Sincerely,
Jan
From bulletingmarket3893 at ub.net.id Wed May 27 04:56:46 1998
From: bulletingmarket3893 at ub.net.id (bulletingmarket3893 at ub.net.id)
Date: Wed, 27 May 1998 04:56:46 -0700 (PDT)
Subject: SUBJECT: RE: MARKET BULLETIN!!
Message-ID: <148785261852.OAA03652@mailrout4.ub.net.id>
The celebrated Stanley Morgan StockMarket Newsletter
projects new highs in all the major U.S. market indices. (Asia
crisis=U.S. slowdown=lower interest rates=higher stock prices.)
Our top stock selections include:
Cisco Systems CSCO 76
Excite XCIT 53
Mark I Inds. MKII 1 1/8
We anticipate EXPLOSIVE upside movement in the above
group. http://quote.yahoo.com/
Send no money, sample issue: Dept. WIN, P.O. Box 30499, Seven Mile
Beach, Grand Cayman, B.W.I.
From jmatk at tscm.com Wed May 27 16:34:30 1998
From: jmatk at tscm.com (James M. Atkinson, Comm-Eng)
Date: Wed, 27 May 1998 16:34:30 -0700 (PDT)
Subject: Fraud Alert - Frank Jones - Spyking
Message-ID:
Greetings,
I regret to inform you that you may have been the victim of a serious hoax
foisted by Frank Jones (aka: SpyKing).
Many people, including the members of the media, have been swallowing what
Frank Jones has to offer, simply because they neither understand the
science or won't do even simple research on a vendor (hint: the TEMPEST,
DATASCAN and similar products are an utter hoax).
You may be interested in the following information regarding Frank Jones
which we have listed on the Threat Profile Library.
http://www.tscm.com/FNJspyking.html
We would encourage you to examine the materials in the Threat Profile
Library, and then to review your own dealings with the subject.
We also recommend that you carefully review the documents, and then contact
those agencies directly yourself (they would be happy to talk to you).
Each of the agencies (such as NY PI Lisc. Board, and NY Police Department)
will gladly provide you with authentication of the documents we present and
will gladly send you copies of the original documents (just ask them). They
will verify the documents are indeed genuine and were generated by their
agencies. Of course Frank claims that all of the documents in the library
have been forged and are counterfit (which is a hilarious claim).
Please feel free to verify the documents, in fact we strongly encourage it!!!
You may seriously want to reconsider your attendance at SpookTec98 as
several of the victims (and "Guest Speakers") who attended last year were
not at all amused (some of whom where burned when their promised "limo and
free hotel room" never showed up).
Good Luck,
-jma
=======================================================================
Everybody's into computers... Who's into yours?�
=======================================================================
James M. Atkinson Phone: (978) 546-3803
Granite Island Group - TSCM.COM
127 Eastern Avenue #291 http://www.tscm.com/
Gloucester, MA 01931 mailto:jmatk at tscm.com
=======================================================================
The First, The Largest, The Most Popular, and The Most Complete TSCM,
Technical Security, and Counterintelligence Site on the Internet.
=======================================================================
From KevB428 at aol.com Wed May 27 23:59:06 1998
From: KevB428 at aol.com (KevB428 at aol.com)
Date: Wed, 27 May 1998 23:59:06 -0700 (PDT)
Subject: [OWC] Orangemen Wrestling Commision [ handbook v. 1 ]
Message-ID: <30738df8.356d0611@aol.com>
===========================
Kevin Riley Productions Presents
===========================
/�������\���\ /������/����|
/ \ \ / /_____|
| |���| | \/�\/ //
| |___| | / \
\ /\ _ / �����|
\_______/ \___/ \___/ \_______|
===========================
Orangmen Wrestling Commission
===========================
Frequently Asked Questions v.1.0
===========================
==================
Table of Contents
A. Foreward
B. Cards & Titles
C. Rules
D. Roleplaying Tips
E. Application
F. Staff
==================
==================
A. Foreward
==================
Hello folks, I'm Kevin Riley, and I'm making my _last_ attempt at
making a federation great. This is make-it or break-it time for me, and I
really am determined
to bring this federation into the bigtime.
The OWC stands for Orangemen Wrestling Commision, which is a
regional federation (similiar to MVW, and also a friend of that fed) that is
run out of none other
than Syracuse, New York. It will not be having cards in Madision Square
Garden, as it will start off slow, like most independants, and hopefully work
its way up. This fed
will actually start off holding their cards in a local nightclub in Syracuse
that we all
know as the Rave, which seats about three hundred people.
This federation will be run by Carson Bordon, the current OWC
President.
He and Riley got a huge loan from a bank in Albany, New York, and now have
made
their last attempt at making a major federation. The recruiting has started,
and calls
have been made, contracts sent. So, are you ready to join the OWC and face
some of the toughest, and newest competition that you've ever seen? If so,
welcome!
==================
B. Cards & Titles
==================
The New York State Heavyweight Championship - This is definitly the big one.
The top dawg will be the man holding this title and it will definitly be a
title that a lot of
people will be contender for. This title shall be defended every two weeks.
The Syracuse Heavyweight Championship - This is the secondary title, and we'll
also be heavily competed for. This is for the people not quite ready to make
it onto the
world title scene yet. This title will also be defended once every two
weeks.
Warriors of Syracuse Wrestling - This is the card that will be held once a
week, on
Sunday nights. There should be around three to four matches on each card and
as the fed expands, the amount of matches will as well. There will also be
interviews,
special appearances, and everything that you'd come to expect from a normal
wrestling television show! It will take place in the Rave, a local Syracuse
night club that holds up to three hundred people total.
The first card will be presented to you on the twenty first of June. It will
feature more matches than the normal card, and will attempt to get _every_
single wrestler in the
federation, somehow participating in a match or something of some sort. It
will be a sort of supercard, but will be on Sunday, and called, the Warriors
of Syracuse wrestling, like the normal weekly show.
==================
C. Rules
==================
I will accept a maxium of two roleplays a week and one in-ring. To start the
OWC off, we'll be going with the one card a week format, if we get pushed to
two cards a
week, then it will be two in-rings, one for each card. Please be reminded,
that this
plan of roleplays is tentative, and could be changed.
Strats will play a huge role in setting up angles, and will also count towards
your matches and my decisions as to who wins or not.
Some wrestlers, specifically heels, are particulary good at drawing heat, and
getting
themselves known quicker than others. That will also help out your chances.
This is a perfect time to repeat that phrase that we all know, quality not
quantity!
==================
D. Roleplaying Tips
==================
* Content
The content of one's roleplay is not the length the roleplay but the one
or many message(s) that the roleplay gets across in that length. Content is
by far the most important part of a roleplay, and must be looked upon as
essential. A roleplay without any content is just jabber and jargon thrown
into a file. You must always have some sort of content in your roleplays.
When you begin a roleplay, you must set a goal for amount of content you
want to cover during the course of your OWC roleplay. Tell yourself what, in
a brief rundown, that you want to tell everybody in this roleplay of yours.
If you want to tell the whole OWC that you are here to stay and to pledge your
allegiance to the OWC, then remember that fact while you are writing your
roleplay. Never write a roleplay with out any topics to write about.
If you want to know if your roleplay has any content, then read it over
and ask yourself what the message you got across was. If you can't answer
that question in a breif sentance or two, then the chances are, you have no
body and content to your roleplay and you need to start over and try again.
The more topics you have to discuss, the better. You can never have
enough content. If you have enough topics to write 5 pages or so, then so be
it and go though with it. Also, you should learn to elaborate on your topics
and make them into a 'big deal'. If your topic is "I want to challenge Klonis
to a match" then ask yourself all the possible questions to stimulate ideas!
Ask yourself why you want to wrestle Klonis. Ask yourself how good of a
chance you have at defeating Klonis. Ask yourself what type of match you want
to challenge Klonis to. Ask youself when you want to wrestle Klonis! The
possibilities are endless, people! Cover every area and aspect you can!
Sometimes when I'm going to write a roleplay, it helps me to make a breif
listing of the different things I want to cover during the course of the
roleplay in chronological order. I then procede to turn the breif sentances
into dialouge and description and under normal circumstances I come out with a
somewhat decent roleplay that has both a point and a decent amount of
reasoning behind it. It makes sense, people.
The main thing you have to remember, though, when writing your roleplay
... is that you must develop your character. Get a good idea of what your
character's all about by re-reading your application to the OWC, and then put
that all across in the roleplay. If you're wrestler is a happy goofball, then
play him as a happy goofball and don't have him take matches or wins and
losses too seriuosly. If you wrestler is a hard-nosed technical wrestler
obsessed with winning, then have him take things seriously and be quite angry
when he loses. It's all about character development and if you don't have any
idea how your character should act, then it's probably time to create a new
one.
* Length
Length certainly isn't the most important part of your roleplay, but it
is something that you must seriously consider if you're a newbie. You're
roleplay MUST be at least a k or two to get anything across, in my opinion.
Although it is hard to find the happy medium between too long and too short,
you'll get there if you follow these steps!
First of all, don't wear your topic down so much that nobody is going to
be interested in reading it anymore. Cover what you need but don't exasperate
the subject. Nobody wants to read a roleplay that's 20k and has no plot!
Once you stop having fun writing your roleplay it's probably finished.
But also, you must not send in a roleplay that is 3 lines long or even a
paragraph long. In the OWC, everytime you send in a roleplay that is 5 or
less lines, that's pretty much an automatic loss. Make your roleplay to the
point but long enough so it'll take a few minutes to read and leave the reader
with a good taste in their mouth and a good idea what your character is about.
Touch base with the subject quite a bit and make it long enough.
* Detail
The next thing that you newbies must learn is that you must always create
a beginning and a conclusion in your roleplays! At the beginning of your
roleplay, you must _always_ give a breif description of your wrestler's
setting and describe that wrestler. A setting description tells the who,
what, where, when and why of the roleplay. A beginning is also put inside
action bars which are () or [] or :: :: or {}. In a beginning, you should
describe what the character is wearing, what his mood is like, where his is,
what he's doing there, ect. For example, read the next paragraph which is one
of my less recent descriptions and was written when I was a newbie to e-
wrestling. Most should be about this length and decency. Maybe better.
[The screen fades in to Klonis. He's sitting in a dark living room
rocking back and forth on an easychair. He's wearing his street clothes which
consist of a pair of faded denimn jeans, a black tank top, and a nike
headband. His black hair is slicked back and his eyes are squinted and
feirce. The only illumination in the room is cast by a fireplace with the
embers slowly dying out. The cameraman gives him a closup as signals to come
over to him.]
Also, you must remember to add a conclusion. The conclusion is more of
the same except it would say things like, Klonis is fading out, ect. Be
careful not to make these too drab. It can get tricky to think up the setting
some times.
Another thing, is that you must watch the spelling in your roleplay and
try to word things as efficiently and as nicely as possible. Go through the
document numerous times to make sure you did not make any foolish spelling
mistakes, make sure you add two spaces after a period, you inserted commas
where needed, you did not have any fragments or run-ons. Don't make yourself
look foolish by saying stuff like this:
(Wrtler): "im cmin to getg you cuz of what you ded to me that tyme when u
did dat thing.."
==================
E. Application
==================
IMPORTANT NOTE: This federation is taking a new approach. We will prefer
that you all bring in _new_ characters that you've never before used. That
way reputations and egos will not be as much of a problem. This is not
mandatory, but I prefer it.
* Your Name: (optional)
* Your Age: (optional)
* Your E-Mail Address:
* Your IRC Nickname:
* Wrestler's Name:
* Age:
* Hometown:
* Hair Color:
* Eye Color:
* Height: (between 5'5" - 7'0")
* Weight: (between 200 - 500)
* Build: (stocky, muscular, trim, ect.)
* Manager or Valet's Name: (optional)
* Describe Manager or Valet: (optional)
* Please describe your wrestler's ring style: (anything from technician to
lucha to powerful, ect.)
* Please describe your wrestler's gimmick/attitude/personality as much
as you can:
* Please give us a little background on your wrestler (perhaps a made-up
history-- we just want to get a good idea of who your character is):
* Entrance Music (please use an actual song, I don't want to see "The
Giant's WCW Music"):
* Describe your wrestler's entrance to the ring (does he have fireworks,
special lights, anything he does before he gets to the ring... if you
are creating a tag team, skip this category and fill out Tag Team
Entrance on the Tag Team sheet instead):
* Describe your wrestler's physical appearance (please be as descriptive
as possible!):
* Describe your wrestler's ring attire (again, please be descriptive!):
* Taunts (does your wrestler do any taunts or celebrations to his opponent
during the course of the matchup? If so, mark his celebrations here!)
* What is the name of your wrestler's finisher?
* What is the real name of the move?
* List 10 - 15 moves your wrestler performs:
==================
F. Staff
==================
Fictional Staff:
PRESIDENT - Carson Bordon
HEEL COMMENTATOR - Max Femmia
FACE COMMENTATOR - Nathan Liotta
RING ANNOUNCER - Michael Morgan
SENIOR REFEREE - Christopher Burk
TIMEKEEPER - Otto Jeckel
CHEIF OF SECURITY - Robert O'Connor
Staff:
PRESIDENT - Kevin Riley
ASSISTANT BOOKER - Rick Baptist (Also a promoter, recruiter, pay per view
writer.)
CARD MATCH WRITER - Paul Clark
CARD MATCH WRITER - ????????
CARD MATCH WRITER - ????????
PAY PER VIEW WRITER - Rick Baptist
PAY PER VIEW WRITER - Jay Ralston
PAY PER VIEW WRITER - Andru Edwards
PAY PER VIEW WRITER - Thomas Smith
PAY PER VIEW WRITER - Adam Graves
ASSISTANT - Anthony Brigano (promoter, recruiter, and will keep rankings for
the wrestlers and annals, which is a list of results for every card)
[NOTE: If you can help in any of these spots, _please_ tell me. To keep this
federation great, I'm going to need all the help I can get, this is _very_
important.]
=============================
Special thanks to Anthony Brigano for
helping me make this handbook, and
helping make the macros, and well,
helping recruiting!
=============================
OWC, Orangemen Wrestling Commission
Max Femmia, Nathan Liotta, Carson Bordon
and all related names, characters and their
likenesses are copyright and trademark
Kevin Riley Productions (KRP) 1998.
=============================
From LSaiz at atos-ods.com Thu May 28 01:21:02 1998
From: LSaiz at atos-ods.com (Luis Saiz)
Date: Thu, 28 May 1998 01:21:02 -0700 (PDT)
Subject: The exponent of the RSA public key must be odd.??
Message-ID: <356D1CA8.C39ABB94@atos-ods.com>
OS/390 Integrated Cryptographic Service Facility Application
Programmer's Guide Version 2 Release 5 Publication No. SC23-3976-02 :
http://ppdbooks.pok.ibm.com:80/cgi-bin/bookmgr/bookmgr.cmd/DOCNUM/SC23-3976/CCONTENTS
In several parts of the document it's specified that, as a restriction:
> The exponent of the RSA public key must be odd.
>
It's there any (unknown to me) security reason to be this way, or it�s
an implementation/standard option??
From jya at pipeline.com Thu May 28 05:14:00 1998
From: jya at pipeline.com (John Young)
Date: Thu, 28 May 1998 05:14:00 -0700 (PDT)
Subject: Public Key Royalties
Message-ID: <199805281213.IAA04745@camel14.mindspring.com>
[Forward]
:
:
:
Date: Thu, 28 May 1998 03:17:16 -0400
To: John Young
From: Vin McLellan
Subject: Public Key Royalties
Hi John:
You recently posted a note from a 5/7/98 GAO report[*] on federal
(Bayh-Dole Act) funding for US research universities in which documented
MIT's 1996 revenues from the commercialization of public key crypto. In an
accompanying note, you raised a few questions about the historical
background of PKC that I thought a deserved response.
The politics of crypto in the US is burdened with enough shadowy
plots that it behooves those of us who try to track the history of the
industry to keep a grip on simple historical fact whenever we can.
I personally think the key figures involved in the discovery of PKC
-- certainly Whit Diffie, Martin Hellman, Ron Rivest and Len Adleman --
have for years been exemplary role-models of personal and intellectual
discipline, professional openness, and forthright political engagment (in
the best sense of the word). I wouldn't like to see the public's
understanding of their contributions lost beneath another layer of
Byzantine conspiracy theories.
You wrote:
>In a recent GAO report on governmental funding of university research
>there is this note:
>
> In fiscal year 1996, the commercialization of the public key encryption
> method, which was developed under grants from the Navy and NSF,
> resulted in $271,875 in royalties to MIT.
>
>Does this refer to RSA or PGP? Did the Navy underwrite RSA's PK work?
>If so does the USG have a secret stake in PGP, Network Associates
>and RSA?
>
>More: did the Navy guide PK researchers based on the secret UK PK work
>before Diffie-Hellman?
Quick answers to your first questions:
(1) RSA. RSA Data Security Inc.(RSADSI), a company started by the
three inventors of the RSA cryptosystem was given a contract by MIT to
commercialize the RSA cryptosystem. Under the terms of that contract,
RSADSI pays royalties to MIT, which still owns the RSA patent.
(2) Nope. The Office of Naval Research (ONI) did staff the
"contracting office" responsible for administering DARPA funding for the
MIT labs where Rivest, Shamir, and Adleman did their initial work -- but
neither the Navy, nor DARPA, nor the NSA, nor the CIA, nor the Feebees
supported the subsequent development of public key cryptography at RSADSI
(the company started by the three inventors which was subsequently given an
exclusive contract by MIT to commercialize the RSA algorithm.)
(3) No secret stake in RSADSI -- so say the sworn documents filed
with the SEC before the 1996 merger of RSADSI and SDTI. PGP was not
developed at MIT. PGP has never paid royalties to MIT. I don't actually
know if there is, or ever was, any relationship or federal "stake" in PGP
Inc. or Network Associates Inc., but I doubt it. (I also think your
suggestion, without evidence, is a fairly gratuitous slander against all
these firms -- given the historic interest of US government agencies in
weakening non-government crypto and/or forcing independent cryptographic
vendors to corrupt their designs with backdoors to allow surreptitous
government access to encrypted messages and files.)
As you may recall, I do a lot of consulting for Security Dynamics
(SDTI), which purchased RSADSI in 1996. I sent your questions over to Ron
Rivest, and he asked me to pass along his response:
>The work on RSA at MIT was supported by NSF grant MCS76-14294 and ONR
>(Office of Naval Research) grant N00014-67-A-0204-0063. (See the
>footnote on the original RSA paper.) I note that the ONR is the
>contracting office for a DARPA grant here; the "Navy" as such was not
>involved.
>
>(The grants listed above did not even specify cryptography in their
>proposals, and it was more of a courtesy than anything else to
>acknowledge their support on the RSA paper, since they were supporting
>other research in algorithms and such.)
>
>As a consequence of this support, the U.S. government does not have to
>pay royalties on the "RSA patent" (U.S. patent 4,405,829.) This is a
>standard arrangement for government-supported research; the government
>doesn't want to have to pay twice for the work.
>
>There is no "secret stake" by the government in RSA. The royalty-free
>license of the patent is their only involvement.
>
>There was no contact, influence, or involvement from any government
>source regarding our development of RSA. Assuming (correctly, I
>believe) that the Diffe-Hellman paper (New Directions in Cryptography)
>was developed independently of any similar developments in the U.K.,
>then the academic development of the concept of public-key, and our
>consequent development of RSA, were totally independent of whatever
>developments happened earlier in the U.K.
>
>Indeed, given the reaction from the government that we've seen ever
>since, trying to control and/or suppress public-key technology, it is
>extremely bizarre to conjecture that the government in any way
>encouraged it early on or gave technical advice based on work in the U.K.
I suggest anyone interested in the work on "dual key" cryptography
by British government cryptographers in the early 1970s will want to read
Jame Ellis' fascinating paper, published last December by the British
government, at: http://www.cesg.gov.uk/ellisint.htm There was also a brief
but helpful NYT article by Peter Wayner, available at:
http://www.nytimes.com/library/cyber/week/122497encrypt.html
There have doubtless been numerous breakthroughs and great
inventions in the shadowy world of government cryptography. Unfortunately,
the hostility of this (and most governments) have shown toward allowing
such privacy-enabling technologies to fall into the hands of mere citizens
will probably mean that we will have to wait for those inventions to be
rediscovered and thus made available to the free world by others.
I think we were all lucky that public key crypto -- the necessary
foundation for on-line electronic commerce, which in turn is seen by many
as potentially the economic engine for 21st Century -- was discovered, or
rediscovered, by mere citizens who looked first to its personal and
commercial implications.
I don't think there was a chance in hell that GCHQ, or the NSA
(which also claims to have separately discovered PKC ten years before
Hellman and Diffie conceived of it) could have recognized its personal or
commercial potential... or would have allowed it to come into the
widespread use we see today if, perchance, they _had_ foreseen that
potential.
Please feel free to post this. Thanks again for all your work
collecting the treasure trove of documents you have at jya.com. It's an
invaluable resource.
Surete,
_Vin
-----
"Cryptography is like literacy in the Dark Ages. Infinitely potent, for
good and ill... yet basically an intellectual construct, an idea, which by
its nature will resist efforts to restrict it to bureaucrats and others who
deem only themselves worthy of such Privilege."
_ A thinking man's Creed for Crypto/ vbm.
* Vin McLellan + The Privacy Guild + *
53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548
[End Forward]
* See report: http://jya.com/rced-98-126.txt (184K)
From jya at pipeline.com Thu May 28 06:27:32 1998
From: jya at pipeline.com (John Young)
Date: Thu, 28 May 1998 06:27:32 -0700 (PDT)
Subject: USG to Sue Other Wintel
Message-ID: <199805281327.JAA06789@camel14.mindspring.com>
New York Times reports today that the FTC is shortly
to file a major anti-trust suit against Intel, "charging
the company with abusing its position as the dominant
manufacturer of mircoprocessor chips."
http://www.nytimes.com
From sergon at alice.dp.ua Wed May 27 15:55:49 1998
From: sergon at alice.dp.ua (Sergey Bobok)
Date: Thu, 28 May 1998 06:55:49 +0800
Subject: No Subject
Message-ID: <199805272108.OAA21191@cygint.cygnus.com>
From Doug.Beattie at GSC.GTE.Com Thu May 28 06:59:56 1998
From: Doug.Beattie at GSC.GTE.Com (Beattie, Doug)
Date: Thu, 28 May 1998 06:59:56 -0700 (PDT)
Subject: The exponent of the RSA public key must be odd.??
Message-ID: <8D3B7E46799CCF118D9D00805FE28A1E03E6AB09@ndhm06.ndhm.gtegsc.com>
The exponent must be relatively prime to (p-1)(q-1) where p and q are prime
numbers.
Doug
On Thursday, May 28, 1998 4:14 AM, Luis Saiz [SMTP:LSaiz at atos-ods.com]
wrote:
> OS/390 Integrated Cryptographic Service Facility Application
> Programmer's Guide Version 2 Release 5 Publication No. SC23-3976-02
> :
> http://ppdbooks.pok.ibm.com:80/cgi-
> bin/bookmgr/bookmgr.cmd/DOCNUM/SC23-3976/CCONTENTS
>
>
>
> In several parts of the document it's specified that, as a
> restriction:
>
>
> > The exponent of the RSA public key must be odd.
> >
> It's there any (unknown to me) security reason to be this way, or
> it�s
> an implementation/standard option??
>
>
From sunder at brainlink.com Thu May 28 07:41:57 1998
From: sunder at brainlink.com (Sunder)
Date: Thu, 28 May 1998 07:41:57 -0700 (PDT)
Subject: The exponent of the RSA public key must be odd.??
In-Reply-To: <356D1CA8.C39ABB94@atos-ods.com>
Message-ID: <356D7682.D989D46B@brainlink.com>
How many prime numbers do you know of that are even?
Luis Saiz wrote:
>
> OS/390 Integrated Cryptographic Service Facility Application
> Programmer's Guide Version 2 Release 5 Publication No. SC23-3976-02 :
> http://ppdbooks.pok.ibm.com:80/cgi-bin/bookmgr/bookmgr.cmd/DOCNUM/SC23-3976/CCONTENTS
>
> In several parts of the document it's specified that, as a restriction:
>
> > The exponent of the RSA public key must be odd.
> >
> It's there any (unknown to me) security reason to be this way, or it�s
> an implementation/standard option??
--
=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run |\/|\/
../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were.... |.....
======================= http://www.sundernet.com ==========================
From LSaiz at atos-ods.com Thu May 28 08:55:03 1998
From: LSaiz at atos-ods.com (Luis Saiz)
Date: Thu, 28 May 1998 08:55:03 -0700 (PDT)
Subject: The exponent of the RSA public key must be odd.??
In-Reply-To: <356D1CA8.C39ABB94@atos-ods.com>
Message-ID: <356D88D7.1D480241@atos-ods.com>
Sunder wrote:
> How many prime numbers do you know of that are even?
>
One: 2 ;-)
OK, I've never realized that e and d must both be co-prime with respect to (p-1)(q-1), only
that ed=1 mod((p-1)(q-1)), and I didn't saw the implication.
Sorry for this stupid question, next time I'll do more mathematics before.
> Luis Saiz wrote:
> >
> > OS/390 Integrated Cryptographic Service Facility Application
> > Programmer's Guide Version 2 Release 5 Publication No. SC23-3976-02 :
> > http://ppdbooks.pok.ibm.com:80/cgi-bin/bookmgr/bookmgr.cmd/DOCNUM/SC23-3976/CCONTENTS
> >
> > In several parts of the document it's specified that, as a restriction:
> >
> > > The exponent of the RSA public key must be odd.
> > >
> > It's there any (unknown to me) security reason to be this way, or it�s
> > an implementation/standard option??
>
> --
>
> =====================================Kaos=Keraunos=Kybernetos==============
> .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\.
> ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\
> <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/
> ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/.
> .+.v.+.|God of screwdrivers"|my eye and there we were.... |.....
> ======================= http://www.sundernet.com ==========================
From caj at math.niu.edu Thu May 28 12:40:04 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Thu, 28 May 1998 12:40:04 -0700 (PDT)
Subject: The exponent of the RSA public key must be odd.??
In-Reply-To: <356D88D7.1D480241@atos-ods.com>
Message-ID:
On Thu, 28 May 1998, Luis Saiz wrote:
> OK, I've never realized that e and d must both be co-prime with respect to (p-1)(q-1),
> only that ed=1 mod((p-1)(q-1)), and I didn't saw the implication.
Actually, that the exponent must be odd is much more immediate:
If ed = 1 mod(p-1)(q-1), then
ed = 1 + multiple*(p-1)(q-1)
= 1 + multiple*(even #)
= 1 + even # = odd #.
If either e or d were even, this couldn't be true.
-Xcott
[This same argument, by the way, is how you prove that
e and d must both be co-prime to phi(n). Just let
C be any divisor of phi(n), and replace "even" with
"divisible by C" and "odd" with "not divisible by C"]
From billp at nmol.com Thu May 28 12:41:06 1998
From: billp at nmol.com (bill payne)
Date: Thu, 28 May 1998 12:41:06 -0700 (PDT)
Subject: Payne v. NSA: Plaintiff's Motion and Objection
Message-ID: <356DBB9A.44E8@nmol.com>
John Young
Just saw
whp052898.htm Payne v. NSA: Plaintiff's Motion and Objection May
28, 1998
at http://www.jya.com/crypto.htm
THANK YOU SO MUCH.
And for
http://www.mckennacuneo.com/practice/Quitam/QU02519960901.html
too!
We need visibility to get this HORRIBLE MESS SETTLED. PEACEFULLY!
There are other ways of settling matters.
Aggrieved Shiite Muslims have a fair record at other means of settlement
http://www.netlink.co.uk/users/impact/namir/martyrs.htm#allvictims
I want to get this settled and revise my book for the 80c52.
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
and maybe do something more with shift registers too
http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=
Best
bill
From jya at pipeline.com Thu May 28 12:51:37 1998
From: jya at pipeline.com (John Young)
Date: Thu, 28 May 1998 12:51:37 -0700 (PDT)
Subject: Asymmetric Warfare
Message-ID: <199805281951.PAA25901@camel14.mindspring.com>
Date: Wed, 27 May 1998 15:34:10 -0500
From: "90. USAFnews"
980734. Special operations commander outlines future threats
by Capt. John Paradis
16th Special Operations Wing Public Affairs
HURLBURT FIELD, Fla. (AFNS) -- More Chechnyas. If a military strategist
needed to look at a good model for the typical future conflict, the war
torn republic of Chechnya comes to mind, said Gen. Peter J. Schoomaker,
U.S. Special Operations Command commander in chief.
Speaking recently to about 2,000 Hurlburt Field troops at the 55th
Aircraft Maintenance Unit hangar, Schoomaker said the only certainty in
the future of warfare is that security challenges will be more ambiguous
and will follow less traditional paths.
Looking at Chechnya as an example of future conflict, confrontation will
likely differ from the more conventional and familiar "total war" by the
inclination of future adversaries to use "psychological terror" and the
influence of international media, the Internet and even cell phones to
employ open brutality as an information warfare tactic.
Russian President Boris Yeltsin, determined to crush the secessionist
drive of the tiny, mainly Muslim southern republic, ordered about 40,000
troops into Chechnya in December 1994. What was planned as a quick
campaign turned into a long and costly war, in which the outnumbered
rebels time and again dealt heavy blows to a demoralized Russian
military.
It's such "asymmetric" opponents like separatists, rebel groups,
insurgents and terrorists that U.S. special operations forces will need
to prepare for -- enemies who won't attack U.S. strategic strengths, but
will instead target U.S. vulnerabilities by executing unorthodox
measures to gain success, Schoomaker said.
"That's the future. More Chechnyas," the general said. "We are going
to see more conflict of this nature because it's a much different world
we're facing."
From glowing at americanteleport.com Thu May 28 13:25:39 1998
From: glowing at americanteleport.com (glowing at americanteleport.com)
Date: Thu, 28 May 1998 13:25:39 -0700 (PDT)
Subject: HOW DO YOU HANDLE AN ERRANT WIFE?
Message-ID: <00caa5558121c58MAIL@americanteleport.com>
....................................................................................................................
Your address was gathered from a detailed search. This is not spam and we are sorry for any inconveinence. If you wish to be removed from this advertiser's future mailings, please reply
with the subject "Remove" and our software will automatically block you
from their future mailings.
....................................................................................................................
SPANKING, OTK, PADDLING, SWITCHING ?? HOW DO YOU HANDLE AN ERRANT WIFE,
GIRLFRIEND, DAUGHTER, OTHER (OK MOTHER). WANT TO DISPENSE TRUE DISCIPLINE OR JUST HAVE SOME FUN? WATCH A VIDEOTAPE OR REALLY USE A TOY OF YOUR CHOICE?
PUT SOMEONE IN THEIR PLACE...FOR GOOD?
WE HAVE THE TOYS,
( http://www.glowingresults.com/glowingresults/paddles/index.htm )
THE TOOLS,
( http://www.glowingresults.com/glowingresults/restraints/index.htm )
AND WE CAN SHOW YOU HOW IT'S DONE
( http://www.glowingresults.com/glowingresults/videos/index.htm) ...
REAL SPANKING/PADDLING ACTION VIDEOTAPES
NO 'FLUFF....THE REAL STUFF !!
___________________________________________________________________
This is a sample of just a story !!
Our Videotapes Show Real Punishment of Actual Adults !!
WARNING!!
This story contains details of the real punishment of an adult.
M/F, O.T.K. , SPANKING and PADDLING, NUDITY, and KINKY SEX.
If you are offended by this type of material please do not open this
object!! If you are not then please enjoy it !! We try to please !!
http://www.glowing-results.com
___________________________________________________________________
"So, what are you gonna do...spank me?"
The poor salesgirl blushed a deep red as those words came flying out of
Lindas' mouth. I looked at her for a moment then said, "That's exactly what
you need young lady, something to adjust this attitude of yours!" Linda
flushed slightly at this announcement (she always does right before) gave me
a nasty look and began to turn away, I grabbed the sleve of her coat to stop
her. As I pulled her around to face me the 'look' became her pout, there was
little resistance as I propelled her towards the door of the shop. "Keep
that gift there," I said to the clerk, "we'll be back in a few minutes."
We had talked about a semi-public spanking for her, when a few others knew
what would happen to her. There was also the prospect of an accidental
audience.
7 PM, the parking lot was dimly lit, there were a lot of cars and I had
parked close to the center of the lot. It was a chilly night but about to
'warm-up' for Linda! Her heels made a sharp 'click' 'click' as we walked
across the cold pavement.
"Shit...I have to go back in there and face her...don't I?"
"Yes, that's the idea, tears, sore bottom and all!"
"Oh shit...does it have to be too...hard?"
"You know the idea, red face, red ass, as hard as I can spank in the back seat."
"Just your hand...only a spanking...nothing else?"
"No, not my hand at all. I brought that little clear paddle that we bought
from 'Glowing Results' just for tonight, I wanted to make sure that there
were tears. Remember how much that stings?"
We arrived at the car, I directed her to the passengers side rear door.
After a fast look around at the other vehicles I turned Linda to face me,
shook my finger in front of her nose and said, "Get in the back seat young
lady, you've earned this one!" The pout was still there as she turned and
entered the back door, I closed it firmly. Sliding in on the drivers side, I
turned to face Linda.
Mother was about to get a REAL spanking!!
____________________________________________________________________
From billp at nmol.com Thu May 28 14:09:20 1998
From: billp at nmol.com (bill payne)
Date: Thu, 28 May 1998 14:09:20 -0700 (PDT)
Subject: Mrs [Delicate Touch] Hanks
Message-ID: <356DD1B6.771F@nmol.com>
Thursday 5/28/98 2:48 PM
John Young
J Orlin Grabbe
On return from my walk this afternoon, I spoke with
Mrs [Delicate Touch] Hanks
http://207.33.92.15/art/va/artworkSearch.html$search
http://www.eslawrence.com/Hankspage.htm
http://www.artcorner.com/
http://www.sea-art.com/hadleyhouse/hanks/index.cfm
http://www.eslawrence.com/hankprint.htm
http://www.birchgrove.com/artists/steve%20hanks.htm
http://www.artsource1.com/hanks.html
http://www.nice-things.com/hanks.html
who lives just down the street from us.
I asked her if the large edition being built on top of the
previous single-story home was going to be a studio.
She responded in American. �Yah�
Occasionally I see some REALLY GOOD LOOKING women outside Hanks� home.
We REALLY should get this UNFORTUNATE MATTER settled before it gets
WORSE.
And it looks like it is getting WORSE. http://www.jya.com/whp052898.htm
Later
bill
From one4evil at juno.com Thu May 28 16:10:38 1998
From: one4evil at juno.com (Nalus Optic)
Date: Thu, 28 May 1998 16:10:38 -0700 (PDT)
Subject: Lack of net access blows:
Message-ID: <19980528.071047.4222.8.one4evil@juno.com>
Cyberpunks,
Que pasa? My name is D and I am new to the list...I will most
likely just be lurking for a while, till I get a visit from the Duel
Pentium II 266, 128megs of RAM, running Linux on one PII and Win98 on the
Other Fariy...She should be along by the end of the summer...
Anywhoo, the point of the subject is that at this point and time
I don't have net access so I was hopeing someone out there would send me
the FAQ that is talked of in the welcome message. It can be found at:
anonymous ftp to rtfm.mit.edu:pub/usenet-by-group/sci.crypt
At least I think that is where it is at...
I thank who ever is nice enough to send it to me...Also, maybe
post a message to me as soon as you send it...That way I don't end up
with like all of you sending it and Juno kicking my ass again for
flooding there box.
TNX,
D.
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From 62627874 at 19214.com Thu May 28 17:39:35 1998
From: 62627874 at 19214.com (62627874 at 19214.com)
Date: Thu, 28 May 1998 17:39:35 -0700 (PDT)
Subject: No Subject
Message-ID: <199702170025.GAA08056@nowhere.com>
Phonenumbers all over the world www.PhoneNumbers.net
From tcmay at got.net Thu May 28 18:01:02 1998
From: tcmay at got.net (Tim May)
Date: Thu, 28 May 1998 18:01:02 -0700 (PDT)
Subject: Asymmetric Warfare
In-Reply-To: <199805281951.PAA25901@camel14.mindspring.com>
Message-ID:
At 12:49 PM -0700 5/28/98, John Young wrote:
>Date: Wed, 27 May 1998 15:34:10 -0500
>From: "90. USAFnews"
>
>980734. Special operations commander outlines future threats
>by Capt. John Paradis
>16th Special Operations Wing Public Affairs
>
>HURLBURT FIELD, Fla. (AFNS) -- More Chechnyas. If a military strategist
>needed to look at a good model for the typical future conflict, the war
>torn republic of Chechnya comes to mind, said Gen. Peter J. Schoomaker,
>U.S. Special Operations Command commander in chief.
....
Yes, Chechnya is the model for the U.S. to follow: the Central Authority
attempting to crush a local rebellion by shelling cities, razing farms,
shooting suspected rebels without trials, and blockading entire provinces
to starve them into submission.
As the United States increasingly moves toward police state status and
chooses smaller nations to pick on (Panama, Somalia, Haiti, etc.), the
Armed Forces will come to resemble a domestic army. Something the Founders
were adamantly opposed to (between "no standing army" (ha!), Washington's
warning about avoiding foreign wars, and Posse Comitatus, which forbids a
domestic role for the Army).
>It's such "asymmetric" opponents like separatists, rebel groups,
>insurgents and terrorists that U.S. special operations forces will need
>to prepare for -- enemies who won't attack U.S. strategic strengths, but
>will instead target U.S. vulnerabilities by executing unorthodox
>measures to gain success, Schoomaker said.
>
Sounds good to me, attacking the Central Authority.
We need to launch our own crippling attacks on the U.S. military
infrastructure--it has become a cancer on the nation. Hacking their
computers and misdirecting Galaxy 4 were only the opening shots in this new
war.
Crypto is our strongest weapon. They know it. And they want it crippled.
--Tim May
"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Licensed Ontologist | black markets, collapse of governments.
From caj at math.niu.edu Thu May 28 18:16:15 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Thu, 28 May 1998 18:16:15 -0700 (PDT)
Subject: Lack of net access blows:
In-Reply-To: <19980528.071047.4222.8.one4evil@juno.com>
Message-ID:
On Thu, 28 May 1998, Nalus Optic wrote:
> Cyberpunks,
>
> Que pasa? My name is D and I am new to the list...I will most
> likely just be lurking for a while, till I get a visit from the Duel
> Pentium II 266, 128megs of RAM, running Linux on one PII and Win98 on the
> Other Fariy...She should be along by the end of the summer...
Hey, if you're a BeOS developer (and you can become one for free,) United
Micro will give you a discount on a dual PII-266 system w/ 128 Megs. I
have just such a beast, and it ain't bad. SMP rocks. Haven't tried to
put Windows on it, though.
> Anywhoo, the point of the subject is that at this point and time
> I don't have net access so I was hopeing someone out there would send me
> the FAQ that is talked of in the welcome message. It can be found at:
> anonymous ftp to rtfm.mit.edu:pub/usenet-by-group/sci.crypt
Well sir, there's about 4 FAQs there, one of which is in
10 parts. What do you want?
There's the Cryptography FAQ (the big one), the snake-oil
FAQ, the RSA-Cryptography-today FAQ, and the SSL talk list
FAQ. The 10 parts of the big one:
Overview Public-key Cryptography
Net Etiquette Digital Signatures
Basic Cryptology Technical Miscellany
Mathematical Cryptology Other Miscellany
Product Ciphers References
They range in size from 1-20 k, and ~100 k for the whole
thing.
-Xcott
,oooooooo8 o ooooo at math.niu.edu -- http://www.math.niu.edu/~caj/
o888' `88 ,888. 888
888 ,8'`88. 888 "In Geometry, there is no royal hyperspace
888o. ,oo ,8oooo88. 888 wormhole." --Buck Euclid in the 25th century
`888oooo88 o88o o888o 888
____________________8o888'_________________________________________________
From cons0005 at algonquinc.on.ca Thu May 28 19:27:54 1998
From: cons0005 at algonquinc.on.ca (cons0005 at algonquinc.on.ca)
Date: Thu, 28 May 1998 19:27:54 -0700 (PDT)
Subject: D.A.R.E. and a Bullpup
In-Reply-To: <199805211707.NAA14117@panix2.panix.com>
Message-ID: <199805290226.WAA15318@algnet.algonquinc.on.ca>
Date sent: Thu, 21 May 1998 13:56:38 -0700
To: cypherpunks at cyberpass.net
From: Tim May
Subject: D.A.R.E. and a Bullpup
Send reply to: Tim May
> I often wear a t-shirt around town which reads:
>
>
> D. A. R. E.
>
> I turned in my parents
> and all I got was this
> lousy t-shirt
>
I think you should get one:
If your a nigger,
I'm Aryan.
http://www.geocities.com/CapitolHill/Senate/8018/
http://wabakimi.carleton.ca/~nmarion/
http://www.engsoc.carleton.ca/~jproud/yash/
(For when you're bored)-PGPd Mail Preferred
From nobody at nsm.htp.org Thu May 28 20:08:12 1998
From: nobody at nsm.htp.org (nobody at nsm.htp.org)
Date: Thu, 28 May 1998 20:08:12 -0700 (PDT)
Subject: Timmy Mc Veigh
Message-ID: <19980529030659.16949.qmail@nsm.htp.org>
Text of essay said written by Timothy McVeigh - something
to think about.
May 28, 1998
Web posted at: 10:10 p.m. EDT (0210 GMT)
(AP) -- The June 1998 issue of Media Bypass Magazine includes this
essay it says was written by Timothy McVeigh:
The administration has said that Iraq has no right to stockpile
chemical or biological weapons ("weapons of mass destruction") --
mainly because they have used them in the past.
Well, if that's the standard by which these matters are decided,
then the U.S. is the nation that set the precedent. The U.S. has
stockpiled these same weapons (and more) for over 40 years. The
U.S. claims that this was done for deterrent purposes during its
"Cold War" with the Soviet Union. Why, then, is it invalid for Iraq
to claim the same reason (deterrence) -- with respect to Iraq's
(real) war with, and the continued threat of, its neighbor Iran?
The administration claims that Iraq has used these weapons in the
past. We've all seen the pictures that show a Kurdish woman and
child frozen in death from the use of chemical weapons. But, have
you ever seen these photos juxtaposed next to pictures from
Hiroshima or Nagasaki?
I suggest that one study the histories of World War I, World War II
and other "regional conflicts" that the U.S. has been involved in
to familiarize themselves with the use of "weapons of mass
destruction."
Remember Dresden? How about Hanoi? Tripoli? Baghdad? What about the
big ones -- Hiroshima and Nagasaki? (At these two locations, the
U.S. killed at least 150,000 non-combatants -- mostly women and
children -- in the blink of an eye. Thousands more took hours,
days, weeks, or months to die.)
If Saddam is such a demon, and people are calling for war crimes
charges against him and his nation, whey do we not hear the same
cry for blood directed at those responsible for even greater
amounts of "mass destruction" -- like those responsible and
involved in dropping bombs on the cities mentioned above?
The truth is, the U.S. has set the standard when it comes to the
stockpiling and use of weapons of mass destruction.
Hypocrisy when it comes to the death of children? In Oklahoma City,
it was family convenience that explained the presence of a day-care
center placed between street level and the law enforcement agencies
which occupied the upper floors of the building. Yet when
discussion shifts to Iraq, any day-care center in a government
building instantly becomes "a shield." Think about that.
(Actually, there is a difference here. The administration has
admitted to knowledge of the presence of children in or near Iraqi
government buildings, yet they still proceed with their plans to
bomb -- saying that they cannot be held responsible if children
die. There is no such proof, however, that knowledge of the
presence of children existed in relation to the Oklahoma City
bombing.)
When considering morality and "mens rea" (criminal intent) in light
of these facts, I ask: Who are the true barbarians?
Yet another example of this nation's blatant hypocrisy is revealed
by the polls which suggest that this nation is greatly in favor of
bombing Iraq.
In this instance, the people of the nation approve of bombing
government employees because they are "guilty by association" --
they are Iraqi government employees. In regard to the bombing in
Oklahoma City, however, such logic is condemned.
What motivates these seemingly contradictory positions? Do people
think that government workers in Iraq are any less human than those
in Oklahoma City? Do they think that Iraqis don't have families who
will grieve and mourn the loss of their loved ones? In this
context, do people come to believe that the killing of foreigners
is somehow different than the killing of Americans?
I recently read of an arrest in New York City where possession of a
mere pipe bomb was charged as possession of a "weapon of mass
destruction." If a two-pound pipe bomb is a "weapon of mass
destruction," then what do people think that a 2,000-pound
steel-encased bomb is?
I find it ironic, to say the least, that one of the aircraft that
could be used to drop such a bomb on Iraq is dubbed "The Spirit of
Oklahoma."
This leads me to a final, and unspoken, moral hypocrisy regarding
the use of weapons of mass destruction.
When a U.S. plane or cruise missile is used to bring destruction to
a foreign people, this nation rewards the bombers with applause and
praise. What a convenient way to absolve these killers of any
responsibility for the destruction they leave in their wake.
Unfortunately, the morality of killing is not so superficial. The
truth is, the use of a truck, a plane, or a missile for the
delivery of a weapon of mass destruction does not alter the nature
of the act itself.
These are weapons of mass destruction -- and the method of delivery
matters little to those on the receiving end of such weapons.
Whether you wish to admit it or not, when you approve, morally, of
the bombing of foreign targets by the U.S. military, you are
approving of acts morally equivalent to the bombing in Oklahoma
City. The only difference is that this nation is not going to see
any foreign casualties appear on the cover of Newsweek magazine.
It seems ironic and hypocritical that an act as viciously condemned
in Oklahoma City is now a "justified" response to a problem in a
foreign land. Then again, the history of United States policy over
the last century, when examined fully, tends to exemplify
hypocrisy.
When considering the use of weapons of mass destruction against
Iraq as a means to an end, it would be wise to reflect on the words
of the late U.S. Supreme Court Justice Louis Brandeis. His words
are as true in the context of Olmstead as they are when they stand
alone:
"Our government is the potent, the omnipresent teacher. For good or
ill, it teaches the whole people by its example."
Sincerely,
Timothy J. McVeigh
From die at pig.die.com Thu May 28 20:10:26 1998
From: die at pig.die.com (Dave Emery)
Date: Thu, 28 May 1998 20:10:26 -0700 (PDT)
Subject: Satellite processing (was Re: DRUDGE-REPORT-EXCLUSIVE pablum)
In-Reply-To: <7iF8Pe1w165w@decode.com>
Message-ID: <19980528231016.A16286@die.com>
On Thu, May 28, 1998 at 06:22:16PM -0700, Tim May wrote:
>
> ROMs currently have no sensitivity to cosmic rays or alpha particles from
> natural radioactivity in the environment, and are not expected to. Single
> event upsets typically happen with cross-coupled static RAM cells or with
> dynamic RAMs. _Some_ errors happen in logic circuits, including
> microprocessors, but not many.
>
> No doubt some examples of reported errors in ROM circuits can be found, but
> I suspect the errors are either in the decode logic or elsewhere, and
> certainly not in the mask-programmable bits or the blown fuse sections.
> Lots of ROM types exist, so I don't want to try to list all major types
> here.
>
> Some EAROMs (Electrically Alterable) or EEPROMs (Electrically Erasable) are
> sensitive to some radiation events, but not nearly as sensitive as RAM
> chips are. The IEEE Transactions on Nuclear Science, the December issue of
> every year, is devoted to reporting on actual sensitivity levels and
> physical mechanisms.
I certainly defer to your expertise, as I have no particular
knowlage of radiation effects aside from reading an occasional technical
paper or article touching on the subject tangentially. What I should
have said in any case is damage to Flash EPROM or other electrically
programmed EPROM, as several people have pointed out that fuse and mask
programmed ROMs are not at all subject to single event radiation damage.
I suppose that ROMs on board a satellite could easily afford to be
masked types, but of course there still are sound engineering reasons to
keep ROM'd code as minimal, simple and straighforward as possible, especially
when it cannot ever be changed and hundreds of millions of dollars of
satellite depends on it.
--
Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
From snow at smoke.suba.com Thu May 28 21:41:40 1998
From: snow at smoke.suba.com (snow)
Date: Thu, 28 May 1998 21:41:40 -0700 (PDT)
Subject: Holy QPRNF...
In-Reply-To: <199805050043.TAA22628@baker.math.niu.edu>
Message-ID: <199805290335.WAA01861@smoke.suba.com>
> http://biz.yahoo.com/prnews/980504/ca_live_pi_1.html
> Summary: Digimarc and Live Picture, Inc., team up to offer watermarking
> services.
> || ``Until very recently, the creative community was extremely skeptical of
> || licensing and marketing their work over the Web, which they viewed as an
> || absolute free-for-all,'' said Doug Dawirs, director of online services at
> || The Workbook. ``Now these same people and companies are jumping in with
> || both feet.''
> I hope no content creators mistakenly think that this is electronic
> content protection (possibly, one can say an aid to detect _unintentional_
> illicit use, but not intentional theft), or else there will be a
> free-for-all of a legal kind a little further down the road.
I work for a company who displays much of their work on the
Web, and we are often sited by Digimarc as a "customer".
We (AFAICT) stoped bothering with their product (probably an older
version) simply because it didn't work.
I can take any image where the watermark IS NOT visible, and
make it so that your scanning software doesn't work, yet most people wouldn't
notice a bloody thing.
Suckerware.
From StanSqncrs at aol.com Thu May 28 22:10:22 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Thu, 28 May 1998 22:10:22 -0700 (PDT)
Subject: Timmy Mc Veigh
Message-ID: <97a8ae6d.356e42ee@aol.com>
In a message dated 5/28/98 10:41:37 PM Central Daylight Time,
nobody at nsm.htp.org quotes:
<< ... It seems ironic and hypocritical that an act as viciously condemned
in Oklahoma City is now a "justified" response to a problem in a
foreign land. Then again, the history of United States policy over
the last century, when examined fully, tends to exemplify
hypocrisy. ... >>
I tell you folks, that's some of the best written propaganda I've ever seen.
Here's it's only faults that I see. Tim McVeigh is now taking the position
that the OKCity bombing was a bad thing. I don't ever recall him ever taking
that position before. And, while his post recognizes the old saying '2 wrongs
don't make a right', the post still goes against that saying (thanks to his
history.)
But he's definitely got some valid points as to how it relates to the USA's
use of weapons of mass destruction and Iraq, it's an excellent argument for
that.
Stan
From StanSqncrs at aol.com Fri May 29 01:10:32 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Fri, 29 May 1998 01:10:32 -0700 (PDT)
Subject: A Plug
Message-ID: <82a314d7.356e6c59@aol.com>
Hey look, Nobody's expressed interest in joining FreeGroup, but he can't come
in anomonously because of the 'machine' involved with my list. So, the only
way he can do it (and remain anonomous) is by coming in under a different
alias (since the other one's been uncovered, IMHO.) But, if he simply applies
now under a different alias, he knows that I know it's him, so I need to give
him cover, so I'm going to give a little FreeGroup plug to all the
Cypherpunks, so I won't really know it's him that's applying, when he does.
In reality, other Cypherpunks are also very welcome to join.
So Cypherpunks, here's something you (almost) missed by not being in
FreeGroup, posts that show that the right-wing stole the anti-FBI/Government
sentiment card from guess who, us Liberals! We never took it as far as they
did, though. We aren't that stupid :-) And if somehow my memory fails and I
already posted this (and any others) here, let me apologize in advance (though
somehow, I doubt anyone will mind (except perhaps any FBI agents that might be
viewing ;-) ) But before we get to the FBI (a favorite on this list, from my
obvservations), first we talk about other government agencies -
======
Subj: The Arch Angel
Date: 5/27/98
To: [FreeGroup]
Bet some of you newcomers wonder where the right-wing got the idea that being
anti-government might be a popular idea. I'll tell you where. They got it
from us liberals
... Around here (thanks to Fred), this guy is known as the 'Arch Angel Arlo'.
He was my favorite political composer of the era -
======
Alices Resturant
Alice's Restaurant Massacree - by Arlo Guthrie
This song is called Alice's Restaurant, it's a - bout Alice - and the
restaurant
But Alice's Restaurant is not the name of the restaurant that's - just the
name of the song
That's why I call the song Alice's Restaurant
You can get anything you want, at Alice's Restaurant
You can get anything you want - at Alice's Restaurant
Walk right in it's around the back - just a half a mile from the railroad
track
You can get anything you want, at Alice's Restaurant
Now it all started 2 Thanksgivings ago thats on 2 years ago on Thanksgiving
when my friend and I went up to visit Alice at the Restaurant, but - Alice
doesn't live in the Restaurant, she - lives in the church nearby the
restaurant in the bell tower, with her husband Ray and, Fasha the dog and
living in the bell tower like that they got a lot of room downstairs where the
pews used to've been, having all that room, seein' how they took out all the
pews, they decided that they didn't have to take out their garbage for a long
time.
We got up there, we found all the garbage in there and we decided it'd be a -
friendly gesture for us to take the garbage down to the city dump. So we took
the half-a-ton of garbage put it in the back of a red VW microbus took shovels
and rakes and impliments of destruction and - headed on toward the city dump.
Well we got there there's a big sign and a chain across the dump saying
"closed on Thanksgiving" and, we had never heard of a dump closed on
Thanksgiving before and with - tears in our eyes we drove off into the sunset
looking for - another place to put the garbage. We didn't find one -
'Till we came to a side road and off the side of the side road was another 15
foot cliff and, at the bottom of the cliff was another pile of garbage and, we
decided that 1 big pile was better than 2 little piles and rather than bring
that one up, we decided to throw ours down. That's what we did. Drove back to
the church had a Thanksgiving dinner that couldn't be beat went to sleep and
didn't get up until the next morning, when we got a phone call from Officer
Obie.
Said "Kid - we found your name on an envelope at the bottom of a half-a-ton
of garbage and - just wanted to know if you had any information about it" and
I said "yes sir Officer Obie, I cannot tell a lie - I put that envelope under
that garbage."
After speaking to Obie for about 45 minutes on the telephone we finally
arrived at the truth of the matter and said that we had to go down and pick up
the garbage and, also had to go down and speak to him at the Police Officer
station so we got in the red, VW microbus with the shovels and rakes and
implements of destruction and headed on towards the Police Officer station.
Now friends, there was only 1 of 2 things Obie could've done at the Police
station, and the 1st was that he could've givin us a medal for being so brave
and honest on the telephone, which wasn't very likely, and we didn't expect
it, and the other thing was, that he could've bawled us out and told us never
to be seen driving garbage around the vicinity again. Which is what we
expected, but when we got to the Police Officer station, there was a 3rd
possibility that we hadn't even counted upon, and we was both immediatly
arrested. Handcuffed and I said Obie "I - don't think I can pick up the
garbage with these handcuffs on." Said "Shut up kid, get in the back of the
patrol car" and that's what we did, sat in the back of the patrol car and
drove to the quote "scene-of-the-crime" unquote.
I want to tell you about the town of Stockbridge, Massachusetts where this
happened here, they got 3 stop signs - 2 police officers and 1 police car, but
when we got to the "scene-of-the-crime", there was 5 police officers and 3
police cars - being the biggest crime of the last 50 years and everybody
wanted to get in the newspaper story about it. And they was using up all
kinds of cop equipment that they had hanging around the Police Officer
station. They was taking plaster tire track footprints dog smellin' prints,
and they took twenty-seven 8 by 10 color glossy photographs, with circles and
arrows and a paragraph on the back of each one explaining what each one was to
be used as evidence against us. Took pictures of the approach, the getaway,
the northwest corner, the southwest corner, and that's not to mention the
ariel photography.
After the ordeal, we went back to the jail Obie said he was gonna put us in
the cell, said "Kid, I'm gonna put you in the cell, I want your wallet and
your belt." I said "Obie, I can understand you wanting my wallet so I don't
have any money to spend in the cell but what do you want my belt for?" Said
"Kid - we don't want any hangins." Said "Obie, did you think I was gonna hang
myself for littering?" Obie said he was making sure, and friends, Obie was
'cause he took out the toilet seat so I couldn't hit myself over the head and
drown. And he took out the toilet paper so I couldn't bend the bars, roll
out, roll the toilet paper out the window, slide down the roll and have an
escape. Obie was making sure, and it was about 4 or 5 hours later, that
Alice, remember Alice? It's a song about Alice. Alice came by and with a few
nasty words to Obie on the side - bailed us out of jail, we went back to the
church, had another Thanksgiving dinner that couldn't be beat and didn't get
up until the next morning, when we all had to go to court.
We walked in, sat down. Obie came in - with the twenty-seven 8 by 10 color
glossy pictures with circles and arrows and a paragraph on the back of each
one, sat down. Man came in said "All rise." We all stood up and Obie stood up
with the twenty-seven 8 by 10 color glossy pictures and the Judge walked in,
sat down with a seeing-eye dog and he sat down. We sat down. Obie looked at
the seeing-eye dog. And then at the twenty-seven 8 by 10 color glossy
pictures with the circles and arrows and a paragraph on the back of each one -
and looked at the seeing-eye dog. And then at the twenty-seven 8 by 10 color
glossy pictures with the circles and arrows and a paragraph on the back of
each one and began to cry - 'cause Obie came to the realization, that it was a
typical case - of 'American Blind Justice', and there was nothing he could do
about it, and the Judge wasn't gonna look at the twenty-seven 8 by 10 color
glossy pictures with the circles and arrows and a paragraph on the back of
each one explaining what each one was to be used as evidence against us. And
we was fined fifty dollars and had to - pick up the garbage in the snow, but -
that's not what I came to tell you about. Came to talk about the draft.
They got a building down in New York City it's called 'Whitehall Street' where
you walk in and get injected, inspected, detected, infected, neglected and
selected. I went down to get my physical examination one day and I walked in,
sat down - got good and drunk the night before so I looked and felt my best
when I went in that mornin'. 'Cause I wanted to look like the all American
kid from New York City. Man I wanted, I wanted to feel like the all, I wanted
to be - the all American kid, from New York and I walked in, sat down I was
hung down, brung down, hung up and all - kinds of mean, nasty, ugly things,
and I walked in, I sat down, they gave me a piece of paper that said "Kid -
see the Psychiatrist, room 6O4. And - I went up there, said "Shrink, I wanna
kill. I mean I wanna, wanna kill. Kill. I wanna, wanna see, I wanna see
blood and gore and guts and veins in my teeth. Eat dead burnt bodies. I mean
kill. Kill. KILL. KILL." And I started jumping up and down, yellin' "KILL.
KILL." And he started jumping up and down with me with me, and we was both
jumpin' up and down, yelling "KILL. KILL." And the Sergeant came over,
pinned a medal on me, sent me down the hall, said "You're our boy." Didn't
feel to good about it, uh, proceeded down the hall getting more injections,
inspections, detections, neglections, and all - kinds of stuff that they was
doin' to me at the thing there and I was there for 2 hours, 3 hours, 4 hours -
I was there a long time goin' through all kinds of mean, nasty, ugly things
and I - was, just having a tough time there and they was inspecting,
injecting every - single part of me, and they was leavin' no place untouched.
Proceeded through and I - when finally came to see the very last man, I walked
in, I walked in, sat down after a whole big thing there, and I walked up and
said "What do ya want". He said "Kid, we only got one question - have you
ever been arrested?"
I proceeded to tell him the story of the 'Alice's Restaurant Massacree' with -
full orchestration and five part harmony and stuff like that and then all the
phenomina "Stop It Right There" said "Kid - did you ever go to court?"
I proceeded to tell him the story of the twenty-seven 8 by 10 color glossy
pictures with the circles and arrows, and a paragraph on the back of each one
"Stop It Right There" and said "Kid - I want you to go over and sit down on
that bench that says 'Group W' - NOW KID!"
I, and I, I walked over to the, to the bench there, and there is - there's
Group W's where they, where they put ya, if you may not be moral enough to, to
join the Army, after committing your special crime and - there was all kinds
of mean, nasty, ugly looking people on the bench there - mother rapers -
father stabbers - father rapers! - father rapers sittin' right there on the
bench next to me and, one, they was mean and nasty and ugly, and horible and
crime, fighting guys was sittin' on the bench. And the meanest, ugliest,
nastiest one - the meanest father raper of them all, was coming over to me,
and he was mean and ugly and nasty and horible and all kinds of things, and he
sat down next to me and said "Kid - what did ya get?"
I said "I didn't get nothin', I had to pay fifty dollars and pick up the
garbage". He said "What were you arrested for, kid?" and I - said "Littering"
- and they all moved away from me on the bench there and the hairy eyeball,
and all kinds of mean, nasty things, 'till I said "and creating a nuisance"
and they all came back, shook my hand and we had a great time talkin' about
crime, mother stabbin', mother raping, and all kinds of groovy things that we
was talkin' about on the bench. And everything was fine, we was smoking
cigarettes and all kinds of things, until the Sergeant came over - had some
paper in his hand, said "Kids -
This piece of papers got 47 word 37 sentences 58 word we want to know detail
of the crime time crime and any kind of thing you got to say time and tune
about the crime unknown arresting officers name and everything you got to
say..." and he talked for 45 minutes, and nobody understood a word that he
said, but we had fun filling out the forms and playing with the pencils on the
bench there and - I filled out the 'Massacree' with the 4 part harmony and -
wrote it down there, just like it was and everything was fine and I - put down
the pencil and turned over the piece of paper and there - there on the other
side - in the middle of the other side - away from everything else on the
other side - in parenthesis - capital letters - quotated - read the following
words.
"Kid - have you rehabilitated yourself?" I went over to the Sergeant and said
"Sergeant, you've got a - lot of damn gall to ask me if I've rehabilitated
myself, I mean - I mean - I mean, I just, I'm sittin' here on the bench, I
mean I'm sitting on the Group W bench - because you want to know if I'm moral
enough to join the Army, burn women, kids houses and villages after being a
litterbug." He looked at me and said "Kid - we don't like your kind - and
we're going to send your fingerprints off to Washington" and friends -
somewhere in Washington enshrined in some little folder is a - study in black
and white - of my fingerprints.
And the only reason why I'm singing you this song now is because you may know
somebody in a similar situation - or YOU may be in a similar situation and if
you're in a situation like that - there's only one thing you can do is, walk
into the shrink wherever you are, just walk in and say "Shrink -
You can get anything you want at Alice's Resaurant" and walk out. Ya know, if
1 person, just 1 person does it they'll think he's really sick and they wont
take him. And if 2 people, 2 people do it - in harmony - they may think
they're both faggots and won't take either of 'em. And if 3 people do it - 3,
can you imagine 3 people walking in singing a bar of 'Alice's Restaurant' and
walking out? They may think it's an organization. And can you, can you
imagine 5O people a day? I said 5O people a day walking in singing a bar of
'Alice's Restaurant' and walking out. And friends they may think it's a
movement, and that's what it is. The 'Alice's Restaurant Anti-Massecree'
movement, and all you got to do to join, is sing it the next time it comes
around on guitar - with feeling. So we'll wait 'till it comes around on the
guitar here and sing it when it does - here it comes -
You can get anything you want, at Alice's Restaurant
You can get anything you want - at Alice's Restaurant
Walk right in it's around the back - just a half a mile from the railroad
track
You can get anything you want, at Alice's Restaurant
That was horrible. You want to end war and stuff you got to sing loud. You
could put alot, I've been singing this song now for about 25 minutes - I could
sing it for another 25 minutes - I'm not proud - or tired - so we'll wait
'till it comes around again and - this time with 4 part harmony and feeling -
we're just waiting for it to come around is what we're doing - allright now -
You can get anything you want, at Alice's Restaurant, excepting Alice
You can get anything you want - at Alice's Restaurant
Just walk right in it's around the back - just a half a mile from the railroad
track
and you can get anything you want, at Alice's Restaurant
Da da da da da dum, at Alice's Restaurant!
======
Stan,
FreeGroup - "Just Say It!"
http://members.aol.com/whtsametau/FreeGroup.html
From StanSqncrs at aol.com Fri May 29 01:15:33 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Fri, 29 May 1998 01:15:33 -0700 (PDT)
Subject: More Government Bashing
Message-ID: <32235dca.356e6e78@aol.com>
Ah yes, a bit of local police bashing, courts bashing and draft bashing.
Here's a little more local police bashing with a tiny bit of FBI bashing
thrown in to segue into the next post -
@@@@@@
Subj: Another Cop Bashing Story
Date: 5/28/98
To: [FreeGroup]
Again, I can't resist -
=====
Motorcycle (Significance of the Pickle) Song - Arlo Guthrie
I don't want a pickle
Just want to ride on my motorsickle
And I don't want a tickle
I'd rather ride on my motorsickle
And I don't want to die
Just want to ride on my motorcy - cle
You know, it's been about 12 years now that, I've been singing this dumb song.
You know, it's amazing, it's amazing that somebody could get away with singing
a song this dumb for that long. But you know, hey you know what's more amazing
than that is that, is that uh, somebody could make a living singing a song
this dumb. But, that's America!
You know, I told about everything there was to tell about it. When I wrote
it, how come, why, what for, but you know the one thing, that I always used to
neglect to explain, was the significance of the pickle.
It was the time I was riding my bike, I was going down a mountain road. I was
doing 150 miles an hour. On one side of the mountain road there was a
mountain, and on the other side there was nothin', it was just a cliff in the
air. But I wasn't paying attention you know I was just driving down the road.
All of a sudden by accident, a string broke off my guitar. It broke you know
right there went flying across the road that way, wrapped itself around a
yield sign. Well the sign didn't break, it didn't come out of the ground, the
string stayed wrapped around it. Stayed in the other end of my guitar, I held
on to my guitar with one hand. I held on to the bike with the other. I made
a sharp turn off the road. Luckily I didn't go into the mountain. I went over
the cliff. I was doing 150 miles an hour sideways, and 500 feet down at the
same time. Hey, I was looking for the cops, 'cause you know, hey I knew that
you know it, it was illegal.
Well, I knew that it was it. I knew I didn't have long, to live in this
world. And in my last remaining seconds in the world I knew that it was my
obligation to, write one last farewell song to the world. Took out a piece of
paper, I pulled out a pen, and it didn't write I, I had to put another ink
cartridge in it. I sat back and I thought for awhile and then it come to me,
it come like a flash, like a vision burnt across the clouds. I just wrote it
down. I learned it right away. I don't want a pickle, just want to ride on
my motorsickle. And I don't want a tickle, I'd rather ride on my motorsickle.
And I don't want to die, just, want to ride on my motorcy - cle. Hey I, you
know, I knew it wasn't the best song I ever wrote, but I didn't have time to
change it. But you know the most amazing thing was, that I didn't die, I
landed on the top of a police car, and it died.
I come into town, I come into town at a screaming 175 miles an hour singing my
new motorcycle song. I stopped out in front of the deli and out in front of
the deli was a man, eating the most tremendous pickle, a pickle the size of
four pregnant watermelons, just a huge monster pickle. He walked up to me,
pushed a pickle in my face and started asking me questions. It was about the
same time I noticed a pickle in my face I noticed a cord hanging from the long
end of the pickle going up his sleeve down his shirt into his pants and shoes
out into a briefcase he had near his feet.
I knew it wasn't a ordinary pickle. But it was about the same time I noticed
the cord hanging out ot the pickle that a 4 foot cop arrived, with a 5 foot
gun. A cop that one time, must have been around 6 foot 3, but was met at the
bottom of a mountain, by a flying, singing, writing, weirdo freak. He walked
up and with one tremendous hand he grabbed the pickle away from the other guy.
He threw it, a hundred feet, straight up in the air. And while the pickle was
half way between going up and coming down, he took out his gun and put a 3
inch bullet hole right through the long end of the pickle. It started coming
back down. He stuck out his foot. He caught the pickle on his big toe. And
balancing the pickle on his big toe he reached his huge hand into his little
pocket, pulled out a 10 foot ticket. He borrowed my pen, he wrote it up, then
he rolled it up, and stuffed it in the bullet hole in the middle of the
pickle, took the pickle with the ticket and shoved it down my throat. It was
at that very moment, that the pickle with the ticket was going down my throat
that, I knew for sure that, that I didn't want a pickle.
I don't want a pickle
I just want to ride on my motorsickle
And I don't want a tickle
I'd rather ride on my motorsickle
And I don't want to die
Just want to ride on my, motorcy - cle
@@@@@
And on to the meat of the matter, the FBI -
@@@@@
Subj: Re: Another Cop Bashing Story + FBI Bashing
Date: 5/29/98
To: [FreeGroup]
<< YES!!! I actually do have an original copy! It's on the album "ARLO" . I'll
work on that transcript this weekend. I also have "Hobo's Lullaby" Pretty cool
stuff dude! >>
Ok, then you deserve this -
======
The Pause of Mr. Claus - Arlo Guthrie
(introduction) This next song, we're going to dedicate to a great American
organization. Tonight, I'd like to dedicate this, to our boys, in the FBI.
Well, wait a minute, it's hard to be a FBI man. I mean, first of all to be a
FBI man you have to be over 40, years old. And the reason is, that it takes
at least 25 years with the organization, to be that much of a bastard. Now,
it's true you just can't join, you know it kinda it needs a atmosphere where
your natural bastardness, can grow and develop and, take a meaningful shape in
today's complex society.
But that's not why I want to dedicate the song to the FBI. I mean the job
that they have to do, is a drag! I mean they have to follow people around.
You know, that's part of their job. Follow me around. I'm out on the
highway, and I'm drivin' down the road, and I run out of gasoline and I pull
over to the side of the road, they got to pull over too, make believe they ran
out. You know, I go to get some gasoline, they have to figure out whether
they should stick with the car, or follow me! Suppose I don't come back and
they're staying with the car. Or if I fly on the airplanes. I can fly half-
fare because I'm 12 - 22, and they got to pay the full fare. But, well, what
the thing is when you pay the full fair, you have to get on the airplane first
so that they know how many seats are left over for the half-fair kids.
Allright and sometimes there aren't any seats left over and, sometimes there
are but that doesn't mean you have to go! Well suppose he gets on and fills
up the last seat. So you can't get on, then he gets off, then you can get
on! What's he going to do? Wait, well, it's a drag for him.
But that's not, that's not why I want to dedicate the song to the FBI.
During, during these hard, days, and hard weeks, everybody always has it bad
once in a while, you know you, you have a bad time of it, and you always has a
friend that says "hey man, you ain't got it that bad, look at that guy." And
you look at that guy, and he's got it worse than you! And it makes you feel
better that there's somebody that's got it worse than you. But think of the
last guy. For one minute, think of the last guy. Nobody's got it worse than
that guy. Nobody, in the whole world, that guy, he's so alone in the world,
that, he doesn't even have a street to lay in for a truck to run him over.
He's out theeerre, with nothing. Nothin's happening for that cat. And all
that he has to do to, create a little excitement in his, own life, is to bum a
dime from somewhere, call up the FBI, say "FBI?" they say "yes?" say "I dig
Uncle Ho and Chairman Mao and their friends are coming over for dinner.",
hang up the phone.
And within two minutes, and not two minutes from, when he hangs up the phone
but two minutes from when he first put the dime in, they got 30,000 feet of
tape rollin'. Files on tape, pictures, movies, dramas, actions on tape. But
then they send out a half a million people all over the entire world, the
globe, they find out all they can about this guy. 'Cause there's a number of
questions involved in this guy. I mean if he was the last guy in the world,
how did he get a dime to call the FBI? There are plenty of people that aren't
the last guy, that can't get dimes, he comes along and he gets a dime! I mean
if, if he had to bum a dime to call the FBI, how was he going to serve dinner
for all those people? *How could the last guy make dinner for all those
people?* And if he could make dinner, and was gonna make dinner, then why did
he call the FBI? And they find out all of those questions within two minutes!
And that's the, that's the great thing about America! I mean, this is the
only country in the world, I mean well it's it's not the only country in the
world that could find stuff out in two minutes, but it's the only country in
the world that would take two minutes for that guy! Well other countries
would say "Hey, he's the last guy, screw him!", you know? But, but in America
there is no discrimination. And there is no hypocracy, 'cause they'll get
anybody. And that's, that's a wonderful thing, about America.
And that's why tonight, I'd like to dedicate it to every, FBI man in the
audience. I know, you can't say nothin' you know. You can't get up and say,
"Hi!", you know, 'cause then everybody knows, that you're a FBI man, that's a
drag for you, and your friends! They're not really your friends, are they. I
mean so you can't get up and say nothing 'cause otherwise, you got to get sent
back, to the factory. And that's, that's a drag for you and an expense for
the government. And that's a drag for you.
We're going to sing you this Christmas Carol. It's for all you bastards out
there in the audience tonight. It's called 'The Pause of Mr. Claus'.
Why do you sit there so strange
Is it because you are beautiful
You must think you are deranged
Why do police guys beat on peace guys?
You must think Santa Claus wierd
He-e has lo-ong hair and a beard
Giving his presents for free
Why do police guys mess with peace guys?
Let's get Santa Clause 'Cause
Santa Claus has a red suit, he's a communist
And a beard and long hair, must be a pacifist
What's in the pipe that he's smoking???????
Mr. Claus sneaks in your house at night
he must be a dope-fiend, to put you uptight
Why do police guys, beat on peace guys?
@@@@@
What can I say? We have alot of fun.
Stan,
FreeGroup - "Just Say It!"
http://members.aol.com/whtsametau/FreeGroup.html
From Mia.Westerholm at DataFellows.com Fri May 29 06:03:16 1998
From: Mia.Westerholm at DataFellows.com (Mia Westerholm)
Date: Fri, 29 May 1998 06:03:16 -0700 (PDT)
Subject: Data Fellows Announces F-Secure FileCrypto
Message-ID: <3.0.2.32.19980529144257.00a239e0@smtp.DataFellows.com>
For immediate release
29 May 1998
DATA FELLOWS ANNOUNCES F-SECURE FILECRYPTO
New Product Provides Centrally Managed On-the-Fly Protection For Sensitive
Data on Personal Computers
Helsinki, Finland, May 29, 1998 -- Data Fellows, a leading developer of
data security software, today announced F-Secure FileCrypto, the latest
addition to the company�s award-winning cryptographic product line.
F-Secure FileCrypto will provide strong, on-the-fly encryption for
confidential data in the Microsoft Windows 95/98 and NT 4.0 environments.
"F-Secure FileCrypto is the only file encryption product on the market
designed for companies with thousands of PCs," says Mr. Camillo Sars,
Product Manager, Data Fellows. "The protection of confidential files has
never been this easy. F-Secure FileCrypto is centrally installed over the
entire network, and automatically encrypts all open and temporary files.
The process is completely transparent to end-users, requiring no action
from them at all."
F-Secure FileCrypto is managed from a central location. The administrator
can define a security policy for all installed copies of the software. The
recommended basic policy is encrypting all directories on the local hard
drive.
The program also features a key retrieval function. If a user forgets the
password that allows access to encrypted files, the Administrative Key
Recovery function manages the situation safely and easily.
According to Mr. Sars: "F-Secure FileCrypto is the first and only product
to integrate strong real-time encryption into the Windows file system. It
automatically encrypts data before it gets stored on the hard disk,
protecting sensitive information even in the most demanding situations. If
a PC is improperly turned off, or if a laptop computer�s batteries go dead,
any open or temporary files will be encrypted and safe."
F-Secure FileCrypto also has a feature which allows users to send encrypted
e-mail to other users. Encrypted e-mail can be decrypted with a password.
F-Secure FileCrypto uses well-known fast block cipher algorithms. Either
the three-key 3DES, or the Blowfish algorithm, can be selected. Both
algorithms have been analyzed by the world�s leading cryptographers and are
known to be strong and safe.
"Files protected by F-Secure FileCrypto are not accessible to computer
freaks, hackers, or even cryptography experts. Each file is encrypted with
a random session key. Breaking a single key would give someone access to
only one file, and the job would consume trillions of years of computer
time," says Mr. Sars.
F-Secure FileCrypto for Windows NT 4.0 will be available in July 1998, from
Data Fellows� resellers around the world. F-Secure FileCrypto for Windows
95 and 98 will be available later this year.
About Data Fellows
Data Fellows is one of the world�s leading developers of data security
software. The company�s groundbreaking F-Secure products provide a unique
combination of globally available strong encryption and revolutionary
anti-virus software. The integrated F-Secure software family provides
complete security solutions for enterprises of any size. It includes file
encryption and IPsec communication encryption products, VPN gateways,
SSH-based secure remote management software, easy-to-use solutions for
distributed DNS management, and a full range of anti-virus products for
workstations, servers and gateways. Data Fellows is also the developer of
the award-winning
F-PROT Professional anti-virus engine, which is now an integral part of the
multiple engine structure of F-Secure Anti-Virus.
Data Fellows has offices in San Jose, California, and Helsinki, Finland. In
addition, it offers a worldwide network of technical support, training and
distribution in over 80 countries.
Since the company was founded in 1988, its annual net sales growth has
consistently been over 80%. Data Fellows belongs to an elite group of
companies with a triple-A rating from Dun&Bradstreet. The company is
privately owned.
For further information, please contact
Data Fellows Ltd., Finland:
Mr. Camillo Sars, Product Manager
Tel. +358 9 859 900
Fax. +358 9 8599 0599
E-Mail: Camillo.Sars at DataFellows.com
Data Fellows Inc., USA:
Mr. Petri Laakkonen, President
Tel. +1 408 938 6700
Fax +1 408 938 6701
E-mail: Petri.Laakkonen at DataFellows.com
Visit our web site at http://www.DataFellows.com
����������������������������������������������������
Mia.Westerholm at DataFellows.com
http://www.DataFellows.com
Data Fellows Ltd.
PL 24
FIN-02231 ESPOO, FINLAND
Tel. +358 9 859 900
Fax. +358 9 8599 0599
From iu87y at hotmail.com Fri May 29 07:12:45 1998
From: iu87y at hotmail.com (kj87u)
Date: Fri, 29 May 1998 07:12:45 -0700 (PDT)
Subject: VENTURE CAPITAL OPPORTUNITY
Message-ID: <199805293650TAA36479@76tg54@hotmail.com.nationwide.net>
VENTURE CAPITAL BUSINESS AND CAREER OPPORTUNITY
Our corporation, through our expanding partners network,
and in conjunction with varied and substantial investment
groups, provides venture capital, equity and debt funding
to corporate clients nationwide.
We are currently expanding our system and are seeking a
professional individual as our associate, who in turn,
will qualify clients for our services.
There is an $8,250 investment.
To receive an extensive package of printed information,
please call our voice mail system at 214-373-2032 and leave
your complete name and mailing address.
This is a ONE time mailing only. It will NOT be repeated.
You are NOT on any mailing list, and your name is DELETED after
you receive this message. If this message is not of interest
to you, we are sorry for the intrusion. You DO NOT have to email
us to remove your name.
From listmaster at extensis.com Fri May 29 13:01:38 1998
From: listmaster at extensis.com (listmaster at extensis.com)
Date: Fri, 29 May 1998 13:01:38 -0700 (PDT)
Subject: Extensis Plug-ins are Compatible with Adobe Photoshop 5.0
Message-ID:
As an Extensis customer you will be happy to know that
all Extensis products are now Photoshop 5.0 compatible.
You can download the latest versions off of our web site
for free. These updates are available for all Extensis
Photoshop plug-ins including: Intellihance 3.0.2, Mask Pro 1.0,
PhotoFrame 1.0, and PhotoTools 2.0.2.
Simply visit the Extensis site at http://products.extensis.com/updates/
to get your FREE download.
For additional information on Extensis please visit
http://www.extensis.com/
For Extensis Customer Service please call 1-800-796-9798.
_________________________________________________________________
PS. We have made every effort to ensure this message is being sent
only to people who have expressed interest in Extensis products.
If we have sent this to you in error, please accept our apologies
and reply with REMOVE in the subject line and your email address
in the body for automatic exclusion from future communications.
If you know someone who would like to be on our mailing list
have them send an email to listmaster at extensis.com with ADD in
the subject line and their email address in the body.
From billp at nmol.com Fri May 29 18:10:42 1998
From: billp at nmol.com (bill payne)
Date: Fri, 29 May 1998 18:10:42 -0700 (PDT)
Subject: FOIA fee waiver denial lawsuit
Message-ID: <356F5BAC.6D4D@nmol.com>
Friday 5/29/986:52 PM
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
John Gilmore )
Arthur R. Morales )
William H. Payne
) )
Plaintiffs, )
)
Lieutenant General Kenneth A. Minihan, USAF )
Director, National Security Agency )
National Security Agency )
9800 Savage Road )
Fort George G. Meade, MD 20755-6000 )
)
Defendant )
____________________________________________)
DEMAND FOR JURY TRIAL
Gilmore http://www.cygnus.com/~gnu/
Hope you got my three phone messages.
My belief is that NO ONE has ever sued over a FOIA
fee waiver denial.
BECAUSE of the VISIBILITY that John Young has given NSA
lawsuits http://www.jya.com/nsa-cases.htm I think that
it is a propitious time to sue NSA in the District of
Columbia over a FOIA fee waiver denial.
Pro se for economic and LEGAL reasons.
And, of course, we should try to get some crypto patents
at the same time. I have some ideas for keying crypto
devices http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=0
Let me know your thoughts. By secure communications, of
course
bill
Friday 5/15/98 3:48 PM
By e-mail and US mail
Lieutenant General Kenneth A Minihan, USAF
Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000
Dear General Minihan:
Purposes of the letter are to
1 appeal a FOIA fee waiver denial.
2 continue to explore settlement possibilities of our current
lawsuit.
30 March Joann H. Grube, Deputy Director of Policy, NSA, wrote
in response to my Friday February 27, 1998 attached letter to you
There are 706 cases ahead of your in our processing queue. ..
Please be advised that your request for a waiver of fees has been
denied.
Public knowledge of how much taxpayer NSA has likely squandered
ATTEMPTING to build public key crypto chips certainly in
the public interest.
Therefore, I appeal Grube's denial.
Grube wrote
Any person notified on an adverse determination may, within 60
days after notification of the determination, file an appeal to the
NSA/CSS Freedom of Information Act Appeal Authority. The
appeal shall be in writing and addressed to the NSA/CSS FOIA
Appeal Authority, ...
General Minihan, Grube apparently is attempting to invent her
own FOIA appeal rules instead of follow federal law.
Whenever a FOIA request is denied, the agency must inform
the requester of the reasons for the denial and the requester's
right to appeal the denial to the head of the agency.
I ask that you educate and possibly reprimand Grube for her failure
to properly state law.
As you may be aware
(6)(A) Each agency, upon any request for records made under
paragraph (1), (2), or (3) of this subsection, shall--
(i) determine within ten days \1\ (excepting
Saturdays, Sundays, and legal public holidays) after
the receipt of any such request whether to comply with
such request and shall immediately notify the person
making such request of such determination and the
reasons therefor, and of the right of such person to
appeal to the head of the agency any adverse
determination; and
And you may also be aware
-------------------------------------------------------------------------
\1\ Under section 12(b) of the Electronic Freedom of Information
Act Amendments of 1996 (Pub. L. 104-231; 110 Stat. 3054), the amendment
made by section 8(b) of such Act striking ``ten days'' and inserting
``20 days'' shall take effect on October 3, 1997.
-------------------------------------------------------------------------
(ii) make a determination with respect to any
appeal within twenty days (excepting Saturdays,
Sundays, and legal public holidays) after the receipt
of such appeal. If on appeal the denial of the request
for records is in whole or in part upheld, the agency
shall notify the person making such request of the
provisions for judicial review of that determination
under paragraph (4) of this subsection
So I expect a response to this appeal within the time allotted to you
by law.
Our lawsuit has attracted international attention on Internet.
http://www.jya.com/whp050898.htm
http://www.jya.com/whp-10usca.htm
http://www.jya.com/whp043098.htm
http://www.jya.com/mf050998.htm
http://jya.com/whpfiles.htm
http://www.jya.com/crack-a5.htm
http://caq.com/cryptogate
http://www.aci.net/kalliste/speccoll.htm
http://www.aci.net/kalliste/nukearse.htm
Partially, perhaps, as the result of the about .5 million dead Iranian Shiite Muslims.
Or maybe judicial misconduct?
Morales and I plan to appeal to the Tenth in event that Morales' dismissal is upheld.
Further, we feel that YOU must be held accountable. Therefore we will appeal your
removal from our lawsuit.
But this is sure to cost the taxpayer much more money.
And failure to fairly settle these unfortunate matters raises the possibility of a understandable, or opportunistic, retaliatory attack for NSA's bungled spy sting on Iran
by the aggrieved or their enemies.
Innocent people may be harmed.
Both alternatives are unpleasant to think about.
Therefore, Morales and I continue to offer to engage in settlement talks with YOU.
I cannot find your e-mail address
Therefore I will forward the e-mail copy of this FOIA appeal /settlement letter to
Ray Kammer of NIST [http://www.nist.gov so that Kammer can possibly
forward an e-mail to you.
I am not reading e-mail.
Sincerely,
William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037
3
From bd1011 at hotmail.com Fri May 29 21:28:25 1998
From: bd1011 at hotmail.com (Nobuki Nakatuji)
Date: Fri, 29 May 1998 21:28:25 -0700 (PDT)
Subject: When write high-speed implementation,
Message-ID: <19980530042752.25126.qmail@hotmail.com>
When write high-speed implementation,
Is S-box written by hexadecimal or
written by decimal?
Thanks.
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
From verify at nytimes.com Fri May 29 22:20:20 1998
From: verify at nytimes.com (New York Times subscription robot)
Date: Fri, 29 May 1998 22:20:20 -0700 (PDT)
Subject: Welcome to The New York Times on the Web
Message-ID: <199805300520.BAA28225@content9a.nytimes.com>
Welcome, coderpunk,
Thank you for registering for The New York Times on the Web.
****************************
ABOUT YOUR REGISTRATION
****************************
Your subscriber ID is coderpunk
You selected your password at registration.
Your e-mail address is cypherpunks at toad.com
We encourage you to print this message and save it for
future reference. If you have any questions about your
registration we can find your account using the ID
and e-mail address listed above.
Unless you chose otherwise, your ID and password
have been saved on your computer so that you do not have to
enter them each time you visit our site. Please keep in mind
that you can enter this ID and password on any computer
to reach our Web site, so if you change computers or
install a new browser, there is no need to re-register. If you
forget your password, please do not re-register. You can retrieve
your password in the Help Center by clicking "Help" anywhere
on the site.
For more information about the site and your registration, please
visit the Help Center at:
http://www.nytimes.com/subscribe/help/
*****************************************
ABOUT THE NEW YORK TIMES ON THE WEB
*****************************************
The New York Times on the Web combines the quality
news coverage, authority and integrity of The New York Times
with the immediacy, utility and depth of the Internet. Our site
includes daily contents from The Times, news updates
every ten minutes from the Associated Press and throughout
the day from New York Times editors, a low-cost 365-day
archive of New York Times articles, and original reporting
exclusive to the Web in CyberTimes.
The Times on the Web also features:
** Up-to-the-minute sports scores and statistics
** Current weather conditions and 5-day forecasts for over
1,500 cities worldwide
** A searchable library of more than 50,000 book reviews
** Custom stock portfolios
** Searchable Real Estate and Help Wanted listings
** Subscription service to the Crossword Puzzle, Bridge
and Chess columns
Thank you for registering.
Visit us again soon at: http://www.nytimes.com
*****************************************
Please do not reply to this message. If you did not
authorize this registration, someone has mistakenly
registered using your e-mail address. We regret
the inconvenience; please FORWARD this message
to cancel at nytimes.com and we will remove it from
our records.
From snow at smoke.suba.com Fri May 29 22:35:11 1998
From: snow at smoke.suba.com (snow)
Date: Fri, 29 May 1998 22:35:11 -0700 (PDT)
Subject: D.A.R.E. and a Bullpupy
In-Reply-To: <199805290226.WAA15318@algnet.algonquinc.on.ca>
Message-ID: <199805300534.AAA05884@smoke.suba.com>
> If your a nigger,
I have this buddy who did some time on a narcotics charge. He
occasionally talks about some of the white folks he met while inside. Seems
many of them were associated with white power groups, and tried on several
occasions to recruit him.
He said that the funniest thing about them was their consistent
inability to spell properly, or to use anything vaguely resembling
appropriate grammer or puncuation when writing.
From forgot at nytimes.com Sat May 30 02:10:05 1998
From: forgot at nytimes.com (forgot at nytimes.com)
Date: Sat, 30 May 1998 02:10:05 -0700 (PDT)
Subject: NYT Account Request
Message-ID: <199805301001.FAA22489340@inbox.nytimes.com>
You have requested your ID and password for The New York Times on the Web.
Please follow the instructions below.
1. Please make a note of your subscriber ID:
nifft
2. Next, to get the password for this account, using your Web browser go
to this unique URL:
http://verify.nytimes.com/forgot/snp.cgi?ul=nifft~598571
This page will allow you to choose a new password. Make sure you have
copied the address EXACTLY as it appears here. (If you're getting an
"Error" page, the address was probably entered incorrectly. See "Help With
Copying and Pasting" at the bottom of this e-mail.)
3. Follow the instructions on the screen to choose a new password. After
you have entered a password you will automatically enter our Web site.
The New York Times on the Web
Customer Service
forgot at nytimes.com
********************
Help With Copying and Pasting
1. Using the mouse, highlight the entire Web address, (e.g.
http://verify.nytimes.com/forgot/snp.cgi?ul=nifft~598571)
shown above in step 2. It's essential
to highlight the entire address, even if it extends over two lines.
2. Under the Edit menu at the top of your screen, select "Copy".
3. Go into your Web browser (open it if it's not already opened).
4. Click in the "Netsite" or "Address" bar -- the place in your Web
browser where it says what Web address you're currently looking at -- and
delete the address that's currently there.
5. In the blank "Netsite" or "Address" bar, paste the address by selecting
the "Edit" menu at the top of your screen and choosing "Paste".
6. Press Enter.
7. Follow the instructions to choose a new password.
********************
If you did not request your ID and password for your NYT Web registration,
someone has mistakenly entered your e-mail address when requesting their
password. Please simply ignore this message, or, if you wish, you may go to
the address above to select a new password for your account.
From Adidas9062 at aol.com Sat May 30 11:56:19 1998
From: Adidas9062 at aol.com (Adidas9062 at aol.com)
Date: Sat, 30 May 1998 11:56:19 -0700 (PDT)
Subject: HYPER PORN!!!
Message-ID:
�
To: Adidas9062 at aol.com
Subject: Fwd: HYPER PORN!!!
From: Adidas9062 at aol.com
Date: Sat, 30 May 1998 13:28:43 EDT
To: Adidas9062 at aol.com
Subject: HYPER PORN!!!
From: Adidas9062 at aol.com
Date: Fri, 29 May 1998 22:12:59 EDT
The World's Best Free Porn
CLICK HERE
FREE Trail Membership!
services:
teens, sluts, pics, avi's, streaming video, gifs, jpgs,
gay, lesbian, chicks, animals, studs, toys, and chat. Totally legal, service
is free for up to 1 week, no obligation. Absolutly no underage pornography!
This service also contains possible adult gaming links.
please hit reply and enter "-remove " & your email address to be removed
From susangray32 at aol.com Sat May 30 14:14:36 1998
From: susangray32 at aol.com (Ann)
Date: Sat, 30 May 1998 14:14:36 -0700 (PDT)
Subject: Where's my graduation present?
Message-ID:
MEGA$NETS=MEGABUCK$
ANYBODY CAN DO THIS.
NO APPLICATION
NO INVENTORY
NO MEETING
NO PRODUCTION REQUIREMENT
NO BRAINER, EVEN A MONKEY COULD DO THIS!!!
JUST $$CASH$$
LOTS & LOTS & LOTS OF CASH !!$$!!$$!!
This is one of the most simple and yet brilliant plans ever created. Everybody
wins! BUT you must follow it exactly!! If you do the soon you will be laughing
all the way to the bank.
You are holding information in your hands on a home-based business concept
of the next century! This is a networking breakthrough of enormous potentials!
And it is here now and ready to help you earn the kind of income you deserve!
Welcome to the majors.
MEGA$NETS combines 3 of the most powerful income opportunities of our
time....computers, mail order, and network marketing. Together, they offer you a
home-based business you can work full or part-time. MEGA$NETS is an easy to
use yet sophisticated software program to help the average person get in on the
fabulous profits being made in the computer networking age.
Most of us know the future is in computers. An estimated 150,000 new people
are getting on the internet each month! MEGA-PROFITS will be earned
with computers whether you and I are involved or not. So why not get involved
Now?
The IBM compatible MEGA$NETS software disk cost just $20, yet it is designed to
bring you a tremendous income within a remarkable short period of time.
HERE'S HOW IT WORKS
Purchase the MEGA$NETS software disk for just $20 from the person sharing
this opportunity with you. Load it into your PC. You will be impressed with the
professional appearance of the software and how easy it is to operate! The
Menu includes access to a complete set of instructions. you also receive
seperate written and step by step instructions,so you do not even need to be
familiar with computers!
STEP 1. The computer will ask you to type in your own name & address. Be
sure this information is correct. Once you click to the next screen, your
information will be permanently locked into the program. No one can remove
it!!!
STEP2. Next you will see the names and addresses of 5 on your screen. Now
move to the next screen and click on " Purchase Orders". Your printer will
automatically produce a seperate Purchase Order for each of those 5 vendors.
Simply mail the orders, enclose a Self Addressed Stamped Envelope and
money order OR cash for $20 with each. In return for your orders and payment,
the 5 vendors will each send you a different code number. Your total
expenditure is $120: $20 for your original program disk and 5x20 for your codes.
STEP 3. Enter these into the computer program where it tells you to do so, and
now you are able to make copies of your disk. YOU CANNOT MAKE COPIES OF
DISKS WITHOUT THES 5 CODES. The program will not let you.
STEP 4. Once you enter the 5 codes you can now duplicate the disk and sell
each duplicated disk to other people who own or have access to a compatible
PC. They will want to buy because of the profit potential they too will have!
Selling is not difficult, Most people see the opportunity just by reading this
letter.
WHAT DO BUYERS DO?
When your customer loads your duplicated disk, they will be instructed to do the
same as you. They will purchase the computer codes they need to "unlock"
their program ( just like you did ) and begin to duplicate the disk, as many times
as they wish. Before they duplicate, your name and address will have
automatically been added into the system as an additional code vendor and
one name will have been deleted. This is no different than removing a name
from your rolodex. One name is added, one is removed.
MONEY MAKER LIKE YOU HAVE NEVER SEEN!!!
This is what could happen.
If you sell a minimum of 6 disks for $20 each, you will have back your original
$120 ( Except for the cost of some blank disks). If those 6 people sell just 6 each
all of those 36 disks will list your name and address as a code vendor. 36 people
will now send you $20 each along with a Purchase Orders generated by their disk
( total potential here is another $720 ). All you do is enter the Purchase Order
information into your program and your computer will automatically print out the
codes they have purchased from you. This takes about 30 seconds. Mail the codes
to your customers right away! Remember, the sooner they get their codes, the sooner
your name will be duplicated again and again!
Now when those 36 people sell to 6 people each, your name will automatically
move to the next position on ther screen. As one of the five code vendors, 216 (36
x 6) will each be sending you $20 for your codes ( which they must have to let
them make copies they can sell ). That's $4320 to add to your first $720...which
add up to $5040 so far. And that's only the start of it! if the 216 people sell
to only 6 others each, and your name moves to the 3rd position on everybodys
screen, potentially 1,296 people will be sending you $20...which is $25,920 PLUS
the $5,040 you received earlier. The potential earning so far could total $30,960 !
THE MULTIPLIER EFFECT ( Here is where it becomes AWESOME !)
Your next payment in the 4th position could be $20 times 7776, which is
$155,520 .. Add that to your previous $30,960, and the grand total is $186,480...
when the 5th and final position is reached, your name disappears from future duplicated
disks. By then your TOTAL INCOME COULD BE $1,119,600!! AND REMEMBER THAT'S IF EVERYONE
IN YOUR GROUP ONLY SOLD 6 DISKS.
CAN YOU SELL MORE THAN SIX DISKS?
YES! MEGA$NETS allows you to make as manys disks as you wish. The 5 codes
you buy have licensed you to duplicate as many disks as you want. The software
will even calculate the results with whatever number you choose.
NO ONE CAN CHEAT YOU!!
That's right , it's impossible to cheat MEGA$NETS software! No names and
addresses can be erased to put in the names of "friends", and the software is
programmed to generate constantly changing codes, nothing works! You are a true computer
software vendor and provider of valuable computer information codes that only you can
provide for your customers.
The MEGA$NETS Business System disk was developed by a professional commercial computer
programmer. It looks professional and works professionally. ( Some of today's best
whiz-kids have tried to break the system and failed.) In addition, MEGA$NETS checks itself
for viruses. If it finds any modifications, it would simply refuse to run, so your system
is fully protected without damaging your files. The distribution process is a similar
safeguard. By holding a duplicate of the software within itself, MEGA$NETS makes
absolutely sure that each copy is the same as the original, but with your personalized
information.
Let's take a mintue and truly understand what this business is all about. First of all,
it is NOT an investment. You are purchasing a product: a computer software program
with a 100% MONEY BACK GUARANTEE. Next, you can buy codes that will unlock the program
so you can make duplicated disks and sell them. Soon, customers will be requesting codes
from you. You become a vendor. You have something your customers need. That's real sales!
That's real business! Isn't that what American businesses do every day of the week?
Don't they get paid for selling someone a product, a service or just some information?
IS THIS LEGAL?
As we have seen, MEGA$NETS is like any other legal information-driven company.
First, you sell the software program which includes valuable marketing information
your customers can use for any business. Secondly,as an information vendor, you will be
selling valuable computer codes to your customers.Thirdly, you will be developing a
mailing list out of your customers that can help you in promoting other customers that
can help you in promoting other income opportunities you may want to offer. Huge
multi-billion dollar worldwide companies do this every hour of the day. MEGA$NETS is no
different,we just use network marketing to get the job done.Plus, there are NO MEETINGS
TO ATTEND and no corporate headquaters or hot-shot executives who can change the plan
or grab your earnings.
In effect, you are the owner and CEO of your own computer software network marketing
company! All you have to do now is purchase your disk and you are on your way to earnings
potential that will bring you financial independence! Just be ready to handle the volume!
You are now in the computer software mail order business. Treat this like a real business
and it can earn you the income of a real business! MEGA$INCOME.
DONT WAIT. DO IT NOW!!!
LOADS OF CASH AWAITS YOU!!!
Call to hear live testimonials on MEGA$NETS ( It's FREE !!)
(888) 220-5808
To Order Your MEGA$NETS Disk
Send $20 Cash OR Money Order Payable To :
( INCLUDE Self Addressed Stamped Envelope )
GES
P.O. BOX 601162
SAN DIEGO, CA 92160
ACT NOW !!!
MEGA$NETS Comes with a 100% Money Back Guarantee!!
From jya at pipeline.com Sat May 30 17:11:12 1998
From: jya at pipeline.com (John Young)
Date: Sat, 30 May 1998 17:11:12 -0700 (PDT)
Subject: BXA's KR Agents, NSA's Cult
Message-ID: <199805310011.UAA11401@camel8.mindspring.com>
BXA published yesterday its guidelines for getting approval
as a Key Recovery Agent:
http://jya.com/bxa-kraguide.htm
The House Select Committee on Intelligence "has concluded
that very large changes in the National Security Agency's culture
and method of operations need to take place ... and that NSA
will not meet its Unified Cryptologic Architecture (UCA) goals
without tackling head-on some very fundamental internal
obstacles."
Even so, as others earlier noted here, the Committee has
ruled out lifting encryption export controls.
http://jya.com/ciise.htm
From billp at nmol.com Sat May 30 18:03:02 1998
From: billp at nmol.com (bill payne)
Date: Sat, 30 May 1998 18:03:02 -0700 (PDT)
Subject: Kirtland Air Force Base
Message-ID: <35709AFC.7DD3@nmol.com>
Saturday 5/30/98 5:15 PM
J Orlin Grabbe
Masanori Fushimi
Orline just saw Spies Turn to High Tech Info Ops both at
at http://www.aci.net/kalliste/ and http://www.jya.com/crypto.htm
Friday at noon, after Lunch with Morales, I ventured onto Kirtland AFB
through the Wyoming gate.
In order to get into the National Atomic Museum I had to produce
1 Drivers license
2 proper car registration
3 proof of insurance.
The airman who was to check 1,2,and 3 was busy on the phone.
The airman was reading serial numbers on a bullet-proof vest.
I asked the airman who THEY were afraid of.
The airman responded,
1 gangs
2 militias
The airman quipped that while he was unlucky enough to lose on
a lottery ticket, he might be unfortunate enough to take bullet.
Therefore, the airman said he was wearing a bullet-proof vest, even in
about 90F weather.
I went to the museum and bought two FIRST ATOMIC BOMBARDMENT,
50th ANNIVERSARY refrigerator magnets, like the one I sent to John
Young.
I mailed the one to Orlin, but I have the one for Masanori pasted on the
side on one of my computers.
Masanori, the book Decision to Use the Atomic Bomb by Gar Alperovitz
presents fairly good evidence some in US government nuked Hiroshima and
Nagasaki merely to impress the Russians.
Unfortunately, as we can see by the current government crypto debacle,
overall intellect of the US government has not improved much since 1945.
And maybe has decreased.
Masanori, one positive side of the unfortunate matter is that LOTS MORE
people are reading your scientific papers.
http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=0
Let�s all, of course, hope for settlement of these regrettable matters.
Later and, of course, Allahu akbar
bill
From gnu at toad.com Sat May 30 18:04:35 1998
From: gnu at toad.com (John Gilmore)
Date: Sat, 30 May 1998 18:04:35 -0700 (PDT)
Subject: FOIA fee waiver denial lawsuit
In-Reply-To: <356F5BAC.6D4D@nmol.com>
Message-ID: <199805310104.SAA02100@toad.com>
Hi folks -- sorry to add to your mail load.
Disbelieve any assertions or ideas that Bill Payne offers, about a joint
lawsuit including me and him as plaintiffs. I could never aspire to
match his level of effectiveness at pursuing complaints against the
government.
John Gilmore
From StanSqncrs at aol.com Sun May 31 14:26:58 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Sun, 31 May 1998 14:26:58 -0700 (PDT)
Subject: FYI
Message-ID: <4b356dc0.357114cb@aol.com>
If you've heard rumors about Amway being a cult, it's true. It's part of the
right-wing/ChristianCoalition cult. If anyone wants to see my evidence, let
me know.
Stan
From StanSqncrs at aol.com Sun May 31 17:36:52 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Sun, 31 May 1998 17:36:52 -0700 (PDT)
Subject: FYI
Message-ID: <322a25d9.3571f777@aol.com>
Someone wrote me in private -
<< Yes, we want to see
On Sun, 31 May 1998 StanSqncrs at aol.com wrote:
> If you've heard rumors about Amway being a cult, it's true. It's part of
the
> right-wing/ChristianCoalition cult. If anyone wants to see my evidence,
let
> me know. >>
I caught an Amway employee (works in Ada and everything) on a music list
engaging in the censorship of the messages in that band's music.
But first, a who's who of the people involved in the war on the Arts/Music -
gopher://gopher.igc.apc.org/00/orgs/alternet/demval/cultwars
You'll notice Mr. and Mrs. Richard DeVos of the DeVos foundation listed, his
son runs Amway, and Richard was the guy who started it (along with another
person).
Here's my Amway employee threatening to use Amway lawyers against someone (me)
simply trying to speak on a music list -
=====
In a message dated 4/27/98 8:43:23 AM Central Daylight Time,
Russell_Gorton at amway.com writes:
<< ... buddy. I'm
just down the hall from a team of about 80 high-powered lawyers who
are fledgling experts in Internet harassment issues (amway.com is a
very-flamed, very-hacked, very high-profile domain. >>
<< --Russell Thomas Gorton Amway Corporation (yup, the direct-sell soap
empire) Ada, Michigan, USA >>
=====
Of course, I do admit, that I do speak from a left POV. ;-)
You see, the band is a band called Camel, and I like to talk about their
lyrics. One song's lyrics I posted was this one -
=====
'Refugee' - 'Stationary Traveer' (lyrics by Susan Hoover)
There's a rumour flying through the air
Paranoia's creeping everywhere.
You're gonna raise a wall -
to draw the line
You say you've got your reasons
I hear them all the time
You say it's talking treason
and a crime ...
to question why
Don't you know I've seen this all before?
History repeats itself once more.
I don't want to go -
and I can't stay
You say you've got your reasons
I hear them all the time
You say it's talking treason
and a crime ...
to question why
I don't want to be a refugee,
I just want a single guarantee.
I don't want to be a refugee
I JUST WANT THE RIGHT TO DISAGREE.
=====
Basicly, Russell is part of a right-wing gang working the Camelogue list. It
is documented here - http://members.aol.com/whtsametau/ofir.html. It's called
The Humpheads. When you get the the code - "&y", though, haven't updated
that. Here's something I snuck to the Camelogue list -
=====
3) Fish. X-tian fish. You can find a real one here on &y's server (if not in
the supposed user's address ;-) ) - http://www.roadkill.com/~dpgerdes/
But these guys don't like to do business with folk other than their own,
that's why they use that symbol. Here's where &y's X-tian fish is - "&y".
Take the & and remove the top loop of it in your mind, and it certainly looks
MUCH like an X-tian fish!
That's how I found &y's picture, I looked for that symbol on his server. You
see, his compadres know what to look for. Can you say "right-wing
conspiracy"? Sure, I knew ya could!
=====
&y (Andy) Burnett is the "moderator nazi" (his words) of that list. He has no
real info about himself on his facad server - Roadkill Consulting
(www.roadkill.com). But he had a picture stashed (in a 5 meg movie) in a
place that only his right-wing buddies (or someone observing the right-wing
conspiracy) would think to click. On one of his supposed user's boring pages
at the very bottom in fine print where he thanks "&y" for his webspace, and
the "&y" is a link.
So, if you also see a bunch of evidence against folk other than the Amway
employee, remember, that Amway employee is part of a gang, and that
accomplices in crimes are JUST as guilty as the actual trigger-person,
therefore, you need to know what his compadres are also doing.
Stan,
'Wall of Reality' Webring
http://members.aol.com/RealityWal/
From troen444 at worldnet.att.net Sun May 31 17:57:39 1998
From: troen444 at worldnet.att.net (troen444 at worldnet.att.net)
Date: Sun, 31 May 1998 17:57:39 -0700 (PDT)
Subject: Earn $100 every time OUR phone rings...
Message-ID: <199806010057.RAA03064@toad.com>
ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!!
$100 goes to you for EVERY sale that the company closes!
Does the idea of making at least $1,000 per week beginning your 2nd week of
doing business excite you?
How about never having to sell a thing to your customer and never having
to talk to ANYONE to make money? I don't know how this could get any easier.
Take a look at my latest WEEKLY commission checks:
http://www.cyberdue.com/fortune/
EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company!
The number one home based business for the 2nd year in a row, Fortune 5000
is a member of the Better Business Bureau and the U.S. Chamber of Commerce.
WHAT THIS BUSINESS WILL DO FOR YOU:
* Handles all your calls, closes your sales, and
sends you WEEKLY commission checks!
* It pays you a $100 commission (that's over 50% of the total sale)
for EVERY sale. CHECKS put $$$ in your pocket in less than your first
week or two... Quick commission earnings build and maintain motivation.
ALL YOU DO IS ADVERTISE the toll-free number and your ID number.
* You can get STARTED TODAY. Just advertise the business toll-free
number with your ID # and let this business CLOSE YOUR SALES every day...
They do all the work and YOU GET PAID FOR IT!
* You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds,
Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails
with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets
$10,000... not too bad.
There is nothing else out there that will provide you with an immediate income
beginning THIS WEEK with minimal effort.
Before you call, I want you to think about the quality of the live
operators handling your call. I am convinced you will not find
a better team of closers for your own personal sales. You will
clearly understand what I am talking about once you call.
PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!
1-800-811-2141
You will be asked for ID #50030 when you call.
(Live operators are available from 8 AM-10 PM CST Monday through Saturday and
will be able to answer any questions you may have.)
Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951
or 888-731-3457 (all toll free).
From waconsult at yahoo.com Sun May 31 21:24:26 1998
From: waconsult at yahoo.com (waconsult at yahoo.com)
Date: Sun, 31 May 1998 21:24:26 -0700 (PDT)
Subject: 4 U
Message-ID: <>
Hello there,
I make a habit of deleting mail I have not yet read, as I'm
sure you do also. Please read this one though, you might
find this interesting.
"I recently lost my high paying job from a major computer
corporation due to their loss of a major contract. They
messed up, but that whole department of 15 people including
myself are hung out to dry. Corporate America at it's
finest. I have not had luck yet finding another job, as my
skills were very specific to that company and not really
worth anything to another company.
During the time I worked there, I also bought and sold real
estate like those guys on TV. (yes, you can do that and make
it work for you too) The key is I made it work. I was fairly
successful until the 'Nightmare on Pleasant St.' as my
friends and I call it ... I lost most of my money in that
one bad deal and I was no longer financially secure and I
relied heavily on my income from my FORMER JOB.
As you've already heard, I lost that too and I started to
look for other things I could make money to help me get back
on my feet. So, I started to read all of the JUNK that
people have mailed to me. Let me tell you, I can't believe
some of the things out there ... what a waste of time.
Until I saw this. Hold on.
I know you are (like I was) ready to stop reading right here
I implore you not to. I (like you) am NOT some non-educated
fool. I have made much money for myself in Real Estate,
which is not an easy business. I am a rather competent
business man.
At least finish reading this until the end.
BETTER STILL: PRINT THIS LETTER AND READ IT IN COMFORT OVER,
AND OVER.
Here is what I saw ...
* I only needed $20 extra dollars to try this
* this is making money for people who at least tried a
little, so why not me too?
In desperation, I sent the four 5 dollar bills and got the
reports. As I always have, I MADE this work for me too. I
took much time and effort to learn about e-mail (which is a
great and FREE tool!!) and how to send lots of it.
19 days after my first mailing of this, I have received
roughly 8,450 responses. (trust me, when my fianc�e` saw
8,450 five dollar bills on the kitchen table, she no longer
laughed at me for trying this)" Matthew of Basqiuat in
Evanston, IL wrote.
Here is a special offer to help you. When you order any of
the reports from EDHAY, PO BOX 13511, Sacramento CA 95815
or as long as the above address is on the address list
below, you will receive the step-by-step instructions on
HOW YOU CAN MAKE $250,000 THROUGH THIS PROGRAM in addition
to 10,000 e-mail addresses to start e-mailing your offers
immediately. It took some time and expense to put this
together so please add another $5 for handling the addresses
and the instructions. They will come to you in a .txt format.
You will get the list of addresses and instructions with
your report.
If you follow the directions in this e-mail and be prepared
to eventually set aside about an hour each day to follow up
(and count your money!), you will make it. You don't need to
be a computer whiz, but I'll bet you already are. If you can
open an envelope, remove the money, and send an e-mail
message, then you're on your way to the bank. Take the time
to read this so you'll understand how easy it is. If I can
do this, so can you!
SAVE THIS E-MAIL IN A FOLDER OF YOUR CHOICE BY CLICKING ON
'Save As' IN THE 'File' MENUE AT THE TOP LEFT CORNER OF THIS
WINDOW. GIVE IT AN APPROPRIATE FILE NAME AND CHOOSE 'Plain
Text' AS THE FILE TYPE FORMAT. THAT WAY, YOU WILL HAVE A
COPY OF THIS FOR FUTURE USE.
This is a LEGAL, MONEY-MAKING PHENOMENON.
PRINT this letter, read the directions, THEN READ IT
AGAIN!!!
You are about to embark on the most profitable and unique
program you may ever see. Many times over, it has demonstrated
and proven its ability to generate large amounts of cash. This
program is showing fantastic appeal with a huge and
ever-growing on-line population desirous of additional income.
This is a legitimate, LEGAL, money-making opportunity. It
does not require you to come in contact with people, do any
hard work, and best of all, you never have to leave the
house, except to get the mail and go to the bank!
This truly is that lucky break you've been waiting for!
Simply follow the easy instructions in this letter, and your
financial dreams will come true! When followed correctly,
this electronic, multi-level marketing program works
perfectly ... 100% EVERY TIME!
Thousands of people have used this program to:
- Raise capital to start their own business
- Pay off debts
- Buy homes, cars, etc.,
- Even retire!
This is your chance, so don't pass it up!
GO FOR IT NOW!
Ed Hay
******* P R O G R A M O V E R V I E W *******
Basically, this is what we do:
We send thousands of people a product for $5.00 that costs
next to nothing to produce and e-mail. As with all
multi-level businesses, we build our business by recruiting
new partners and selling our products. Every state in the
U.S. allows you to recruit new business online (via your
computer).
The products in this program are a series of four business
and financial reports costing $5.00 each. Each order you
receive via "snail mail" will include:
* $5.00 cash
* The name and number of the report they are ordering
* The e-mail address where you will e-mail them the report
they ordered
To fill each order, you simply e-mail the product to the
buyer. THAT'S IT! The $5.00 is yours! This is the EASIEST
electronic business anywhere!
FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO
REAP THE STAGGERING BENEFITS!
******* I N S T R U C T I O N S *******
This is what you MUST do:
1. Order all 4 reports shown on the list below (you can't
sell them if you don't order them):
* For each report, send $5.00 CASH, the NAME & NUMBER OF
THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
RETURN POSTAL ADDRESS (in case of a problem) to the person
whose name appears on the list next to the report.
* When you place your order, make sure you order each of
the four reports. You will need all four reports so that you
can save them on your computer and resell them.
* Within a few days you will receive, via e-mail, each of
the four reports. Save them on your computer so they will be
accessible for you to send reports to the 1,000's of people
who will order them from you.
2. IMPORTANT-- DO NOT alter the names of the people who are
listed next to each report, or their sequence on the list,
in any way other than is instructed below in steps "a"
through "e" or you will lose out on the majority of your
profits. Once you understand the way this works, you'll
also see how it doesn't work if you change it. Remember,
this method has been tested, and if you alter it, it will
not work.
a. Look below for the listing of available reports.
b. After you've ordered the four reports, replace the
name and address under REPORT #1 with your name and address,
moving the one that was there down to REPORT #2.
c. Move the name and address that was under REPORT #2
down to REPORT #3.
d. Move the name and address that was under REPORT #3
down to REPORT #4. The name and address that was under
REPORT #4 is removed from the list and has NO DOUBT
collected their 50 grand.
e. Please make sure you copy everyone's name and address
ACCURATELY!!!
3. Take this entire letter, including the modified list of
names, and save it to your computer. Make NO changes to the
instruction portion of this letter.
4. Now you're ready to start an e-mail campaign on the World
Wide Web! E-mailing is very, very inexpensive. You can buy
e-mail lists for under $20/2,000 addresses or you can pay
someone a minimal charge to take care of it for you. For
additional $5, you will receive 10,000 e-mail addresses and
the step-by-step instructions on HOW YOU CAN MAKE $250,000
through this program when you order any of the reports from
me, EDHAY, PO BOX 13511, Sacramento CA 95815. START YOUR
E-MAIL CAMPAIGN IMMEDIATELY!
5. For every $5.00 you receive from interested participants,
all you must do is e-mail them the report they ordered.
THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!
This will guarantee that the e-mail THEY send out, with YOUR
name and address on it, will be prompt because they can't
send their e-mails until they receive the reports!
******* R E P O R T S *******
Notes:
- ALWAYS SEND $5 CASH FOR EACH REPORT
- Order Each REPORT by NUMBER and NAME
- ALWAYS SEND YOUR ORDER VIA REGULAR MAIL
- Make sure the cash is concealed by wrapping it in at least
two sheets of paper
- On one of those sheets of paper, include: (a)the number &
name of the report you are ordering, (b)your e-mail address,
and (c)your postal address.
______________________________________________
REPORT #1 "HOW TO REORGANIZE YOUR TIME TO ACCOMIDATE A HOME
BASED BUSINESS"
ORDER REPORT #1 FROM:
WA Consult
2511 S Illinois Ave, Suite 35
Carbondale, IL 62901
______________________________________________
REPORT #2 "MAJOR CORPORATIONS AND E-MAIL"
ORDER REPORT #2 FROM:
EDHAY
PO BOX 13511
Sacramento, CA 95853
______________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:
SMINC
1435 Warner Street, Suite 8
Chico, CA 95926
______________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 FROM:
Basqiuat
PO BOX 1663
Evanston, IL 60205
______________________________________________
******* H O W D O E S I T W O R K ? *******
Let's say you decide to start small just to see how well it
works. Assume your goal is to get 10 people to participate on
your first level. (Placing a lot of FREE ads on the internet
will EASILY get a larger response.) Also assume that everyone
else in YOUR ORGANIZATION gets ONLY 10 downline members.
Follow this example to achieve the STAGGERING results below.
1st level--your 10 members with $5.........................$50
2nd level--10 members from those 10 ($5 x 100)............$500
3rd level--10 members from those 100 ($5 x 1,000).......$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
--------------------------------------------------------------
A TOTAL OF.............................................$55,550
--------------------------------------------------------------
Remember friends, this assumes that the people who participate
only recruit 10 people each. Think for a moment what would
happen if they got 20 people to participate! Most people get
100's of participants! THINK ABOUT IT! Your cost to
participate in this is practically nothing (surely you can
afford $20). You obviously already have an internet connection
and e-mail is FREE!!! REPORT#3 shows you the most productive
methods for bulk e-mailing and purchasing e-mail lists. Some
list & bulk e-mail vendors even work on trade!
About 50,000 new people get online every month!
******* T I P S F O R S U C C E S S *******
* TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and
follow the directions accurately.
* Send for the four reports IMMEDIATELY so you will have them
when the orders start coming in because when you receive a
$5 order, you MUST send out the requested product/report to
comply with the U.S. Postal & Lottery Laws, Title 18,Sections
1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also
Code of Federal Regs. Vol. 16, Sections 255 and 436, which
state that 'a product or service must be exchanged for money
received.'
* ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
* Be patient and persistent with this program. If you follow
the instructions exactly, the results WILL undoubtedly be
SUCCESSFUL!
* ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED
******* S U C C E S S G U I D E L I N E *******
Follow these guidelines to guarantee your success:
* If you don't receive 10 to 20 orders for REPORT #1 within
two weeks, continue advertising until you do.
* Then, a couple of weeks later you should receive at least
100 orders for REPORT #2. If you don't, continue advertising
until you do.
* Once you have received 100 or more orders for REPORT #2,
YOU CAN RELAX, because the system is already working for you,
and the cash will continue to roll in!
THIS IS IMPORTANT TO REMEMBER:
Every time your name is moved down on the list, you are placed
in front of a DIFFERENT report. You can KEEP TRACK of your
PROGRESS by watching which report people are ordering from you
If you want to generate more income, send another batch of
e-mails and start the whole process again! There is no limit
to the income you will generate from this business!
NOTE:
If you need help with starting a business, registering a
business name, how income tax is handled, etc., contact your
local office of the Small Business Administrations (a Federal
agency) for free help and answer to questions. Also, the
Internal Revenue Service offers free help via telephone and
free seminars about business taxes.
******* T E S T I M O N I A L S *******
______________________________________________
This program does work, but you must follow it EXACTLY!
Especially the rule of not trying to place your name in a
different position, it won't work and you'll lose a lot of
potential income. I'm living proof that it works. It really is
a great opportunity to make relatively easy money, with little
cost to you. If you do choose to participate, follow the
program exactly, and you'll be on your way to financial
security.
Sean McLaughlin, Jackson, MS
______________________________________________
My name is Frank. My wife, Doris, and I live in Bel-Air, MD.
I am a cost accountant with a major U.S. Corporation and I
make pretty good money. When I received the program I grumbled
to Doris about receiving "junk mail." I made fun of the whole
thing, spouting my knowledge of the population and percentages
involved. I "knew" it wouldn't work. Doris totally ignored my
supposed intelligence and jumped in with both feet. I made
merciless fun of her, and was ready to lay the old "I told you
so" on her when the thing didn't work ... well, the laugh was
on me! Within two weeks she had received over 50 responses.
Within 45 days she had received over $147,200 in $5 bills! I
was shocked! I was sure that I had it all figured and that it
wouldn't work. I AM a believer now. I have joined Doris in her
"hobby." I did have seven more years until retirement, but I
think of the "rat race" and it's not for me. We owe it all to
MLM.
Frank T., Bel-Air, MD
______________________________________________
The main reason for this letter is to convince you that this
system is honest, lawful, extremely profitable, and is a way
to get a large amount of money in a short time. I was
approached several times before I checked this out. I joined
just to see what one could expect in return for the minimal
effort and money required. To my astonishment, I received
$36,470.00 in the first 14 weeks, with money still coming in.
Sincerely yours, Phillip A. Brown, Esq.
______________________________________________
Not being the gambling type, it took me several weeks to make
up my mind to participate in this plan. But conservative that
I am, I decided that the initial investment was so little that
there was just no way that I wouldn't get enough orders to at
least get my money back. Boy, was I surprised when I found my
medium-size post office box crammed with orders! For awhile,
it got so overloaded that I had to start picking up my mail at
the window. I'll make more money this year than any 10 years
of my life before. The nice thing about this deal is that it
doesn't matter where in the U.S. the people live. There simply
isn't a better investment with a faster return.
Mary Rockland, Lansing, MI
______________________________________________
I had received this program before. I deleted it, but later I
wondered if I shouldn't have given it a try. Of course, I had
no idea who to contact to get another copy, so I had to wait
until I was e-mailed another program ... 11 months passed then
it came ... I didn't delete this one! ... I made more than
$41,000 on the first try!!
D. Wilburn, Muncie, IN
______________________________________________
This is my third time to participate in this plan. We have
quit our jobs, and will soon buy a home on the beach and live
off the interest on our money. The only way on earth that this
plan will work for you is if you do it. For your sake, and for
your family's sake don't pass up this golden opportunity. Good
luck and happy spending!
Charles Fairchild, Spokane, WA
______________________________________________
ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO
FINANCIAL FREEDOM!!!
If you are not interested, we apologize for the intrusion.
From waconsult at yahoo.com Sun May 31 21:24:26 1998
From: waconsult at yahoo.com (waconsult at yahoo.com)
Date: Sun, 31 May 1998 21:24:26 -0700 (PDT)
Subject: 4 U
Message-ID: <>
Hello there,
I make a habit of deleting mail I have not yet read, as I'm
sure you do also. Please read this one though, you might
find this interesting.
"I recently lost my high paying job from a major computer
corporation due to their loss of a major contract. They
messed up, but that whole department of 15 people including
myself are hung out to dry. Corporate America at it's
finest. I have not had luck yet finding another job, as my
skills were very specific to that company and not really
worth anything to another company.
During the time I worked there, I also bought and sold real
estate like those guys on TV. (yes, you can do that and make
it work for you too) The key is I made it work. I was fairly
successful until the 'Nightmare on Pleasant St.' as my
friends and I call it ... I lost most of my money in that
one bad deal and I was no longer financially secure and I
relied heavily on my income from my FORMER JOB.
As you've already heard, I lost that too and I started to
look for other things I could make money to help me get back
on my feet. So, I started to read all of the JUNK that
people have mailed to me. Let me tell you, I can't believe
some of the things out there ... what a waste of time.
Until I saw this. Hold on.
I know you are (like I was) ready to stop reading right here
I implore you not to. I (like you) am NOT some non-educated
fool. I have made much money for myself in Real Estate,
which is not an easy business. I am a rather competent
business man.
At least finish reading this until the end.
BETTER STILL: PRINT THIS LETTER AND READ IT IN COMFORT OVER,
AND OVER.
Here is what I saw ...
* I only needed $20 extra dollars to try this
* this is making money for people who at least tried a
little, so why not me too?
In desperation, I sent the four 5 dollar bills and got the
reports. As I always have, I MADE this work for me too. I
took much time and effort to learn about e-mail (which is a
great and FREE tool!!) and how to send lots of it.
19 days after my first mailing of this, I have received
roughly 8,450 responses. (trust me, when my fianc�e` saw
8,450 five dollar bills on the kitchen table, she no longer
laughed at me for trying this)" Matthew of Basqiuat in
Evanston, IL wrote.
Here is a special offer to help you. When you order any of
the reports from EDHAY, PO BOX 13511, Sacramento CA 95815
or as long as the above address is on the address list
below, you will receive the step-by-step instructions on
HOW YOU CAN MAKE $250,000 THROUGH THIS PROGRAM in addition
to 10,000 e-mail addresses to start e-mailing your offers
immediately. It took some time and expense to put this
together so please add another $5 for handling the addresses
and the instructions. They will come to you in a .txt format.
You will get the list of addresses and instructions with
your report.
If you follow the directions in this e-mail and be prepared
to eventually set aside about an hour each day to follow up
(and count your money!), you will make it. You don't need to
be a computer whiz, but I'll bet you already are. If you can
open an envelope, remove the money, and send an e-mail
message, then you're on your way to the bank. Take the time
to read this so you'll understand how easy it is. If I can
do this, so can you!
SAVE THIS E-MAIL IN A FOLDER OF YOUR CHOICE BY CLICKING ON
'Save As' IN THE 'File' MENUE AT THE TOP LEFT CORNER OF THIS
WINDOW. GIVE IT AN APPROPRIATE FILE NAME AND CHOOSE 'Plain
Text' AS THE FILE TYPE FORMAT. THAT WAY, YOU WILL HAVE A
COPY OF THIS FOR FUTURE USE.
This is a LEGAL, MONEY-MAKING PHENOMENON.
PRINT this letter, read the directions, THEN READ IT
AGAIN!!!
You are about to embark on the most profitable and unique
program you may ever see. Many times over, it has demonstrated
and proven its ability to generate large amounts of cash. This
program is showing fantastic appeal with a huge and
ever-growing on-line population desirous of additional income.
This is a legitimate, LEGAL, money-making opportunity. It
does not require you to come in contact with people, do any
hard work, and best of all, you never have to leave the
house, except to get the mail and go to the bank!
This truly is that lucky break you've been waiting for!
Simply follow the easy instructions in this letter, and your
financial dreams will come true! When followed correctly,
this electronic, multi-level marketing program works
perfectly ... 100% EVERY TIME!
Thousands of people have used this program to:
- Raise capital to start their own business
- Pay off debts
- Buy homes, cars, etc.,
- Even retire!
This is your chance, so don't pass it up!
GO FOR IT NOW!
Ed Hay
******* P R O G R A M O V E R V I E W *******
Basically, this is what we do:
We send thousands of people a product for $5.00 that costs
next to nothing to produce and e-mail. As with all
multi-level businesses, we build our business by recruiting
new partners and selling our products. Every state in the
U.S. allows you to recruit new business online (via your
computer).
The products in this program are a series of four business
and financial reports costing $5.00 each. Each order you
receive via "snail mail" will include:
* $5.00 cash
* The name and number of the report they are ordering
* The e-mail address where you will e-mail them the report
they ordered
To fill each order, you simply e-mail the product to the
buyer. THAT'S IT! The $5.00 is yours! This is the EASIEST
electronic business anywhere!
FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO
REAP THE STAGGERING BENEFITS!
******* I N S T R U C T I O N S *******
This is what you MUST do:
1. Order all 4 reports shown on the list below (you can't
sell them if you don't order them):
* For each report, send $5.00 CASH, the NAME & NUMBER OF
THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
RETURN POSTAL ADDRESS (in case of a problem) to the person
whose name appears on the list next to the report.
* When you place your order, make sure you order each of
the four reports. You will need all four reports so that you
can save them on your computer and resell them.
* Within a few days you will receive, via e-mail, each of
the four reports. Save them on your computer so they will be
accessible for you to send reports to the 1,000's of people
who will order them from you.
2. IMPORTANT-- DO NOT alter the names of the people who are
listed next to each report, or their sequence on the list,
in any way other than is instructed below in steps "a"
through "e" or you will lose out on the majority of your
profits. Once you understand the way this works, you'll
also see how it doesn't work if you change it. Remember,
this method has been tested, and if you alter it, it will
not work.
a. Look below for the listing of available reports.
b. After you've ordered the four reports, replace the
name and address under REPORT #1 with your name and address,
moving the one that was there down to REPORT #2.
c. Move the name and address that was under REPORT #2
down to REPORT #3.
d. Move the name and address that was under REPORT #3
down to REPORT #4. The name and address that was under
REPORT #4 is removed from the list and has NO DOUBT
collected their 50 grand.
e. Please make sure you copy everyone's name and address
ACCURATELY!!!
3. Take this entire letter, including the modified list of
names, and save it to your computer. Make NO changes to the
instruction portion of this letter.
4. Now you're ready to start an e-mail campaign on the World
Wide Web! E-mailing is very, very inexpensive. You can buy
e-mail lists for under $20/2,000 addresses or you can pay
someone a minimal charge to take care of it for you. For
additional $5, you will receive 10,000 e-mail addresses and
the step-by-step instructions on HOW YOU CAN MAKE $250,000
through this program when you order any of the reports from
me, EDHAY, PO BOX 13511, Sacramento CA 95815. START YOUR
E-MAIL CAMPAIGN IMMEDIATELY!
5. For every $5.00 you receive from interested participants,
all you must do is e-mail them the report they ordered.
THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!
This will guarantee that the e-mail THEY send out, with YOUR
name and address on it, will be prompt because they can't
send their e-mails until they receive the reports!
******* R E P O R T S *******
Notes:
- ALWAYS SEND $5 CASH FOR EACH REPORT
- Order Each REPORT by NUMBER and NAME
- ALWAYS SEND YOUR ORDER VIA REGULAR MAIL
- Make sure the cash is concealed by wrapping it in at least
two sheets of paper
- On one of those sheets of paper, include: (a)the number &
name of the report you are ordering, (b)your e-mail address,
and (c)your postal address.
______________________________________________
REPORT #1 "HOW TO REORGANIZE YOUR TIME TO ACCOMIDATE A HOME
BASED BUSINESS"
ORDER REPORT #1 FROM:
WA Consult
2511 S Illinois Ave, Suite 35
Carbondale, IL 62901
______________________________________________
REPORT #2 "MAJOR CORPORATIONS AND E-MAIL"
ORDER REPORT #2 FROM:
EDHAY
PO BOX 13511
Sacramento, CA 95853
______________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:
SMINC
1435 Warner Street, Suite 8
Chico, CA 95926
______________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 FROM:
Basqiuat
PO BOX 1663
Evanston, IL 60205
______________________________________________
******* H O W D O E S I T W O R K ? *******
Let's say you decide to start small just to see how well it
works. Assume your goal is to get 10 people to participate on
your first level. (Placing a lot of FREE ads on the internet
will EASILY get a larger response.) Also assume that everyone
else in YOUR ORGANIZATION gets ONLY 10 downline members.
Follow this example to achieve the STAGGERING results below.
1st level--your 10 members with $5.........................$50
2nd level--10 members from those 10 ($5 x 100)............$500
3rd level--10 members from those 100 ($5 x 1,000).......$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
--------------------------------------------------------------
A TOTAL OF.............................................$55,550
--------------------------------------------------------------
Remember friends, this assumes that the people who participate
only recruit 10 people each. Think for a moment what would
happen if they got 20 people to participate! Most people get
100's of participants! THINK ABOUT IT! Your cost to
participate in this is practically nothing (surely you can
afford $20). You obviously already have an internet connection
and e-mail is FREE!!! REPORT#3 shows you the most productive
methods for bulk e-mailing and purchasing e-mail lists. Some
list & bulk e-mail vendors even work on trade!
About 50,000 new people get online every month!
******* T I P S F O R S U C C E S S *******
* TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and
follow the directions accurately.
* Send for the four reports IMMEDIATELY so you will have them
when the orders start coming in because when you receive a
$5 order, you MUST send out the requested product/report to
comply with the U.S. Postal & Lottery Laws, Title 18,Sections
1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also
Code of Federal Regs. Vol. 16, Sections 255 and 436, which
state that 'a product or service must be exchanged for money
received.'
* ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
* Be patient and persistent with this program. If you follow
the instructions exactly, the results WILL undoubtedly be
SUCCESSFUL!
* ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED
******* S U C C E S S G U I D E L I N E *******
Follow these guidelines to guarantee your success:
* If you don't receive 10 to 20 orders for REPORT #1 within
two weeks, continue advertising until you do.
* Then, a couple of weeks later you should receive at least
100 orders for REPORT #2. If you don't, continue advertising
until you do.
* Once you have received 100 or more orders for REPORT #2,
YOU CAN RELAX, because the system is already working for you,
and the cash will continue to roll in!
THIS IS IMPORTANT TO REMEMBER:
Every time your name is moved down on the list, you are placed
in front of a DIFFERENT report. You can KEEP TRACK of your
PROGRESS by watching which report people are ordering from you
If you want to generate more income, send another batch of
e-mails and start the whole process again! There is no limit
to the income you will generate from this business!
NOTE:
If you need help with starting a business, registering a
business name, how income tax is handled, etc., contact your
local office of the Small Business Administrations (a Federal
agency) for free help and answer to questions. Also, the
Internal Revenue Service offers free help via telephone and
free seminars about business taxes.
******* T E S T I M O N I A L S *******
______________________________________________
This program does work, but you must follow it EXACTLY!
Especially the rule of not trying to place your name in a
different position, it won't work and you'll lose a lot of
potential income. I'm living proof that it works. It really is
a great opportunity to make relatively easy money, with little
cost to you. If you do choose to participate, follow the
program exactly, and you'll be on your way to financial
security.
Sean McLaughlin, Jackson, MS
______________________________________________
My name is Frank. My wife, Doris, and I live in Bel-Air, MD.
I am a cost accountant with a major U.S. Corporation and I
make pretty good money. When I received the program I grumbled
to Doris about receiving "junk mail." I made fun of the whole
thing, spouting my knowledge of the population and percentages
involved. I "knew" it wouldn't work. Doris totally ignored my
supposed intelligence and jumped in with both feet. I made
merciless fun of her, and was ready to lay the old "I told you
so" on her when the thing didn't work ... well, the laugh was
on me! Within two weeks she had received over 50 responses.
Within 45 days she had received over $147,200 in $5 bills! I
was shocked! I was sure that I had it all figured and that it
wouldn't work. I AM a believer now. I have joined Doris in her
"hobby." I did have seven more years until retirement, but I
think of the "rat race" and it's not for me. We owe it all to
MLM.
Frank T., Bel-Air, MD
______________________________________________
The main reason for this letter is to convince you that this
system is honest, lawful, extremely profitable, and is a way
to get a large amount of money in a short time. I was
approached several times before I checked this out. I joined
just to see what one could expect in return for the minimal
effort and money required. To my astonishment, I received
$36,470.00 in the first 14 weeks, with money still coming in.
Sincerely yours, Phillip A. Brown, Esq.
______________________________________________
Not being the gambling type, it took me several weeks to make
up my mind to participate in this plan. But conservative that
I am, I decided that the initial investment was so little that
there was just no way that I wouldn't get enough orders to at
least get my money back. Boy, was I surprised when I found my
medium-size post office box crammed with orders! For awhile,
it got so overloaded that I had to start picking up my mail at
the window. I'll make more money this year than any 10 years
of my life before. The nice thing about this deal is that it
doesn't matter where in the U.S. the people live. There simply
isn't a better investment with a faster return.
Mary Rockland, Lansing, MI
______________________________________________
I had received this program before. I deleted it, but later I
wondered if I shouldn't have given it a try. Of course, I had
no idea who to contact to get another copy, so I had to wait
until I was e-mailed another program ... 11 months passed then
it came ... I didn't delete this one! ... I made more than
$41,000 on the first try!!
D. Wilburn, Muncie, IN
______________________________________________
This is my third time to participate in this plan. We have
quit our jobs, and will soon buy a home on the beach and live
off the interest on our money. The only way on earth that this
plan will work for you is if you do it. For your sake, and for
your family's sake don't pass up this golden opportunity. Good
luck and happy spending!
Charles Fairchild, Spokane, WA
______________________________________________
ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO
FINANCIAL FREEDOM!!!
If you are not interested, we apologize for the intrusion.
From nobody at REPLAY.COM Sun May 31 21:30:13 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 31 May 1998 21:30:13 -0700 (PDT)
Subject: printed materials exports
Message-ID: <199806010430.GAA16099@basement.replay.com>
"A printed book or other printed material setting
forth encryption source code is not itself subject
to the EAR...."
From I95 at nym.alias.net Sun May 31 17:19:55 1998
From: I95 at nym.alias.net (Interstate 95)
Date: Mon, 1 Jun 1998 08:19:55 +0800
Subject: Lack of net access blows:
Message-ID: <19980601001615.23933.qmail@nym.alias.net>
On Thu, 28 May 1998, Nalus Optic wrote:
>
> Cyberpunks,
>
> Que pasa? My name is D and I am new to the list...I will most
> likely just be lurking for a while, till I get a visit from the Duel
> Pentium II 266, 128megs of RAM, running Linux on one PII and Win98 on the
> Other Fariy...She should be along by the end of the summer...
You mean one machine with dual processors? You can't run two operating
systems concurrently on an SMP machine. You can install two operating
systems and choose which one to run, of course.
> Anywhoo, the point of the subject is that at this point and time
> I don't have net access so I was hopeing someone out there would send me
> the FAQ that is talked of in the welcome message. It can be found at:
>
> anonymous ftp to rtfm.mit.edu:pub/usenet-by-group/sci.crypt
>
> At least I think that is where it is at...
>
> I thank who ever is nice enough to send it to me...Also, maybe
> post a message to me as soon as you send it...That way I don't end up
> with like all of you sending it and Juno kicking my ass again for
> flooding there box.
This is complicated by the fact that there are several FAQs in that
directory. One, combined, is 100K. Juno has a message limit of around 64K,
meaning that the FAQ would have to be split, and I don't know what the
upper limit is on the size of a mailspool at Juno.
My suggestion is to sneak into a public university computer lab, sit down
at a machine then FTP it and put it on a floppy. Most of the people in
these labs don't ask questions because getting carded tends to really tick
the students off. If they do, say you left your ID card in your car, that
you're very sorry, that you usually don't get asked for it when you walk
in, that you're taking
class, that you only need about 5 minutes of time, and that you'll
remember it next time.
From verify at nytimes.com Sun May 31 17:23:57 1998
From: verify at nytimes.com (New York Times subscription robot)
Date: Mon, 1 Jun 1998 08:23:57 +0800
Subject: Welcome to The New York Times on the Web
Message-ID: <199805310413.AAA28990@content9a.nytimes.com>
Welcome, nyt_blows,
Thank you for registering for The New York Times on the Web.
****************************
ABOUT YOUR REGISTRATION
****************************
Your subscriber ID is nyt_blows
You selected your password at registration.
Your e-mail address is cypherpunks at toad.com
We encourage you to print this message and save it for
future reference. If you have any questions about your
registration we can find your account using the ID
and e-mail address listed above.
Unless you chose otherwise, your ID and password
have been saved on your computer so that you do not have to
enter them each time you visit our site. Please keep in mind
that you can enter this ID and password on any computer
to reach our Web site, so if you change computers or
install a new browser, there is no need to re-register. If you
forget your password, please do not re-register. You can retrieve
your password in the Help Center by clicking "Help" anywhere
on the site.
For more information about the site and your registration, please
visit the Help Center at:
http://www.nytimes.com/subscribe/help/
*****************************************
ABOUT THE NEW YORK TIMES ON THE WEB
*****************************************
The New York Times on the Web combines the quality
news coverage, authority and integrity of The New York Times
with the immediacy, utility and depth of the Internet. Our site
includes daily contents from The Times, news updates
every ten minutes from the Associated Press and throughout
the day from New York Times editors, a low-cost 365-day
archive of New York Times articles, and original reporting
exclusive to the Web in CyberTimes.
The Times on the Web also features:
** Up-to-the-minute sports scores and statistics
** Current weather conditions and 5-day forecasts for over
1,500 cities worldwide
** A searchable library of more than 50,000 book reviews
** Custom stock portfolios
** Searchable Real Estate and Help Wanted listings
** Subscription service to the Crossword Puzzle, Bridge
and Chess columns
Thank you for registering.
Visit us again soon at: http://www.nytimes.com
*****************************************
Please do not reply to this message. If you did not
authorize this registration, someone has mistakenly
registered using your e-mail address. We regret
the inconvenience; please FORWARD this message
to cancel at nytimes.com and we will remove it from
our records.